Abstract: A network based attendance management system (100) and method (400) thereof is disclosed. Further, the system (100) comprising a first user interface (102) accessed by an authorized person to schedule a timetable based on class codes. Further, a second user interface (104) accessed by a faculty to connect the second user interface (104) to a classroom router. Further, the at least one processor (108) is configured to receive a classroom data stored in a database (112). Further, analyse and compare the classroom router IP address against the class codes and time-table. Further, mark attendance of the faculty using facial recognition algorithms, via the computing unit. Further, the at least one processor (108) is configured to generate an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit. <>
Description:A NETWORK BASED ATTENDANCE MANAGEMENT SYSTEM AND METHOD THEREOF
FIELD OF THE DISCLOSURE
[0001] This invention generally relates to a field of attendance management, and in particular relates to a network based attendance management system and method thereof.
BACKGROUND
[0002] The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also correspond to implementations of the claimed technology.
[0003] In modern educational environments, accurate and efficient attendance tracking is a critical component of student management. Traditional attendance systems which rely on manual roll calls or paper-based sign-ins, are often time-consuming and prone to inaccuracies such as proxy attendance or human error. As educational institutions strive to improve operational efficiency and ensure data integrity, there has been a notable shift towards digital solutions. Automated attendance systems, typically based on technologies such as RFID cards, biometric systems, or QR code scanning are gained traction for their potential to streamline the process and reduce the workload on faculty and administrative staff. Further, the system promises greater accuracy and speed in recording attendance, aiming to minimize the common pitfalls associated with manual methods.
[0004] However, the automated attendance system may have several limitations, including potential security breaches, network dependency, and a lack of real-time verification of the physical presence of both students and faculty in the classroom. For example, RFID and QR code-based systems may be susceptible to unauthorized access or duplication, leading to security concerns. Further, the biometric systems may be intrusive or uncomfortable for users. Additionally, many of the existing systems may lack their ability to authenticate the user's exact location within the classroom premises.
[0005] According to a patent application “US20200019916A1” titled as “Attendance management system” which discloses the technology described herein relates to a system and method for improving employee absenteeism, and in particular, to coordinating and optimizing a series of attendance assistance processes. The method includes analysing a plurality of attendance assistance request inputs by attendance management processing servers, the analysing based on at least on a relative geographical position of an employee computing device to available attendance assistance options to first determine best available employee attendance assistance options, and based on the attendance assistance request inputs and further on the attendance management processing servers optimization of best attendance assistance solutions, directing an employee to various employee attendance assistance options to include specific solution information including at least graphical mapping of the specific solutions, the specific solutions including any of: transportation assistance, child care assistance, pet care assistance or medical assistance until the absence status is converted to an attend status.
[0006] According to another patent application “US8353705B2” titled as “Attendance tracking system” disclosed as Attendance tracking system. An automated attendance monitoring system is disclosed. The system includes (i) identification tags, with wireless communication capabilities, for each potential attendee, (ii) scanners for detecting the attendees' tags as they enter a given room, (iii) at least one server in communication with the scanners, (iv) handheld computing devices for use by attendance trackers, such as teachers, to verify a provisional attendance report generated by the scanners and server, and (v) software running on the server for receiving and managing the attendance data received from the scanners, and for generating attendance reports. Although particularly well-suited for tracking attendance in schools, the present invention can also be used in a variety of other settings where there is a need to track the whereabouts of a number of individuals.
[0007] However, the existing solution may lack precise location verification, enabling students or teachers to mark attendance from outside the designated classroom area, thus defeating the purpose of ensuring physical presence. These limitations highlight the need for more secure, reliable, and location-accurate attendance solutions.
OBJECTIVES OF THE INVENTION
[0008] Further, the objective of present invention is to provide a network based attendance management system.
[0009] Further, the objective of present invention is to provide a method for operating the network based attendance management system.
[0010] Furthermore, the objective of the present invention is to provide system that utilizes IP address verification, facial recognition technology, and network connectivity to ensure that attendance only be marked when both students and faculty are physically present in the designated classroom environment.
[0011] Furthermore, the objective of the present invention is to reduce the chances of proxy attendance.
[0012] Furthermore, the objective of the present invention is to ensure that only authorized individuals are marked present to prevent impersonation or fraudulent check-ins.
[0013] Furthermore, the objective of the present invention is to reduce the need for maintaining physical records, saving time and resources for the administration.
SUMMARY
[0015] According to an aspect, the present embodiments discloses a network based attendance management system. Further, the system comprising a first user interface accessed by an authorized person to schedule a timetable based on class codes. Further, a second user interface accessed by a faculty to connect the second user interface to a classroom router. Further, at least one processor operationally coupled with the first user interface and the second user interface. Further, the at least one processor is configured to receive a classroom data stored in a database. Further, the classroom data comprises student data, faculty data, class codes, class timetable, classroom router IP addresses. Further, analyse and compare the classroom router IP address against the class codes and time-table. Further, mark attendance of the faculty using facial recognition algorithms, via the computing unit. Further, a third user interface accessed by the student. Further, the at least one processor is configured to generate an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit.
[0016] According to an aspect, the present embodiments, discloses a method for operating a network based attendance management system. Further, the method comprising the steps of accessing, via an authorized person, a first user interface to schedule a timetable based on class codes. Further, the method comprising the steps of accessing, via a faculty, a second user interface to connect the second user interface to a classroom router. Further, the method comprising the steps of receiving, via at least one processor, a classroom data stored in a database. Further, the method comprising the steps of analysing and comparing, via the at least one processor, the classroom router IP address against the class codes and time-table. Further, the method comprising the steps of marking attendance of the faculty, via the computing unit, using facial recognition algorithms. Further, the method comprising the steps of generating, via the at least one processor, an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit.
BRIEF DESCRIPTION OF THE DRAWINGS
[0017] The accompanying drawings illustrate various embodiments of systems, methods, and embodiments of various other aspects of the disclosure. Any person with ordinary skills in the art will appreciate that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent one example of the boundaries. It may be that in some examples one element may be designed as multiple elements or that multiple elements may be designed as one element. In some examples, an element shown as an internal component of one element may be implemented as an external component in another, and vice versa. Furthermore, elements may not be drawn to scale. Non-limiting and non-exhaustive descriptions are described with reference to the following drawings. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating principles.
[0018] FIG. 1 illustrates a block diagram of a network based attendance management system, according to an embodiment of the present invention;
[0019] FIG. 2 illustrates a flowchart of a system, according to an embodiment of the present invention;
[0020] FIG. 3 illustrates an architectural diagram of the system, according to an embodiment of the present invention; and
[0021] FIG. 4 illustrates a method for operating a network based attendance management system, according to an embodiment of the present invention.
DETAILED DESCRIPTION
[0023] Some embodiments of this disclosure, illustrating all its features, will now be discussed in detail. The words “comprising,” “having,” “containing,” and “including,” and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
[0024] Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present disclosure, the preferred, systems and methods are now described. Embodiments of the present disclosure will be described more fully hereinafter with reference to the accompanying drawings in which like numerals represent like elements throughout the several figures, and in which example embodiments are shown. Embodiments of the claims may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. The examples set forth herein are non-limiting examples and are merely examples among other possible examples.
[0025] The present invention discloses a network based attendance management system and method thereof that utilizes IP address verification, facial recognition technology, and network connectivity to ensure that attendance only be marked when both students and faculty are physically present in the designated classroom environment, thereby reducing the chance of proxy attendance.
[0026] FIG. 1 illustrates a block diagram of a network based attendance management system (100), according to an embodiment of the present invention.
[0027] In some embodiments, the system (100) comprises first user interface (102), a second user interface (104), a third user interface (106), at least one processor (108), a memory (110), a database (112), a Wi-Fi range limiter (114), an input/output circuitry (116), and communication circuitry (118).
[0028] In one embodiment, a first user interface (102) installed within a computing unit. The computing unit may include but not limited to a mobile phone, a tablet or like. The computing unit may be accessed by a user to perform one or more operations. Further, the one or more operations may comprise at least one of providing a medium to input data/information, communicating with one or more other external devices, an image display, and providing various outputs.
[0001] Further, the system (100) comprises the first user interface (102), second user interface (104) and third user interface (106). Further, the first user interface (102), second user interface (104) and third user interface (106) may be installed within the computing unit. Further, the first user interface (102), second user interface (104) and third user interface (106) may correspond to at least one of a graphical user interface (GUI), a command-line interface (CLI), application programming interface (API). In at least one example, the first user interface (102), second user interface (104) and third user interface (106) may comprise a homepage, one or more redirection pages and one or more tabs linked with the homepage.
[0002] Further, the first user interface (102), second user interface (104), and third user interface (106) may comprise a homepage that is accessed by the authorized person, faculty and student to enter login credentials, respectively. Further, the first user interface (102), second user interface (104), and third user interface (106) may facilitate a creation or registration of accounts, login processes, and updates of personal information. Further, the at least one processor (108) configured to fetch and compare the login credentials with a plurality of user profiles stored in a database (112) to verify authenticity of the user. Further, the login credentials are then processed by the at least one processor (108) configured to validate them against stored data to ensure that only authorized individuals may access the system (100). Further, the validation process is essential to prevent unauthorized access and maintain the integrity and confidentiality of the attendance records.
[0003] In one embodiment, the at least one processor (108) may be communicatively coupled to the memory (110). The at least one processor (108) may include suitable logic, input/ output circuitry (116), and communication circuitry (118) that are operable to execute one or more instructions stored in the memory (110) to perform predetermined operations. In one embodiment, the at least one processor (108) may be configured to decode and execute any instructions received from one or more other electronic devices or server(s). The at least one processor (108) may be configured to execute one or more computer-readable program instructions, such as program instructions to carry out any of the functions described in this description. Further, the at least one processor (108) may be implemented using one or more processor technologies known in the art. Examples of the at least one processor (108) include, but are not limited to, one or more general purpose processors and/or one or more special purpose processors.
[0004] In one embodiment, the memory (110) may be configured to store a set of instructions and data executed by the at least one processor (108). Further, the memory (110) may include the one or more instructions that are executable by the at least one processor (108) perform specific operations.
[0005] In some embodiments, the first user interface (102) accessed by the authorized person to schedule a timetable based on class codes. The first user interface (102) may allow the authorized person to input and manage various elements that comprises class codes, student details, faculty assignments, and the IP addresses of classroom routers. Further, each of the class session may be accurately scheduled and associated with the correct classroom location. Further, the first user interface (102) may be accessed by the authorized person to create detailed timetables that align both faculty and student schedules. Further, the first user interface (102) may be configured to link class sessions with specific classroom routers through their IP addresses to ensure that attendance may only be marked when users are physically present in the designated locations.
[0006] In some embodiments, a second user interface (104) accessed by a faculty to connect the second user interface (104) to a classroom router. Further, the faculty members may easily establish a connection with the designated classroom router in their classroom by following simple on-screen instructions. Further, the connection is essential for the system (100) to verify the presence of faculty member in the correct location and to facilitate real-time attendance tracking. Further, the connection of the second user interface (104) to the classroom router's IP address may authenticate the physical presence of both faculty and students within the classroom.
[0007] In some embodiments, the at least one processor (108) is operationally coupled with the first user interface (102) and the second user interface (104). Further, the at least one processor (108) is configured to receive a classroom data stored in a database (112). Further, database (112) is a structured collection of organized data stored electronically that is accessed and managed through a database (112) management system (100) (DBMS). Further, the classroom data comprises student data, faculty data, class codes, class timetable, classroom router IP addresses.
[0008] In some embodiments, the at least one processor (108) may be configured to analyse and compare the classroom router IP address against the class codes and time-table. Further, the at least one processor (108) in the attendance management system (100) may be configured to analyse and compare the classroom router's IP address with the class codes and timetable to ensure accurate attendance tracking. For example, when a faculty member or student attempts to mark their attendance, the at least one processor (108) may verify the IP address of the connected classroom router against the class code and the specific time slot outlined in the timetable. The comparison via the at least one processor (108) may ensure that attendance may only be recorded when the faculty member is physically present in the correct classroom during the scheduled time.
[0009] In an example embodiment, if there is a mismatch such as the IP address not corresponding to the designated classroom for that particular class or time, the at least processor may be configured to prevent the attendance from being marked, thereby safeguarding against proxy attendance. Further, the process may ensure that only authorized users in the correct location and at the right time are able to record their presence.
[0010] In some embodiments, the at least one processor (108) may be configured to mark attendance of the faculty using facial recognition algorithms, via the computing unit only when the faculty member is present at the designated classroom for that particular class or time. The at least one processor (108) may be equipped with facial recognition algorithms to mark the attendance of faculty members. Further, the facial recognition algorithms may be configured to capture an image of a person's face through a camera installed with the computing unit. Further, the at least one processor (108) may be configured to analyse a specific feature to create a unique facial signature. Further, the at least one processor (108) may be configured to detect a face within a field of view of the camera and align it to ensure consistent positioning. Further, the at least one processor (108) may be configured to extract distinct facial features such as the distance between the eyes, the shape of the cheekbones, and the contour of the lips. Further, the at least one processor (108) may be configured to convert the facial features into a mathematical representation or facial signature. Further, the at least one processor (108) may be configured to compare the facial signature against the database (112) of stored facial signatures to find a match. If a match is found, the at least one processor (108) may be configured to mark attendance of the faculty. Further, the facial recognition algorithms may involve complex neural networks and machine learning techniques in order to improve accuracy and handle variations in lighting, angles, and facial expression.
[0011] In some embodiments, the third user interface (106) accessed by the student. Further, the at least one processor (108) is configured to generate an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit. Further, the pre-determined period of time for the activation code is valid for 10 minutes. Further, the student may be displayed with an activation code generated by the at least one processor (108) for the pre-determined period of time. This activation code is a unique, time-sensitive credential that allows the student to trigger the facial recognition process.
[0012] In some embodiments, when a student connects to the classroom's router, the at least one processor (108) may be configured to verify the IP address against the IP address associated with that particular classroom. If the IP address matches, the at least one processor (108) may be configured to ensure that the student is physically present in the correct classroom. Further, upon successful verification, the at least one processor (108) may be configured to generate an activation code for the student, which is displayed on the third user interface (106). Further, the activation code may serve as a temporary access key that allows the student to use facial recognition algorithms to mark their attendance.
[0013] Further, the activation code is valid for a pre-determined period. Further, the pre-determined period may correspond to 10 minutes, ensuring that the student marks their attendance within the time frame of their scheduled class. During this period, the student may use the facial recognition system (100) to confirm their identity. Further, after the 10-minute window expires, the activation code becomes invalid in order to prevent unauthorized attempts to mark attendance after the allowed period. Further, the time-sensitive activation code coupled with the facial recognition algorithms may ensure that only students physically present in the classroom and within the correct time frame may successfully mark their attendance.
[0014] In an example embodiment, the at least one processor (108) in the attendance management system (100) is configured to limit the signal range of the classroom's Wi-Fi network to a predetermined range using the Wi-Fi range limiter (114). The Wi-Fi range limiter (114) may ensure that computing unit within the specified area of the classroom may connect to the network and access the activation code. The Wi-Fi range limiter (114) may be configured to restrict the Wi-Fi signal to the designated classroom boundaries. Further, the Wi-Fi range limiter (114) may be configured to prevent students from marking attendance from outside the classroom or unauthorized areas, thereby ensuring that the attendance process is location-specific.
[0015] In an example embodiment, the at least one processor (108) is configured to display an alert notification on the computing unit, in case conditions for network validity, activation code correctness, or timetable match are not met. For example, when a student or faculty member attempts to mark attendance, the at least one processor (108) may be configured to verify whether the computing device is connected to the valid classroom network. Further, the at least one processor (108) may be configured to verify the correctness and validity of the activation code to ensure that the class codes matches to the current session. Further, the at least one processor (108) may be configured to compare the timetable to confirm that the attendance is being marked within the correct time frame for the scheduled class. If any of these conditions fail, the at least one processor (108) may generate the alert notification on the user's computing unit to inform about the specific issue. Further, the real-time feedback, via the computing unit may address any discrepancies and ensure that attendance is recorded accurately and securely to prevent any unauthorized or incorrect entries.
[0016] It may be noted that the input/output circuitry (116) may act as a medium to transmit input from the communication device to and from the system (100). In some embodiments, the Input/output circuitry (116) may refer to the hardware and software components that facilitate the exchange of information between the user interface and the system (100). The Input/output circuitry (116) may include various input devices such as keyboards, barcode scanners, GUI for the user to provide data and various output devices such as displays, printers for the user to receive data.
[0017] For example, the communication device may include N number of user devices. In some embodiments, the communication device may include a graphical user interface (GUI) as input circuitry to allow the user to input data/ or received data. In some embodiments, the communication device may comprise at least one of one or more mobile phones, laptops, or like.
[0018] In one embodiment, the communication circuitry (118) may allow the system (100) and the communication device to exchange data or information with other system (100) or apparatuses. Further, the system (100) may be communicatively coupled with a network interface via one or more protocols and software modules for sending and receiving data or information. For example, the communication circuitry (118) may include Ethernet ports, Wi-Fi adapters, or communication protocols for connecting the system (100) with the computing device.
[0019] FIG. 2 illustrates a flowchart (200) of a system (100), according to an embodiment of the present invention.
[0020] In some embodiments, the flowchart outlines the comprehensive process of an automated attendance management system (100) defining a specific function for administrative Processing Officers (APOs) (i.e., authorized person), faculty member, and students. At step 202, the process begins with the user selects their login type (i.e., APO, Faculty member, or Student). At step 204, the user enters the login credentials. Further, the at least one processor (108) may be configured to authenticate the user, at step 206. At step 208, the APOs (i.e., authorized person) may access the APO function upon successful login of the APOs in order to allow the APOs to view and manage critical data such as student and faculty information, classroom router IP addresses (i.e., at step 210), class codes (i.e., at step 212), and timetables (i.e., at step 214). This function enables APOs to oversee and update the backend processes of the system (100).
[0021] At step 216, the at least one processor (108) may be configured to connect the computing unit to the classroom router in case the login type is faculty member. At step 218, the at least one processor (108) may be configured to verify if the faculty member's device IP matches the classroom router's IP and if the time corresponds to the scheduled class timetable. At step 218, If these conditions are met as determined by the at least one processor (108), the faculty member may click button (i.e., at step 220) to mark their attendance using facial recognition algorithms in order to ensure the presence of the faculty member. At step 222, the camera installed within the computing unit is configured to capture the image of the faculty’s face. At step 224, the at least one processor (108) may be configured to compare the facial signature against the database (112) of stored facial signatures to find a match. If a match is found, the at least one processor (108) may be configured to mark attendance of the faculty. At step 226, once the attendance of the faculty member is marked, the at least one processor (108) may be configured to generate an activation code for the students. At step 228, If conditions are not met, the at least one processor (108) may be configured to display an error message (i.e., computing unit is not at correct network, incorrect class time or etc.)
[0022] At step 230, once the student is logged in or access the third user interface (106), the at least one processor (108) may be configured determine whether the activation code is valid or not and if the student's computing unit is on the same network as the classroom router. At step 232, the students mark their attendance using facial recognition, upon successful validation of network and class code. At step 234, the camera installed within the computing unit is configured to capture the image of the student face. At step 236, the at least one processor (108) may be configured to compare the facial signature against the database (112) of stored facial signatures to find a match. If a match is found, the at least one processor (108) may be configured to mark attendance of the student. Further, the attendance data may be stored in the database (112), at step 238.
[0023] Further, if the conditions are not met, the at least one processor (108) may be configured to display an error message to prevent unauthorized access or erroneous attendance marking, at step 240. Further, the two-layered verification process may use both network validation and facial recognition algorithm to ensure that attendance records are accurate and secure to prevent fraudulent entries and maintain the integrity of the system (100).
[0024] FIG. 3 illustrates an architectural diagram (300) of the system (100), according to an embodiment of the present invention.
[0025] In some embodiments, the architectural diagram illustrates the roles and responsibilities of various users within the network based automated attendance management system (100). At step 302, the user interface of the faculty member may be configured to connect to the classroom Wi-Fi. At step 304, the at least one processor (108) may be configured to authenticate the presence of faculty member via facial recognition algorithm. Further, the at least one processor (108) may be configured to compare the facial signature against the database (112) of stored facial signatures to find a match of the faculty member. At step 306, Upon successful authentication, the at least one processor (108) may be configured to mark the attendance of the faculty member, upon successful authentication of the faculty member.
[0026] Further, the students may follow the similar process by connecting to the classroom Wi-Fi and logging into the attendance portal, at step 308. Once logged in, students mark their attendance using facial recognition algorithm in order to confirm the presence in the classroom, at step 310. At step 312, the first user interface (102) accessed by the APOs is configured to manage the system (100) by handling student and faculty records (i.e., at step 314), setting classroom router IP addresses (i.e., at step 316), class codes, and schedules (i.e., at step 318). Further, the Wi-Fi range limiter (114) may be configured to limit the signal range to the classroom area in order to prevent students from marking attendance from outside the classroom premises, at step 320.
[0027] FIG. 4 illustrates a flow chart of a method (400) for operating a network based attendance management system (100), according to an embodiment of the present invention.
[0028] At step 402, accessing, via an authorized person, a first user interface (102) to schedule a timetable based on class codes. The first user interface (102) may allow the authorized person to input and manage various elements that comprises class codes, student details, faculty assignments, and the IP addresses of classroom routers. Further, each of the class session may be accurately scheduled and associated with the correct classroom location. Further, the first user interface (102) may be accessed by the authorized person to create detailed timetables that align both faculty and student schedules. Further, the first user interface (102) may be configured to link class sessions with specific classroom routers through their IP addresses to ensure that attendance may only be marked when users are physically present in the designated locations.
[0029] At step 404, accessing, via a faculty, a second user interface (104) to connect the second user interface (104) to a classroom router, Further, the faculty members may easily establish a connection with the designated classroom router in their classroom by following simple on-screen instructions. Further, the connection is essential for the system (100) to verify the presence of faculty member in the correct location and to facilitate real-time attendance tracking. Further, the connection of the second user interface (104) to the classroom router's IP address may authenticate the physical presence of both faculty and students within the classroom.
[0030] At step 406, receiving, via at least one processor (108), a classroom data stored in a database (112). Further, the at least one processor (108) is configured to receive a classroom data stored in a database (112). Further, database (112) is a structured collection of organized data stored electronically that is accessed and managed through a database (112) management system (100) (DBMS). Further, the classroom data comprises student data, faculty data, class codes, class timetable, classroom router IP addresses.
[0031] At step 408, analysing and comparing, via the at least one processor (108), the classroom router IP address against the class codes and time-table. For example, when a faculty member or student attempts to mark their attendance, the at least one processor (108) may verify the IP address of the connected classroom router against the class code and the specific time slot outlined in the timetable. The comparison via the at least one processor (108) may ensure that attendance may only be recorded when the faculty member is physically present in the correct classroom during the scheduled time.
[0032] At step 410, marking attendance of the faculty, via the computing unit, using facial recognition algorithms. The at least one processor (108) may be equipped with facial recognition algorithms to mark the attendance of faculty members. Further, the facial recognition algorithms may be configured to capture an image of a person's face through a camera installed with the computing unit.
[0033] At step 412, generating, via the at least one processor (108), an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit. Further, the pre-determined period of time for the activation code is valid for 10 minutes. Further, the student may be displayed with an activation code generated by the at least one processor (108) for the pre-determined period of time. This activation code is a unique, time-sensitive credential that allows the student to trigger the facial recognition process.
[0034] Further, when a student connects to the classroom's router, the at least one processor (108) may be configured to verify the IP address against the IP address associated with that particular classroom. If the IP address matches, the at least one processor (108) may be configured to ensure that the student is physically present in the correct classroom. Further, upon successful verification, the at least one processor (108) may be configured to generate an activation code for the student, which is displayed on the third user interface (106). Further, the activation code may serve as a temporary access key that allows the student to use facial recognition algorithms to mark their attendance.
[0035] It should be noted that the network based attendance management system (100) and method (400) thereof in any case could undergo numerous modifications and variants, all of which are covered by the same innovative concept; moreover, all of the details can be replaced by technically equivalent elements. In practice, the components used, as well as the numbers, shapes, and sizes of the components can be of any kind according to the technical requirements. The scope of protection of the invention is therefore defined by the attached claims.
Dated this 27th day of November, 2024
Ishita Rustagi (IN-PA/4097)
Agent for Applicant
, Claims:CLAIMS
WE CLAIM:
1. A network based attendance management system (100) comprising:
a first user interface (102) accessed by an authorized person to schedule a timetable based on class codes;
a second user interface (104) accessed by a faculty to connect the second user interface (104) to a classroom router;
at least one processor (108) operationally coupled with the first user interface (102) and the second user interface (104), wherein the at least one processor (108) is configured to:
receive a classroom data stored in a database (112), wherein the classroom data comprises student data, faculty data, class codes, class timetable, classroom router IP addresses;
analyse and compare the classroom router IP address against the class codes and time-table;
mark attendance of the faculty using facial recognition algorithms, via the computing unit; and
a third user interface (106) installed within the computing unit, accessed by the student, wherein the at least one processor (108) is configured to generate an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit.
2. The system (100) as claimed in claim 1, wherein the user interface accessed by the authorized person, faculty and student to enter logic credentials, wherein the at least one processor (108) is configured to validate the login credentials to prevent unauthorized access.
3. The system (100) as claimed in claim 1, wherein each classroom is assigned by IP addresses corresponding to each classroom router.
4. The system (100) as claimed in claim 1, wherein the pre-determined period of time for the activation code is valid for 10 minutes.
5. The system (100) as claimed in claim 1, wherein the at least one processor (108) is configured to limit the signal range to a predetermined range, via a Wi-Fi range limiter (114) to prevent access of activation code beyond the predetermined range.
6. The system (100) as claimed in claim 1, wherein the predetermined range of the signal may correspond to room of the class.
7. The system (100) as claimed in claim 1, wherein the at least one processor (108) is configured to display an alert notification on the computing unit, in case conditions for network validity, activation code correctness, or timetable match are not met.
8. A method (400) for operating attendance management system (100), comprising the steps of:
accessing, via an authorized person, a first user interface (102) to schedule a timetable based on class codes, at step 402;
accessing, via a faculty, a second user interface (104) to connect the second user interface (104) to a classroom router, at step 404;
receiving, via at least one processor (108), a classroom data stored in a database (112), at step 406;
analysing and comparing, via the at least one processor (108), the classroom router IP address against the class codes and time-table, at step 408;
marking attendance of the faculty, via the computing unit, using facial recognition algorithms, at step 410;
generating, via the at least one processor (108), an activation code for a pre-determined period of time to allow the student to mark attendance using facial recognition algorithms, via the computing unit, at step 412.
Dated this 27th day of November, 2024
Ishita Rustagi (IN-PA/4097)
Agent for Applicant
| # | Name | Date |
|---|---|---|
| 1 | 202411092656-STATEMENT OF UNDERTAKING (FORM 3) [27-11-2024(online)].pdf | 2024-11-27 |
| 2 | 202411092656-REQUEST FOR EXAMINATION (FORM-18) [27-11-2024(online)].pdf | 2024-11-27 |
| 3 | 202411092656-REQUEST FOR EARLY PUBLICATION(FORM-9) [27-11-2024(online)].pdf | 2024-11-27 |
| 4 | 202411092656-PROOF OF RIGHT [27-11-2024(online)].pdf | 2024-11-27 |
| 5 | 202411092656-POWER OF AUTHORITY [27-11-2024(online)].pdf | 2024-11-27 |
| 6 | 202411092656-FORM-9 [27-11-2024(online)].pdf | 2024-11-27 |
| 7 | 202411092656-FORM-8 [27-11-2024(online)].pdf | 2024-11-27 |
| 8 | 202411092656-FORM 18 [27-11-2024(online)].pdf | 2024-11-27 |
| 9 | 202411092656-FORM 1 [27-11-2024(online)].pdf | 2024-11-27 |
| 10 | 202411092656-FIGURE OF ABSTRACT [27-11-2024(online)].pdf | 2024-11-27 |
| 11 | 202411092656-DRAWINGS [27-11-2024(online)].pdf | 2024-11-27 |
| 12 | 202411092656-DECLARATION OF INVENTORSHIP (FORM 5) [27-11-2024(online)].pdf | 2024-11-27 |
| 13 | 202411092656-COMPLETE SPECIFICATION [27-11-2024(online)].pdf | 2024-11-27 |