Sign In to Follow Application
View All Documents & Correspondence

A Non Intrusive User Check In System Based On Bluetooth Low Energy (Ble) Modules

Abstract: A non-intrusive user check-in system based on Bluetooth Low Energy (BLE) modules A non-intrusive privacy secure user check-in and rewards system based on Bluetooth Low Energy (BLE). Encryption is employed on the customer data after acquiring the unique identification from the customer device when it is scanned through the BLE beacon, and selective decryption is employed on the customer activity data and such specific user activity data is fetched from the server. Further the server implements contextual data mapping on the user activity data. Fig 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 May 2024
Publication Number
22/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

NIKAT SOLUTIONS PRIVATE LIMITED
PLOT NO: 142, 143 NEELIMA GRRENS COLONY MIYAPUR HYDERABAD, TELANGANA- 500049

Inventors

1. VENKATA RAVI KISHORE VEPAKOMMA
PLOT NO: 142, 143 NEELIMA GRRENS COLONY MIYAPUR HYDERABAD, TELANGANA- 500049
2. VENKATA SAI KRISHNA KUMAR VEPAKOMMA
PLOT NO: 142, 143 NEELIMA GRRENS COLONY MIYAPUR HYDERABAD, TELANGANA- 500049

Specification

Description:
DESCRIPTION
Field of the Invention
[1] The following invention is related to user check-in system using low-power Bluetooth BLE (Bluetooth 4.0 or above) broadcast protocol, more specifically, a non-intrusive user check-in system which enable encryption and selective decryption of user data depending on type of access required by a particular entity.

Background of the invention
[2] BLE Beacon is a hardware device based on the low-power Bluetooth BLE (Bluetooth 4.0 or above) broadcast protocol. As a BLE device, it is usually installed at a specific location indoors. As a reference point for the indoor location, it continuously broadcasts to the surroundings. It does not need to be connected to any host device. It only needs to be scanned and analysed by the host device.

[3] BLE beacons are utilized for user check-in especially in employee attendance management. The principle of this solution is to achieve one-way data transmission through Bluetooth scanning and broadcasting without establishing a Bluetooth connection. The application installed on employees’ mobile phones scans the broadcast signals of fixedly deployed Bluetooth Beacon devices to implement the clock-in and clock-out function, which allows multiple mobile phones to scan the same Beacon device at the same time. Among Bluetooth connection applications, more are point-to-point. In office scenarios, clocking in and out are concentrated at the same time.

[4] Bluetooth Low Energy (BLE) beacons have become a valuable technology for adding location tracking capabilities and with the right planning and configuration, BLE beacons can provide accurate indoor and outdoor location. This allows organizations to cost-effectively add location tracking of personnel and assets whilst reducing the total cost of ownership.
[5] BLE beacons can be extended to provide easy access to marketing campaigns especially in malls where multiple brands host their products. Loyalty programs in retail are usually linked to mobiles phone numbers and customers are usually asked to provide them, thus putting customer personal information at risk. In some other solutions loyalty programs are linked to a magnetic strip swipe card with a unique id that is mapped to the customer profile.

[6] A patent application AU2016100467A4 discloses a system and method by which a mobile phone can communicate with Bluetooth Low Energy (BLE) devices in end-to-end safety management. An application provides automated check-in/check-out function, automated display of safety messages, automated data collection, ability to trigger a duress SMS, ability to monitor status of remote personnel and email via BLE hardware. The invention operates by way of an 'App' on a mobile phone.

[7] Another patent application US2015072618A1 discloses systems and methods for checking-in many users into a location using a Bluetooth® low energy (BLE) beacon. The provided systems and methods may allow a BLE beacon to facilitate a check-in with a remote server that processes check-ins and then disconnect from the device used to check-in. The device may be assigned a unique identifier that may be broadcast from the device during the check in so that the BLE beacon can quickly scan for the identifier and connect with the device based on the identifier to provide content and other information to the device.

[8] Another patent application KR20150135632A discloses a system and a method for managing a store by using an indoor positioning based service based on a Bluetooth low energy (BLE) beacon. A customer who approaches a store is induced to install and operate an advertisement, a coupon, or an application by using a smart terminal of the customer in which the BLE is mounted, and a beacon based on BLE, to provide product information of the store. The system for managing a store by using an indoor positioning based service based on a BLE beacon comprises: a customer terminal which receives and displays questions for installation or execution of contents or an application through a beacon signal based on BLE, and receives and displays selection, order, and payment process of products in a store, transmission of order information, progress state information about the order information, and order completion alarm information through an application in accordance with agree of a customer; a beacon transmitter which transmits each beacon signal for providing an indoor positioning based service based on BLE; and a store managing server which registers, manages, and inquires beacon mapping information, receives and stores order information including histories of selection, order, and payment of products performed in the customer terminal, displays a progress state of a POS terminal in a store for the order information, and receives, updates, and stores change of the progress state display information and order completion alarm information. Accordingly, it is possible to immediately perform a process from order to payment through a smart terminal.

[9] Another patent application US2016063476A1 discloses a Bluetooth low energy mobile payments system may comprise a BLE beacon that is deployed at a merchant location. The BLE beacon may be associated with a specific merchant terminal. The BLE beacon may be configured to broadcast a unique beacon ID that is detectable by a user device. The user device may be configured to communicate the beacon ID to a payment system. In response to receiving the beacon ID, the user device may initiate a payment between a user and a merchant, via a user device and a merchant terminal.

[10] Another patent application US2018211457A1 discloses Systems and methods for location-based automated authentication are disclosed. A system comprises a mobile device, a sensor and a backend platform. The sensor and the backend platform are in network communication. The mobile device is operable to continuously transmit Bluetooth Low Energy (BLE) signals comprising encrypted transitory identifiers. The sensor is operable to receive a BLE signal from the mobile device when the mobile device is within a predetermined range and communicate over a network connection the encrypted transitory identifier comprised in the BLE signal to the backend platform. The backend platform is operable to extract a unique identifier and a changing encrypted identifier from the received encrypted transitory identifier, generate a changing encrypted identifier, and validate a user identification by comparing the generated changing encrypted identifier and the extracted changing encrypted identifier.

[11] Although the existing equipment in the cited prior art has their own advantages in terms of performance, still there is a need for a system that can allow non-intrusive user check-in by enabling encryption of all customer data and decryption of selective customer activity data to ensure privacy of sensitive data related to customer.

Summary of the invention
[12] The following presents a simplified summary of the disclosure in order to provide a basic understanding to the reader. This summary is not an extensive overview of the disclosure, and it does not identify key/critical elements of the invention or delineate the scope of the invention. Its sole purpose is to present some concepts disclosed herein in a simplified form as a prelude to the more detailed description that is presented later.

[13] It is an object of the present invention to provide a non-intrusive privacy secure user check-in and rewards system based on Bluetooth Low Energy (BLE).

[14] It is yet another object to provide a non-intrusive user check-in where encryption is employed on the customer data after acquiring the unique identification from the customer device when it is scanned through the BLE beacon.

[15] It is yet another object to provide a non-intrusive user check-in where selective decryption is employed on the customer activity data and such specific user activity data is fetched from the server.

[16] It is yet another object of the non-intrusive user check-in to implement contextual data mapping on the user activity data.

[17] In accordance with the present invention, the system comprises one or more Bluetooth Low Energy (BLE) display beacons (DB); one or more Bluetooth Low Energy (BLE) standalone beacons (SB), server connected to the display beacon DB. Further the server is connected with smart device of the user through the running application that can scan any Bluetooth Low Energy (BLE) beacons.

[18] A display beacon (DB) has a display and uses Bluetooth Low Energy (BLE), advertises a unique id and connects with server through WIFI. This can be a portable or fixed device. A Standalone beacon (SB) uses Bluetooth Low Energy (BLE) and advertises a unique id. This can be a portable or fixed device. The server stores the user data, DB and SB identification codes. The server performs encryption on the user data and selective decryption on the user activity data. User information is secured in the server under multiple encryption layers and the user data is detached from the user activity data.

[19] In accordance with the present system, when a user enters a store (indoor space) the application that is active on the smart device of the user, scans for nearby beacons. When the smart device is in the range of a Standalone beacon SB (with no display means), an encrypted signal with the beacon data is communicated to the server from user mobile, and this determines the user check-in within the beacon region. This information of the check-in is used to create a user activity record on the server in a different memory location other than the user data.

[20] In another scenario If the user smart device is in the range of a display beacon, an encrypted signal with beacon data (beacon id + Received Signal Strength Indicator (RSSI)) is sent to the server creating a user check-in. Further, in case of a Display Beacon, depending on the store/business where it is installed, user data is decrypted, and only essential user activity (such as last visit, last order) are fetched and displayed on such display beacon so that the store personnel can assist the user with purchase or any other information.

[21] In accordance with the present system, when a user installs and registers the application on the smart device that supports scanning of any Bluetooth Low Energy (BLE) beacons, the user data i.e., name, email, phone number, are encrypted and stored in the secure server. The Encrypted user data can be decrypted and accessed by the user through device application on the user’s smart device. The encrypted user data can be decrypted and accessed by the Display Beacon when a user check-in occurs. Here beacon id, check-in time, store information, RSSI among others are used as dynamic decryption keys. Depending on the dynamic decryption key only specific user activity data is fetched from the server and displayed on such display beacon. In this process a decryption key is always dynamically changing depending on the beacon device, store data, time of check-in and RSSI which can give information on how close the user is to the beacon.

Brief description of the drawings
[22] These features and advantages of the present disclosure may be appreciated by reviewing the following description of the present disclosure, along with the accompanying figures wherein like reference numerals refer to like parts. Various embodiments will hereinafter be described in accordance with the appended drawings, which are provided to illustrate, not limit, the scope, wherein similar designations denote similar elements, and in which:

[23] Fig 1 depicts the schematic representation of the present system in an indoor space.

[24] Fig 2 depicts schematically a display beacon setup in accordance with the present invention.

[25] Fig 3 depicts schematically a standalone beacon setup in accordance with the present invention.

[26] Fig 4 depicts system architecture in accordance with one of the embodiments of the present system.

[27] Fig 5 depicts the process flow of the present user check-in system.

[28] The accompanying drawings illustrate the embodiments of systems, methods, and other aspects of the disclosure. Any person with ordinary skills in the art will appreciate that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent an example of the boundaries. In some examples, one element may be designed as multiple elements, or multiple elements may be designed as one element. In some examples, an element shown as an internal component of one element may be implemented as an external component in another and vice versa. Furthermore, the elements may not be drawn to scale.

Description of the invention
[29] The present disclosure is best understood with reference to the detailed figures and description set forth herein. Various embodiments have been discussed with reference to the figures. However, those skilled in the art will readily appreciate that the detailed descriptions provided herein with respect to the figures are merely for explanatory purposes, as the methods and systems may extend beyond the described embodiments. As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context dictates otherwise.

[30] References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a particular feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment” does not necessarily refer to the same embodiment.

[31] Methods of the present invention may be implemented by performing or completing manually, automatically, or a combination thereof, selected steps or tasks. The term “method” refers to manners, means, techniques and procedures for accomplishing a given task including, but not limited to, those manners, means, techniques, and procedures either known to, or readily developed from known manners, means, techniques and procedures by practitioners of the art to which the invention belongs. The descriptions, examples, methods, and materials presented in the claims and the specification are not to be construed as limiting but rather as illustrative only. Those skilled in the art will envision many other possible variations within the scope of the technology described herein.

[32] The present invention is related to a non-intrusive privacy secure user check-in system based on Bluetooth Low Energy (BLE). Encryption is employed on the customer data after acquiring the unique identification from the customer device when it is scanned through the BLE beacon. Selective decryption is employed on the customer activity data and such specific user activity data is fetched from the server.

[33] In accordance with the preferred embodiment, the system (Fig 1) comprises one or more Bluetooth Low Energy (BLE) display beacons (DB) 104; one or more Bluetooth Low Energy (BLE) standalone beacons (SB) 102, server 103 connected to the display beacon DB 104. Further the server 103 is connected with smart device 101 of the user through the running application that can scan any Bluetooth Low Energy (BLE) beacons (102, 104).

[34] In accordance with the preferred embodiment, the display beacon (DB) 104 has a display and uses Bluetooth Low Energy (BLE), advertises a unique code, and connects with server 103 through WIFI. This can be a portable or fixed device. A Standalone beacon (SB) 102 uses Bluetooth Low Energy (BLE) and advertises a unique id. This can be a portable or fixed device. The server 103 stores the user data, DB and SB identification codes. The server 103 performs encryption on the user data and selective decryption on the user activity data. User information is secured in server 103 under multiple encryption layers and the user data is detached (stored separately) from the user activity data.

[35] In accordance with one of the embodiments, the Display Beacon (DB) 104 and Standalone Beacon (SB) 102 are powered by BLE, they transmit a unique code to identify its location inside an indoor space (like business organization, malls, hospitals). When a user enters such indoor space, the user can use the smart device 101 which is having a running application to scan for these BLE devices (102, 104) and upon discovery of one of them an encrypted signal with information such as device identifier, store identifier, Received Signal Strength Indicator (RSSI) and user key is sent to the server 103. On the server, depending upon the check-in information, if it is from a Standalone Beacon 102, user activity is updated on the server (Fig 2) and if the check-in device is a Display Beacon 104 (Fig 3) apart from user activity being checked in, decrypted essential user activity information is fetched from the server 103 based on Type of decryption key used and the encrypted data received from the smart device 101 and displayed on the Display Beacon 104.

[36] In an exemplary embodiment, if the beacon id, is given as decryption key, then the historical data that is saved on the server, that is having the beacon id as the common keyword, data is fetched, and contextual keyword mapping is employed to filter the user activity data with respect to such beacon id and such data is decrypted and displayed on the display beacon.

[37] In another exemplary embodiment, if check-in time is given as a decryption key, then the user activity pertaining to such specific user check-in time is displayed on the display beacon. If store information is given as the decryption key, then all the user activity related to that particular store that is previously stored in the server is fetched and this data can comprise user activity near multiple standalone beacons, and contextual mapping is employed to extract the user data in simplified form and such relevant user activity is displayed on the display beacon. Further, the displayed data can comprise previously bought products, user most preferred brands, or frequently bought items, if garments are bought the size of such garments, shoe size etc. Such displayed data can aid the store employee to direct the user through any promotional events that can benefit the user.

[38] In accordance with the one of the embodiments, the server 103 performs contextual data mapping on the available user activity data logs and categorizes the user activity data according to type of activity. For example: if the user activity is recorded for doctor consultation, the date of last visit is fetched from the server, which will aid the hospital staff to check the records and guide the user through the next process. If suppose the user activity is related to shopping, then the server will fetch the history logs of shopping, which might contain the user preferences which are recorded based on the identified standalone beacons that are employed near such brand or department of the retail store. Based on the display beacon detected by the smart device, the server will decrypt the relevant user activity log and displays such user activity data only on the display beacon.

[39] In an exemplary embodiment (Fig 4) in case a user entering a cloth store equipped with both Standalone Beacons (202a, 202b, 202c) and Display Beacon (204), that interact with mobile devices (201a, 201b, 201c, 201d) and sends the data to the server 203. The check-in data from Standalone Beacons (202a, 202b, 202c) is updated as an user activity on the server 203, and the check-ins logs from a Display Beacon (204) at the billing counter may fetch user name and user fittings sizes based on user’s previous activity for the sales person to introduce and disburse personalized offers, similarly for check-ins from Display Beacon (204) at a particular section of the store may omit user name and just show user fittings sizes or highlight store offerings based on user’s previous activities.

[40] In accordance with the present system, when a user installs and registers the application on the smart device that supports scanning (301) of any Bluetooth Low Energy (BLE) beacons, the user data i.e., name, email, phone number, are encrypted and stored in the secure server (302). When the standalone beacons is scanned by the smart device only the user check-in is recorded as user activity data on the server (303). The Encrypted user data can be decrypted and accessed by the user through device application on the user’s smart device. The encrypted user data can be decrypted and accessed by the Display Beacon (304) when a user check-in occurs. Here beacon id, check-in time, store information, RSSI among others are used as dynamic decryption keys. Depending on the dynamic decryption key only such specific user activity data is fetched from the server and displayed on such display beacon (305). In this process a decryption key is always dynamically changing depending on the beacon device, store data, time of check-in and RSSI which can give information on how close the user is to the beacon.

[41] In accordance with the present invention, the system ensures that the customers privacy is maintained throughout the transaction and aids the businesses to gain customer trust and loyalty. Also, businesses can design hyper-personalized ads for their customers. The current system and method are very cost effective and can be installed in a few mins. The current system and method can be very easily integrated with existing systems used by businesses.

[42] Features described as separate implementations may be implemented, in combination, in a single implementation, while features described as a single implementation may be implemented in multiple implementations, separately, or in any suitable sub-combination. Operations or processes or methods described and claimed in a particular order should not be understood as requiring that the particular order, nor that all illustrated operations must be performed (some operations can be optional). As appropriate, multitasking or parallel-processing (or a combination of multitasking and parallel-processing) can be performed.

[43] No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.

[44] It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the scope of the invention. There is no intention to limit the invention to the specific form or forms enclosed. On the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the scope of the invention, as defined in the appended claims. Thus, it is intended that the present invention cover the modifications and variations of this invention, provided they are within the scope of the appended claims and their equivalents.
, Claims:I/We claim:

1. A non-intrusive user check-in system comprises:
a. one or more Bluetooth Low Energy (BLE) display beacons (DB) 104;
b. one or more Bluetooth Low Energy (BLE) standalone beacons (SB) 102; and
c. a server 103 connected to the display beacon DB 104, and with a smart device 101 of the user through a running application that can scan Bluetooth Low Energy (BLE) beacons (102, 104),
wherein when the smart device 101 scans the beacons (102, 104) an encrypted signal with information such as device identifier, store identifier, Received Signal Strength Indicator (RSSI) and user key is sent to the server 103.

2. The non-intrusive user check-in system as claimed in claim 1, wherein the server 103 stores the user data, display beacon (DB) and standalone beacons (SB) identification codes.

3. The non-intrusive user check-in system as claimed in claim 1, wherein the server 103 performs encryption on the user data and selective decryption on the user activity data.

4. The non-intrusive user check-in system as claimed in claim 1, wherein the user data is secured in server 103 under multiple encryption layers and the user data is stored separately from the user activity data.

5. The non-intrusive user check-in system as claimed in claim 1, wherein when the smart device 101 scans the Bluetooth Low Energy (BLE) standalone beacons (SB) 102 the user check-in is updated as user activity on the server 103.

6. The non-intrusive user check-in system as claimed in claim 1, wherein when the smart device 101 scans the Display Beacon 104 the user check-in is updated as user activity on the server 103 and decrypted essential user activity information is fetched from the server 103 based on the encrypted data received from the smart device 101 and displayed on the Display Beacon 104.

7. The non-intrusive user check-in system as claimed in claim 1, wherein beacon id, check-in time, store information, RSSI are used as dynamic decryption keys.

8. The non-intrusive user check-in system as claimed in claim 1, wherein specific user activity data is fetched from the server (103) and displayed on such display beacon (104) depending on the dynamic decryption key.

9. The non-intrusive user check-in system as claimed in claim 1, wherein the server 103 performs contextual data mapping on the available user activity data logs and categorizes the user activity data according to type of activity.

Documents

Application Documents

# Name Date
1 202441040897-STATEMENT OF UNDERTAKING (FORM 3) [27-05-2024(online)].pdf 2024-05-27
2 202441040897-FORM-9 [27-05-2024(online)].pdf 2024-05-27
3 202441040897-FORM-26 [27-05-2024(online)].pdf 2024-05-27
4 202441040897-FORM FOR STARTUP [27-05-2024(online)].pdf 2024-05-27
5 202441040897-FORM FOR SMALL ENTITY(FORM-28) [27-05-2024(online)].pdf 2024-05-27
6 202441040897-FORM 1 [27-05-2024(online)].pdf 2024-05-27
7 202441040897-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [27-05-2024(online)].pdf 2024-05-27
8 202441040897-EVIDENCE FOR REGISTRATION UNDER SSI [27-05-2024(online)].pdf 2024-05-27
9 202441040897-ENDORSEMENT BY INVENTORS [27-05-2024(online)].pdf 2024-05-27
10 202441040897-DRAWINGS [27-05-2024(online)].pdf 2024-05-27
11 202441040897-COMPLETE SPECIFICATION [27-05-2024(online)].pdf 2024-05-27
12 202441040897-FORM 18 [05-06-2024(online)].pdf 2024-06-05