Sign In to Follow Application
View All Documents & Correspondence

A System For Crime Prevention And A Method Thereof

Abstract: ABSTRACT A SYSTEM AND METHOD FOR CRIME PREVENTION The present disclosure relates to a system and method for crime prevention and women safety. The system (100) comprises an input module (106), login module (108), a repository (110), a safety module (112), and a notification module (114). The safety module (112) configured to cooperate with the repository (110) and the input module (108) to generate a virtual fence of at least one safety zone of the pre-defined radius around the pre-determined GPS coordinates of the member based on the inputs by the caretaker, and further configured to generate an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table and the notification module (114) configured to cooperate with the safety module (112) to generate and transmit at least one notification to the caretaker and the authorities based on the first lookup table upon receiving the overlap signal.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 May 2019
Publication Number
49/2020
Publication Type
INA
Invention Field
ELECTRICAL
Status
Email
dewan@rkdewanmail.com
Parent Application

Applicants

SUNMORIBUS INNOVATION LLP
72, Sector 31, Near Radha Krishna Mandir, Gurugram– 122001, Haryana, India

Inventors

1. Siddharth
72, Sector 31, Near Radha Krishna Mandir, Gurugram – 122001, Haryana, India

Specification

FIELD
The present disclosure relates to a system and method for crime prevention and public safety.

BACKGROUND
The background information herein below relates to the present disclosure but is not necessarily prior art.
The background information herein below relates to the present disclosure but is not necessarily prior art.
Any form of crime towards any member of community leaves the victim in a state of fear and depression. Especially the crimes that include physical assault, such as rape, acid attacks, molestation, abduction, etc.,leave sufferings that last forever on a victim’s psyche. It is estimated that almost 670 women in India have been sexually harassed daily and much worsethe actual number of cases is expected to be much higher.
Currently for crime prevention and management, citizens of countries are dependent on24x7 police patrolling or surveillance. Police patrolling teams are active in different local regions of a city, where some teams do surveillance rounds and some stay available in dedicated booths. However, offenders usually are aware of these facts and they manage to commit crime and somehow escape easily.
A common trend seen in different regions is that though people are willing to help but they do not get timely information of a crime happening in their vicinity. A major problem in crime prevention is that help does not reach victims in time.Even after having facilities available and strong laws against crimes, especially, crime against women, cases against women are steadily increasing.
Therefore, there is a long felt need to provide a system that effectively helps prevention of crime and enables safety of victim in a timely manner.
OBJECTS
Some of the objects of the present disclosure, which at least one embodiment herein satisfies, are as follows:
It is an object of the present disclosure to ameliorate one or more problems of the prior art or to at least provide a useful alternative.
An object of the present disclosure is to provide a system and/or a method that effectively helps prevention of crime, especially crime against women.
Another object of the present disclosure is to provide a system and/or a method using which a victim of crime can timely make nearby people aware of any possible mishap or about threat to one’s life or body or belongings.
Still another object of the present disclosure is to provide a system and/or a method thatidentifies people in the vicinity who may prove helpful to a person in danger or a victim of some crime.
Yet another object of the present disclosure is to provide a systemand/or a method that enables various groupsof people interested in helping a victim take timely preventive action.
An object of the present disclosure is to provide a system and/or a method that automatically detects emergency situation and generates alerts for local crime prevention/medical and other related authorities in the vicinity.
Other objects and advantages of the present disclosure will be more apparent from the following description, which is not intended to limit the scope of the present disclosure.
SUMMARY
The present disclosure envisages a system for crime prevention comprising an application installable in user devices of users.
The system comprises an input module, login module, a repository, a safety module, and a notification module.
The input module is configured to facilitate the users to provide inputs.

In an embodiment the input can be selected from a group consisting of an image, a video and an audio.

The login module is configured to cooperate with the input module to register each of the users to facilitate the users to login to the system as at least one of a caretaker and a member.

The login module includes a registration module and an authentication module. The registration module is configured to cooperate with the input module to receive registration details, and is further configured to register the user to the system by storing the registration details in the repository and The authentication module is configured to verify the registered users based on the registration details stored on the repository, and is further configured to facilitate the authenticated users to login to the system.

The repository is configured to store pre-determined GPS coordinates of the member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of the corresponding authorities and a second lookup table having a list of the caretaker and user device ID of corresponding the member and the caretaker.

The safety module is configured to cooperate with the repository and the input module to generate a virtual fence of at least one safety zone of the pre-defined radius around the pre-determined GPS coordinates of the member based on the inputs by the caretaker, and is further configured to generate an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table.

The safety module includes a geo fencing module and a monitor module.

The geo fencing module is configured to generate the safety zones for the member based on the pre-defined radius around, the pre-determined GPS coordinates of the member and the inputs by the caretaker. The monitor module is configured to cooperate with the geo fencing module to monitor the overlapping of the member’s real time GPS coordinates, received from a GPS module of the member’s user device, and is further configured to generate the overlap signal once overlapped.

The notification module is configured to cooperate with the safety module to generate and transmit at least one notification to the caretaker and the authorities based on the first lookup table upon receiving the overlap signal.

The input module, the login module, the safety module and the notification module are implemented using one or more processor(s).

In an embodiment the system includes a distress module configured to provide the inputs from the member to the caretaker as a precaution or feeling unsafe to prevent crime.

In another embodiment the system includes an analytics module configured to implement big data analytics in analysis of historical events pre-stored in the repository, and is further configured to generate patterns of crimes and geospatial mapping of changes in the patterns.

The present disclosure discloses a method for crime prevention. The steps include:
• installation an application in a user device;
• facilitating, by an input module, the user to provide inputs;
• registering, by a login module, each of the users to facilitate the users to login to the system as at least one of a caretaker and a member;
• storing, by a repository, a pre-determined GPS coordinates of the member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of the corresponding authorities and a second lookup table having a list of the caretaker and user device ID of corresponding the member and the caretaker;
• generating, by a safety module, a virtual fence of at least one safety zone of the pre-defined radius around the pre-determined GPS coordinates of the member based on the inputs by the caretaker;
• generating, by the safety module, an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table; and
• generating and transmitting, by a notification module, at least one notification to the caretaker and the authorities based on the first lookup table upon receiving the overlap signal.
BRIEF DESCRIPTION OF ACCOMPANYING DRAWING
A system and method for crime prevention, of the present disclosure will now be described with the help of the accompanying drawing, in which:
Figure 1 illustrates a block diagram of a system for crime prevention comprising an application installable in a user device; and
Figures 2a and 2b illustrates a flow diagram depicting steps involved in a method for crime prevention.

LIST OF REFERENCE NUMERALS USED IN DETAILED DESCRIPTION AND DRAWING
100 System
102 Application
104 User Devices
106 Input Module
108 Login Module
110 Repository
112 Safety Module
114 Notification Module
116 Registration Module
118 Authentication Module
120 Geo Fencing Module
122 Monitor Module
124 Distress Module
126 Analytics Module
DETAILED DESCRIPTION
Embodiments, of the present disclosure, will now be described with reference to the accompanying drawing.
Embodiments are provided so as to thoroughly and fully convey the scope of the present disclosure to the person skilled in the art. Numerous details are set forth, relating to specific components, and methods, to provide a complete understanding of embodiments of the present disclosure. It will be apparent to the person skilled in the art that the details provided in the embodiments should not be construed to limit the scope of the present disclosure. In some embodiments, well-known processes, well-known apparatus structures, and well-known techniques are not described in detail.
The terminology used, in the present disclosure, is only for the purpose of explaining a particular embodiment and such terminology shall not be considered to limit the scope of the present disclosure. As used in the present disclosure, the forms "a,” "an," and "the" may be intended to include the plural forms as well, unless the context clearly suggests otherwise. The terms "comprises," "comprising," “including,” and “having,” are open ended transitional phrases and therefore specify the presence of stated features, elements, modules, units and/or components, but do not forbid the presence or addition of one or more other features, elements, components, and/or groups thereof.
A system and method for crime prevention, is now being described with reference to Figure 1 till Figure 2b.
Referring to Figure 1, a system (100) for crime prevention comprises an application installable in a user device (hereinafter referred as “system”).
The system comprises an input module (106), login module (108), a repository (110), a safety module (112), and a notification module (114).
The input module (106) is configured to facilitate the users to provide inputs.

In an embodiment the input can be selected from a group consisting of an image, a video and an audio.

In an embodiment, the input can be viewed by authorities in near real time to find out the best fit solution to safeguard the user. Authorities can use such information for post analysis and detection of the crime scenarios. Also, the application (102) has various auxiliary services like chatting service with different authorities during emergency situations.

In an embodiment, the authorities can be selected from the group consisting of police, hospital, NGO and municipal authorities.

The login module (108) is configured to cooperate with the input module (106) to register each of the users to facilitate the users to login to the system (100) as at least one of a caretaker and a member.

The login module (108) includes a registration module (116) and an authentication module (118). The registration module (116) is configured to cooperate with the input module (106) to receive registration details, and is further configured to register the user to the system (100) by storing the registration details in the repository (110) and the authentication module (118) is configured to verify the registered users based on the registration details stored on the repository (110), and is further configured to facilitate the authenticated users to login to the system (100).

The repository (110) is configured to store pre-determined GPS coordinates of the member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of the corresponding authorities and a second lookup table having a list of the caretaker and user device ID of corresponding the member and the caretaker.

The safety module (112) is configured to cooperate with the repository (110) and the input module (108) to generate a virtual fence of at least one safety zone of the pre-defined radius around the pre-determined GPS coordinates of the member based on the inputs by the caretaker, and is further configured to generate an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table.

The safety module (112) includes a geo fencing module (120) and a monitor module (122).

The geo fencing module (120) is configured to generate the safety zones for the member based on the pre-defined radius around, the pre-determined GPS coordinates of the member and the inputs by the caretaker. The monitor module (122) is configured to cooperate with the geo fencing module (120) to monitor the overlapping of the member’s real time GPS coordinates, received from a GPS module of the member’s user device, and further configured to generate the overlap signal once overlapped.

The notification module (114) is configured to cooperate with the safety module (112) to generate and transmit at least one notification to the caretaker and the authorities based on the first lookup table upon receiving the overlap signal.

The input module (106), the login module (108), the safety module (112) and the notification module (114) are implemented using one or more processor(s).

In an embodiment, the system (100) includes a distress module (124) configured to provide the inputs from the member to the caretaker as a precaution or feeling unsafe to prevent crime.

In another embodiment, the system (100) includes an analytics module (126) is configured to implement big data analytics in analysis of historical events pre-stored in the repository (110), and is further configured to generate patterns of crimes and geospatial mapping of changes in the patterns.

In yet another embodiment, the application (102) helps in analysis of all the historical events and generate patterns of crimes and geospatial mapping of changes in the crime patterns. Further, the application (102) helps in Identification of leakages in safeguarding citizens and supporting the authorities by providing the trend analysis over crime scenarios in country. Also, it can trigger a state of art surveillance system using reactive unmanned flying object which can initiate surveying the area where emergency event is triggered.

The processors disclosed herein may be general-purpose processors, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), and/or the like. The processors may be configured to retrieve data from and/or write data to a memory/repository. The memory/repository can be for example, a random access memory (RAM), a memory buffer, a hard drive, a database, an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), a read only memory (ROM), a flash memory, a hard disk, a floppy disk, cloud storage, and/or so forth.

Figures 2a and 2b illustrates a flow diagram depicting steps involved in a method (200) for crime prevention. The steps include:
• Step 202: installation, an application (102) in a user device (104);
• Step 204: facilitating, by an input module (106), the user to provide inputs;
• Step 206: registering, by a login module (108), each of the users to facilitate the users to login to the system (100) as at least one of a caretaker and a member;
• Step 208: storing, by a repository (110), a pre-determined GPS coordinates of the member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of the corresponding authorities and a second lookup table having a list of the caretaker and user device ID of corresponding the member and the caretaker;
• Step 210: generating, by a safety module (112), a virtual fence of at least one safety zone of the pre-defined radius around the pre-determined GPS coordinates of the member based on the inputs by the caretaker;
• Step 212: generating, by the safety module (112), an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table; and
• Step 214: generating and transmitting, by a notification module (114), at least one notification to the caretaker and the authorities based on the first lookup table upon receiving the overlap signal.
The foregoing description of the embodiments has been provided for purposes of illustration and not intended to limit the scope of the present disclosure. Individual components of a particular embodiment are generally not limited to that particular embodiment, but, are interchangeable. Such variations are not to be regarded as a departure from the present disclosure, and all such modifications are considered to be within the scope of the present disclosure.
TECHNICAL ADVANCES AND ECONOMICAL SIGNIFICANCE
The present disclosure described herein above has several technical advantages including, but not limited to, the realization of a system and a method for crime prevention that:
• allows victim to broadcast message across various local groups for help;
• informs people who are willing to help on time;
• enables various groups interested in helping a victim to take timely preventive action; and
• automatically detects emergency situation and generates an alarm for local authorities.
One of the object of the Patent Law is to provide protection to new technologies in all fields and domain of technologies. The new technologies shall or may contribute in the country economy growth by way of involvement of new efficient and quality method or product manufacturing in India.
To provide the protection of new technologies by patenting the product or process will contribute significant for innovation development in the country. Further by granting patent the patentee can contribute in manufacturing the new product or new process of manufacturing by himself or by technology collaboration or through the licensing.
The applicant submits that the present disclosure will contribute in country economy, which is one of the purposes to enact the Patents Act, 1970. The product in accordance with present invention will be in great demand in country and worldwide due to novel technical features of a present invention is a technical advancement in the safety of womens by monitoring the geo-fencing data.The technology in accordance with present disclosure will provide product cheaper, saving in time of total process of manufacturing. The saving in production time will improve the productivity, and cost cutting of the product, which will directly contribute to economy of the country.
The product will contribute new concept in crime prevention wherein patented process/product will be used. The present disclosure will replace the whole concept of crime prevention being used in safety of women from decades .The product is developed in the national interest and will contribute to country economy.
The economy significance details requirement may be called during the examination. Only after filing of this Patent application, the applicant can work publically related to present disclosure product/process/method. The applicant will disclose all the details related to the economic significance contribution after the protection of invention.
The foregoing description of the specific embodiments so fully reveals the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein.
Throughout this specification the word “comprise”, or variations such as “comprises” or “comprising”, will be understood to imply the inclusion of a stated element, step, or group of elements, steps, but not the exclusion of any other element, step, or group of elements, or steps.
While considerable emphasis has been placed herein on the components and component parts of the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiment as well as other embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.
,CLAIMS:WE CLAIM:
1. A system (100) for crime prevention comprising an application (102) installable in user devices (104) of users, said application (102) comprising:
• an input module (106) configured to facilitate said users to provide inputs;
• a login module (108) configured to cooperate with said input module (106) to register each of said users to facilitate said users to login to said system (100) as at least one of a caretaker and a member;
• a repository (110) configured to store pre-determined GPS coordinates of said member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of said corresponding authorities and a second lookup table having a list of said caretaker and user device ID of corresponding said member and said caretaker;
• a safety module (112) configured to cooperate with said repository (110) and said input module (108) to generate a virtual fence of at least one safety zone of said pre-defined radius around said pre-determined GPS coordinates of said member based on said inputs by said caretaker, and further configured to generate an overlap signal when said virtual fence is overlapped by said member user device based on said second lookup table; and
• a notification module (114) configured to cooperate with said safety module (112) to generate and transmit at least one notification to said caretaker and said authorities based on said first lookup table upon receiving said overlap signal,
wherein said input module (106), said login module (108), said safety module (112) and said notification module (114) are implemented using one or more processor(s).

2. The system (100) as claimed in claim 1, wherein said login module (108) includes:
• a registration module (116) configured to cooperate with said input module (106) to receive registration details, and further configured to register said user to said system (100) by storing said registration details in said repository (110); and
• an authentication module (118) configured to verify said registered users based on said registration details stored on said repository (110), and further configured to facilitate said authenticated users to login to said system (100).
3. The system (100) as claimed in claim 1, wherein said safety module (112) includes:
• a geo fencing module (120) configured to generate said safety zones for said member based on said pre-defined radius around, said pre-determined GPS coordinates of said member and said inputs by said caretaker; and
• a monitor module (122) configured to cooperate with said geo fencing module (120) to monitor said overlapping of said member’s real time GPS coordinates, received from a GPS module of said member’s user device, and further configured to generate said overlap signal once overlapped.

4. The system (100) as claimed in claim 1, wherein said input can be selected from a group consisting of an image, a video and an audio.

5. The system (100) as claimed in claim 1 includes a distress module (124) configured to provide said inputs from said member to said caretaker as a precaution or feeling unsafe to prevent crime.

6. The system (100) as claimed in claim 1 includes an analytics module (126) configured to implement big data analytics in analysis of historical events pre-stored in said repository (110), and further configured to generate patterns of crimes and geospatial mapping of changes in said patterns.

7. A method (200) for crime prevention, said method (200) comprising:
• installation (202) an application (102) in a user device (104);
• facilitating (204), by an input module (106), said user to provide inputs;
• registering (206), by a login module (108), each of said users to facilitate said users to login to said system (100) as at least one of a caretaker and a member;
• storing (208), by a repository (110), a pre-determined GPS coordinates of said member, a pre-defined radius, a first lookup table having a list of authorities, contact numbers and addresses of said corresponding authorities and a second lookup table having a list of said caretaker and user device ID of corresponding said member and said caretaker;
• generating (210), by a safety module (112), a virtual fence of at least one safety zone of said pre-defined radius around said pre-determined GPS coordinates of said member based on said inputs by said caretaker;
• generating (212), by the safety module (112), an overlap signal when the virtual fence is overlapped by the member user device based on the second lookup table; and
• generating and transmitting (214), by a notification module (114), at least one notification to said caretaker and said authorities based on said first lookup table upon receiving said overlap signal.

Documents

Application Documents

# Name Date
1 201911021241-Proof of Right [13-07-2020(online)].pdf 2020-07-13
1 201911021241-STATEMENT OF UNDERTAKING (FORM 3) [29-05-2019(online)].pdf 2019-05-29
2 201911021241-PROVISIONAL SPECIFICATION [29-05-2019(online)].pdf 2019-05-29
2 201911021241-COMPLETE SPECIFICATION [26-05-2020(online)].pdf 2020-05-26
3 201911021241-PROOF OF RIGHT [29-05-2019(online)].pdf 2019-05-29
3 201911021241-DRAWING [26-05-2020(online)].pdf 2020-05-26
4 201911021241-POWER OF AUTHORITY [29-05-2019(online)].pdf 2019-05-29
4 201911021241-ENDORSEMENT BY INVENTORS [26-05-2020(online)].pdf 2020-05-26
5 abstract.jpg 2019-07-09
5 201911021241-FORM 1 [29-05-2019(online)].pdf 2019-05-29
6 201911021241-DRAWINGS [29-05-2019(online)].pdf 2019-05-29
6 201911021241-Correspondence-030619.pdf 2019-06-10
7 201911021241-OTHERS-030619.pdf 2019-06-10
7 201911021241-DECLARATION OF INVENTORSHIP (FORM 5) [29-05-2019(online)].pdf 2019-05-29
8 201911021241-Proof of Right (MANDATORY) [30-05-2019(online)].pdf 2019-05-30
9 201911021241-OTHERS-030619.pdf 2019-06-10
9 201911021241-DECLARATION OF INVENTORSHIP (FORM 5) [29-05-2019(online)].pdf 2019-05-29
10 201911021241-Correspondence-030619.pdf 2019-06-10
10 201911021241-DRAWINGS [29-05-2019(online)].pdf 2019-05-29
11 abstract.jpg 2019-07-09
11 201911021241-FORM 1 [29-05-2019(online)].pdf 2019-05-29
12 201911021241-POWER OF AUTHORITY [29-05-2019(online)].pdf 2019-05-29
12 201911021241-ENDORSEMENT BY INVENTORS [26-05-2020(online)].pdf 2020-05-26
13 201911021241-PROOF OF RIGHT [29-05-2019(online)].pdf 2019-05-29
13 201911021241-DRAWING [26-05-2020(online)].pdf 2020-05-26
14 201911021241-PROVISIONAL SPECIFICATION [29-05-2019(online)].pdf 2019-05-29
14 201911021241-COMPLETE SPECIFICATION [26-05-2020(online)].pdf 2020-05-26
15 201911021241-STATEMENT OF UNDERTAKING (FORM 3) [29-05-2019(online)].pdf 2019-05-29
15 201911021241-Proof of Right [13-07-2020(online)].pdf 2020-07-13