Sign In to Follow Application
View All Documents & Correspondence

A System For Facilitating Real Time Detection And Notification Of Abuse In Children

Abstract: ABSTRACT TITLE: A SYSTEM FOR FACILITATING REAL TIME DETECTION AND NOTIFICATION OF ABUSE IN CHILDREN The present invention discloses a system (100) for facilitating real time detection and notification of abuse in children in schools. The system (100) comprising, a wearable device (200), having an identification unit (202) equipped with a unique identity details of each user, a plurality of sensors (204) configured to detect abusive touch and communicate to the identification unit (202), a tracking unit (206) configured to trace location of the user undergoing abuse, an alerting unit (208) coupled with the identification unit (202) and the tracking unit (206) for generating signals to notify authorities of the abuse, a plurality of gateway bridges (104), configured to transmit alert signals generated from the alerting unit (208) to a central server (106), which communicates with the authorized person through a display unit (108) and communicates through a user interface (110) and a data management device (112) to receive real time accountability of the user. {Figure 1 and 2}

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
08 July 2022
Publication Number
02/2024
Publication Type
INA
Invention Field
BIO-MEDICAL ENGINEERING
Status
Email
Parent Application

Applicants

Parchai Software Private Limited
21, Princep Street 3rd Floor, Kolkata – 700072, West Bengal, India

Inventors

1. Vijay Pugalia
Clubtown Riverdale, Block-1, Flat-2A, 2 Guru Charan Roychowdhury Ghat Road, Haora (M.Corp), Howrah, Kolkata – 711102, West Bengal, India
2. Rhine Bandyopadhyay
101/1/1A Tollygunje Road, Kalighat, Kolkata – 700026, West Bengal, India
3. Ankit Kumar Bajaj
Drs Building, 80 Garden Reach Road. Near Hooghly Jute mill, South Eastern Railway S.O., Kolkata – 700043, West Bengal, India

Specification

DESC:A SYSTEM FOR FACILITATING REAL TIME DETECTION AND NOTIFICATION OF ABUSE IN CHILDREN

FIELD OF THE INVENTION
[001] The present disclosure relates to a system for facilitating real time detection and notification of abuse in children, particularly in schools by generating alert signal and notifying the authorities of the same to take action. More particularly, the present disclosure relates to the system incorporating a wearable device that may be embedded in a buckle of a belt in a uniform, where the wearable device is capable of detecting and notifying sexual abuse in children.

BACKGROUND OF THE INVENTION

[002] Schools ‘rarely report’ child sexual abuse to avoid stigma. According to the National Crime Record Bureau, 109 children in India face some form of child sexual abuse every day. The same records show a sharp rise in crimes against children on a year to year basis. Unlike most other crimes, heinous crimes against children are often reported less. This is primarily because even if the child confides in someone, the facts are often covered under the fear of family reputation and social stigma. Child abuse is a violation of the basic human rights of a child. One such breeding ground of child abuse is schools, where child abuse has seen a steady rise, may be during breaks or during daily commutes.

[003] The challenge hence is to protect the school children and give them the power to proactively defend themselves from such atrocities. Schools and other educational institutes have been able to cater to this problem to some extent, using technologies like CCTV cameras and use of RFID based attendance system in some places have also started. But these technologies have their shortcomings. CCTV cameras, for example, cannot be installed at all places like gyms, washrooms, swimming pools, locker rooms etc. Additionally, it is humanely impossible to monitor a fleet of cameras at all times. This, at best, may provide evidential information, once a mishap has occurred. It cannot provide a proactive solution and generate an ‘SOS’ alert instantly.

[004] Similarly, for RFID based solutions, such systems may only provide information of entry and exit through a gate. They do not give real-time information about the whereabouts of a student. Another problem is the limited range of RFID based systems which is usually around 1-3 meters.

[005] The emerging trend in the technology horizon is to leverage Bluetooth enabled BLE based beacon systems to solve the problem. Beacons in the form of tags or identity (ID) cards are provided to students. There are Bluetooth sniffers placed at strategical positions, which help the system to track the whereabouts of the students or react to rulesets that may be defined by the institutes. However, there exists a major issue in such a solution. Identity (ID) cards may easily be taken off from the wearer, or even one student’s card may be swapped with another student’s. This cannot, thus, provide a solution, that might put the school administration at ease. Thus, a system is required that may provide proactive solution and generate an alarm instantly to avoid any mishap.

PRIOR ART OF THE INVENTION
[006] There are some systems known in the art to track location of an individual through wireless connections. These are discussed herein below:

[007] US9788167B2 titled “Bluetooth low energy location system and method” relates to a BLE location system and method. The BLE system may provide accurate location of a BLE enabled object in a three dimensional space. The three dimensional space may be a building and the BLE system and method permits accurate location at a room, bay, and bed level in the three dimensional space to be determined. In some embodiments, the BLE system may determine if a BLE enabled object crosses a boundary and the boundary may be, for example, a boundary to a room, such as a door, a boundary to a space, such as a hallway or meeting area, or a boundary to a particular location identified by set of coordinates (X, Y or X, Y, Z for example). The determination of the boundary crossing of the BLE enabled object or the location of the BLE enabled object may be used for staff and patient locating and their associated workflows as well as high accuracy asset tracking in a hospital embodiment.

[008] WO2018208045A2 titled “BLE beacon-based entry and exit management system and method” relates to a BLE beacon-based entry and exit management system and method, wherein a building and a facility, in a security area, and a port are provided with an IoT-based beacon tag, attached to a pass of a visitor, and beacon APs installed in multiple areas and capable of sensing the beacon tag, the beacon tag attached to the pass only and unilaterally transmits a device ID (a tag ID) and an RSSI value in a predetermined cycle, and the beacon APs recognize the device ID (the tag ID) and the RSSI value of the beacon tag and transmit same and GPS location information of the beacon APs to an entry and exit management system. Herein, an entry and exit management using the beacon tag attached to the pass; entry and exit security management, by means of an RTLS server, for tracking the location of the beacon tag attached to the pass, monitoring the travel route thereof, displaying same on a GIS map, positioning and tracking information and the location of the beacon tag of the visitor on the basis of information on the location of the building and the facility of the security area and a port container terminal and monitoring the travel route, thereby managing the movement route of the visitor carrying the pass having the beacon tag attached thereto is provided, and management for a tangible asset and a hazardous material which have the location-based beacon tag attached thereto.

[009] US20150324181 titled “Smart wearable devices and system therefor” relates to a novel system and devices for remote control of wearable computers. In one embodiment the remote control is incorporated in a piece clothing or jewellery, for example a ring, a bracelet, a watch. In another embodiment, it is part of a user's mobile device. The system comprises hardware, accompanied by software running on two or more devices, and allowing for device interoperability over a wireless connection, e.g., Bluetooth. The invention further comprises novel software systems which improve usability of remote control devices disclosed herein and in other patent documents. The invention also presents solutions for combining software and device markets which are continuously introducing new products and more complex software systems.

[0010] KR20180033478 titled “Beacon device including switch and method for providing service using the same” relates to a Bluetooth low energy (BLE)-based beacon device includes a wireless transmitter, a memory device for storing the ID of the BLE-based beacon device, a switch, and a control circuit which senses the depression of the switch, changes the state of the BLE-based beacon device from an idle state to a wake up state based on a result of sensing, determines whether a predetermined time passes, and changes the state of the BLE-based beacon device from the wakeup state to the idle state after the predetermined time passes. The control circuit transmits the ID stored in the memory device to the wireless transmitter only during the wakeup state. It is possible to reduce power consumption.

[0011] The prior art describes the use of BLE beacon technology to achieve entrance and exit management and methods related to remote control of wearable computers. However, there are no such systems or devices which is employed to protect children from abuse in schools and notify the authorities of the same.

OBJECTS OF THE INVENTION

[0012] Some of the objects of the present disclosure, which at least one embodiment herein satisfy, are listed herein below.

[0013] It is an object of the present subject matter to overcome the aforementioned and other drawbacks existing in the prior art systems and methods.

[0014] It is a significant object of the present subject matter to provide a system that is able to protect children from sexual abuse in school.

[0015] It is a principal object of the present subject matter to provide the system incorporating a wearable device that is capable of being embedded in school uniform of a user.

[0016] It is another object of the present invention to provide the system incorporating the wearable device that is power efficient in nature.

[0017] It is still another object of the present invention to provide the system incorporating the wearable device that is capable of generating alarms and notifications for awareness.

[0018] It is yet another object of the present subject matter to provide the system incorporating the wearable device that is enabled with memory and tracking facilities.

[0019] It is yet another object of the present subject matter to provide the system incorporating the wearable device that is durable in nature.

[0020] It is another object of the present subject matter to propose the system incorporating the wearable device that is simple to design and easy to implement.

[0021] It is even another object of the present subject matter to provide the system incorporating the wearable device that is cost effective in nature.

[0022] These and other objects and advantages of the present subject matter will be apparent to a person skilled in the art after consideration of the following detailed description taking into consideration with accompanied drawings in which preferred embodiments of the present subject matter are illustrated.

SUMMARY OF THE INVENTION

[0023] This summary is related to a wearable device incorporated in a system to facilitate real time detection and notification of abuse in school going children. The system is further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.

[0024] According to an embodiment of the present invention, there is provided a system for facilitating real time detection and notification of abuse in children in schools. The system comprising, a wearable device, wherein the wearable device is having an identification unit equipped with a unique identity details of each user, a plurality of sensors configured to detect sensation of abusive touch and communicate the same to the identification unit, a tracking unit configured to trace location of an user undergoing abuse after receiving inputs from the identification unit, an alerting unit coupled with the identification unit and the tracking unit, wherein the alerting unit generates warning/SOS signals to notify authorities of the abuse, a plurality of gateway bridges, configured to transmit alert signals generated from the alerting unit of the wearable device to a central server, through a plurality of wireless units, wherein the central server communicates with the authorities/next of kin of the abused user by displaying the warning/SOS signal in a display unit and communicating through a user interface, and a data management device, configured to receive real time accountability of the user from the wearable device and transmit to the central server.

[0025] In an aspect, in the system, the wearable device is configured to send repetitive signals to the central server after a predefined interval of time to ensure the central server for detection of location of the user.

[0026] In an aspect, in the system, the wearable device is embedded in a belt buckle of the user.

[0027] In an aspect, in the system, the wearable device is used continuously for a duration ranging from 1.5 - 2 years, without requirement to change a battery.

[0028] In an aspect, in the system, the wearable device is housed inside a casing, the casing being water proof and dust proof in nature.

[0029] In an aspect, in the system, the wearable device is provided with a snap and a well-hidden screw technique to facilitate embedding with the belt buckle.

[0030] In an aspect, in the system, the alerting unit of the wearable device is a Bluetooth beacon which is able to send notification and alarming signals within a short span of 10-15 seconds.

[0031] In an aspect, in the system, the alerting unit generates the warning/SOS signals in form of sirens in order to alert the authorities of the probable abuse.

[0032] In an aspect, in the system, the plurality of gateway bridges transmits the warning/SOS signals through a plurality of wireless units, and wherein the plurality of wireless units (102) comprises a Bluetooth signal sniffer, which is powered by 4.5-5.5 V DC or 48V PoE.

[0033] In an aspect, the system is implemented to detect and notify abuse of the user in places other than schools.

[0034] In an aspect, there is further provided a method for facilitating real time detection and notification of abuse in children in schools using a system, the method comprising, identifying the abuse in user by an identification unit present in a wearable device, generating a warning/SOS signal by an alerting unit present in the wearable device, transmitting the warning/SOS signal to a central server through a plurality of gateway bridges, detecting location of the user facing abuse by a tracking unit present in the wearable device and communicating by the central server about abuse to authorities/next of kin of the user through a display unit/user interface.

[0035] To further understand the characteristics and technical contents of the present subject matter, a description relating thereto will be made with reference to the accompanying drawings. However, the drawings are illustrative only but not used to limit the scope of the present subject matter.

[0036] Various objects, features, aspects, and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.

BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWING(S)

[0037] It is to be noted, however, that the appended drawings illustrate only typical embodiments of the present subject matter and are therefore not to be considered for limiting of its scope, for the invention may admit to other equally effective embodiments. The detailed description outlines with reference to the accompanying figures. In the figures, a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the figures to reference like features and components. Some embodiments of system or methods or structure in accordance with embodiments of the present subject matter is now described, by way of example, and with reference to the accompanying figures, in which

[0038] Figure 1 illustrates an exemplary system incorporating a wearable device in accordance with an exemplary embodiment of the present disclosure;

[0039] Figure 2 illustrates an exemplary components of the wearable device in accordance with an exemplary embodiment of the present disclosure;

[0040] Figure 3 (a-c) depicts different perspective views of a belt buckle of a school uniform of children in accordance with an embodiment of the present disclosure; and

[0041] Figure 4 depicts an exemplary working mechanism of the system in accordance with an exemplary embodiment of the present disclosure.

[0042] The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.

DETAILED DESCRIPTION OF INVENTION WITH REFERENCE TO THE DRAWINGS OF THE PREFERRED EMBODIMENTS

[0043] The following is a detailed description of embodiments of the disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to panel all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.

[0044] While the embodiments of the disclosure are subject to various modifications and alternative forms, specific embodiment thereof have been shown by way of example in the figures and will be described below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to panel all modifications, equivalents, and alternative falling within the scope of the disclosure.

[0045] The terms “comprises”, “comprising”, or any other variations thereof used in the disclosure, are intended to panel a non-exclusive inclusion, such that a device, system, assembly that comprises a list of components does not include only those components but may include other components not expressly listed or inherent to such system, or assembly, or device. In other words, one or more elements in a system or device proceeded by “comprises… a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or device.

[0046] The present disclosure relates to a system for facilitating real time detection and notification of abuse in children in school by generating alert signal. The system is incorporated with a wearable device which is a part of uniform that a child has to wear to the school. As a result, it almost negates the possibility of a child swapping the belt with someone else for proxy or in times of a mishap, such as, the possibility of an attacker removing the belt forcibly.

[0047] Figure 1 illustrates an exemplary system (100) in accordance with an exemplary embodiment of the present disclosure.

[0048] In an aspect, the system (100) comprises, the wearable device (200) configured with various components for providing information of a user in case of mishap to the person authorized and is embedded in a belt of a school uniform of the user. The system (100) further comprises a plurality of gateway bridges (104), incorporating the plurality of wireless units (102).

[0049] In an aspect, the plurality of gateway bridges (104) are positioned in a monitoring zone to obtain alert signals generated from the wearable device (200). The monitoring zone may be school, or any other premises wherever the present system (100) is able to operate suitably.

[0050] In an aspect, the system (100) further comprises of a central server (106) which is capable of transmitting the information to a user interface (110) and/or to a display unit (108) after receiving data from the plurality of gateway bridges (104). Therefore, in this manner, the information of abuse gets communicated to the authorities or next of kin such that necessary actions may be taken.

[0051] In an aspect, the plurality of gateway bridges (104) are strategically positioned in a zone, and are monitored, ensuring maximum coverage by eliminating void.

[0052] In an aspect, the plurality of wireless units (102) is installed in the plurality of gateway bridges (104). The plurality of wireless units (102) may comprise either a short range unit or a long range unit.

[0053] In a preferred embodiment, the plurality of wireless units (102) comprises a Bluetooth signal sniffer which is powered by 4.5V to 5V DC power supply or 48V PoE, and requires an active internet connection.

[0054] In an aspect, the Bluetooth signal sniffers ranges up to 75 meter to 90 meters, preferably 80 meters.

[0055] In an aspect, as the plurality of wireless units (102) having the Bluetooth sniffer are installed at various locations of the school premises to detect any unusual activity of each user from time to time by generating warning signal in case of emergency.

[0056] In an aspect, the plurality of gateway bridges (104) may range from 3 to 5. Herein, the central server (106) tracks the location, pertaining to location violation, generation of alerting signals, or atmospheric condition etc.

[0057] In an aspect, the user interface (110) helps in increasing productivity and maintaining a safe and secure environment inside the school premises, by providing information from the moment children enter the school bus to the time when they reach home.

[0058] In an aspect, the system (100) is also equipped with a data management device (112) capable of providing a digital registration, check-in and check-out streamlined process for visitors. Herein, the data management device (112) contains information related to real time accountability, historical data of visitor and time limits for visitors within the premises.

[0059] In an aspect, the display unit (108) after receiving information from the central server (106), is capable of providing information to the authorities regarding the area where the abuse is taking place so that the authorities can take quick actions in order to resolve the same.

[0060] Figure 2 depicts different components of the wearable device (200) in accordance with an exemplary embodiment of the present disclosure. In an aspect, the wearable device (200) may be embedded in a belt buckle of children’s uniform or any other dress material and is equipped with hardware components which exchanges the information to a processor (212) through an interface (214) as shown in Figure 2. Herein, the alerting signals generated by the wearable device (200) is transmitted to the plurality of gateway bridges (104).

[0061] Further, there is provided a power supply unit (210) for delivering power to the wearable device (200), a processor (212) for processing the data received from a plurality of sensors (204).

[0062] The interface(s) (214) may include a variety of interfaces, for example, interfaces for data input and output device/s referred to as I/O devices, interfaces for communication device, storage devices, user interfaces and the like. The interface(s) (214) may facilitate communication of the system (100) with various devices coupled to the system (100). The interface(s) (214) may also provide a communication pathway for one or more components of the system (100). Examples of such components include, but are not limited to, processing device(s) and data storage. The interface(s) (214) may additionally allow an interactive communication between the visitor and the system (100) so that the system (100) may fetch additional information depending upon interests of the visitor.

[0063] The processing devices(s) may be implemented as a combination of hardware and programming device(s) (for example, programmable instructions) to implement one or more functionalities of the processing device(s). In examples described herein, such combinations of hardware and programming may be implemented in several different ways. In one example, the programming for the processing device(s) may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing device(s) may include a processing resource (for example, one or more processors), to execute such instructions. In other examples, the processing devices(s) may be implemented by electronic circuitry.

[0064] In an aspect, the wearable device (200) is configured to send repetitive signals to the central server (106) after a predefined interval of time to enable the central server (106) for detection of location of the user.

[0065] In an aspect, the wearable device (200) is embedded with a memory (214) to store information of the wearable device (200)

[0066] In an aspect, the wearable device (200) is equipped with an identification unit (202), the plurality of sensors (204), a tracking unit (206) and an alerting unit (208).

[0067] In an aspect, the identification unit (202) of the wearable device (200) is equipped with a unique identity based on a distinctive information of the user, which helps in accessing location for each user.

[0068] In an aspect, the plurality of sensors (204) are configured for detecting sensation of abusive touch and this information is being communicated to the identification unit (202).

[0069] The tracking unit (206) after receiving inputs from the identification unit (202) determines location of abuse of the user and send the real time signals to the alerting unit (208).

[0070] In an aspect, the alerting unit (208), on receiving inputs from the identification unit (202) and the tracking unit (206) generates warning/SOS signals to notify authorities of the abuse. The warning/SOS signals can be in the form of a low intensity alarm or a high intensity siren as required.

[0071] In an aspect, the plurality of sensors (204) ranges from 2 to 4.

[0072] In an aspect, the wearable device (200) is embedded with a data storage device (216) for storing data in an internal cache at time of network failure.

[0073] In an aspect, the power supply unit (210) may be in form of a battery.

[0074] In an aspect, the wearable device (200) may be used for a duration of 1.5 - 2 years, without requirement to change the battery. Since a layer of external dependence is being removed from the context, it immediately increases the success rate of the solution.

[0075] In an aspect, the wearable device (200) is housed within a water-proof and a dust-proof casing. Moreover, a snap is implemented and a well-hidden screw technique is used, ensuring the wearable device (200) to withstand a fair amount of wear and tear as well as resist tampering to a maximum. This increases durability of the wearable device (200) which seems to be one of the major requirement for enabling its use by the children.

[0076] In an aspect, the alerting unit (208) of the wearable device (200) is a Bluetooth beacon which is able to send notification and alarming signals, and consumes low power. Herein, the Bluetooth beacon receives power through the power supply unit (210) embedded in the wearable device (200).

[0077] In an aspect, the wearable device (200) is able to send notification and alarming signals within a short span of 10-15 seconds through the Bluetooth beacon.

[0078] In an aspect, the wearable device (200) embedded in the belt buckle is IP65 and IP67 certified.

[0079] In an aspect, the wearable device (200) transmits Bluetooth signal every 450-550 ms, preferably 500 ms.

[0080] Figure 3 (a-c) depicts different perspective views of the belt buckle embedded with the wearable device (200) in accordance with an exemplary embodiment of the present disclosure. In an aspect, the dimension of the belt buckle is in cm.

Working of the invention
[0081] Working of the system (100) is illustrated in reference to Figure 4.

[0082] Figure 4 illustrates an exemplary method (400) implemented to operate the system (100) proposed in the present disclosure. The order in which the method (400) is described is not intended to be construed as a limitation, and any number of the described method blocks may be combined in any order to implement the method (400), or an alternative method. Furthermore, method (400) may be implemented by processing device(s) or computing device(s) through any suitable hardware.

[0083] In an aspect, the below method is used for sending repetitive signals by the wearable device (200) to the central server (106) after a predefined interval of time in order to enable the central server (106) to determine location of the user of the wearable device (200).

[0084] At block (402), the method includes, identifying the abuse in user by the identification unit (202) present in the wearable device (200).
[0085] In an aspect, the plurality of sensors (204) configured in the identification unit (202) helps in detection of abusive touch.

[0086] At block (404), the method includes, generating a warning/SOS signal by the alerting unit (208) present in the wearable device (200).
[0087] In an aspect, the alerting unit (208) placed in the wearable device (200) generates signal after detection of abusive touch.

[0088] At block (406), the method includes, transmitting the warning/SOS signal to the central server (106) through the plurality of gateway bridges (104).
[0089] In an aspect, the Bluetooth beacon embedded in the wearable device (200) transmits signal which are received by the Bluetooth signal sniffer embedded in the plurality of wireless units (102) of the plurality of gateway bridges (104), which are further transmitted to the central server (106).
[0090] In an aspect, the plurality of gateway bridges (104) addresses data to the central server (106) at an interval of 3-7 seconds, employing a suitable format.
[0091] In an aspect, in case of network failure, the data storage device (216) embedded in the wearable device (200) stores the data in the internal cache and when the network is back again, the data is available on the central server (106).

[0092] At block (408), the method includes, detecting location of the user facing abuse by the tracking unit (206) present in the wearable device (200).
[0093] In an aspect, the tracking unit (206) embedded in the wearable device (200) helps in tracking location of the wearable device (200).

[0094] At block (410), the method includes, communicating by the central server (106) about abuse to authorities/next of kin of the user through the display unit (108) and the user interface (110).
[0095] In an aspect, the notification and tracking position of the wearable device (200) is made available through the user interface (110) and the display unit (108).

Example
[0096] In an aspect, the wearable device (200) may generate alerts in case of mishap and the durations and locations may be configured by the admin of the organization based on the requirement.
[0097] Some examples are provided related to working of the wearable device (200).

Case 1: If any individual physically harasses a child or the child faces any abusive touch:

[0098] In an aspect, in case of an emergency, or when the child is feeling unsafe due to the presence of an unknown person or otherwise, the plurality of sensors (204) provided in the identification unit (202) of the wearable device (200) detects an abusive touch and generates a warning signal by the alerting unit (208) present in the wearable device (200).
[0099] Thereinafter, the generated warning signal is transmitted to the central server (106) through the plurality of gateway bridges (104) with the help of the plurality of wireless units (102). These signals are further transmitted to the central server (106).
[00100] Herein, the tracking unit (206) present in the wearable device (200) detects real time location of the user facing abuse and provides notification through the user interface (110) and the display unit (108) to authorities/next of kin of the user.

[00101] In an aspect, the system (100) may be implemented to facilitate real time detection and notification in situations other than abusive touch, which are described herein.

Case 2: If a male user is loitering near the female washroom for more than 5 minutes:

[00102] In an aspect, the plurality of wireless units (102) installed at washrooms provide status of an unauthorized user of the wearable device (200). The information from the identification unit (202) about the location of the male user is detected.
[00103] Thereinafter, a warning signal is generated, which is transmitted to the central server (106) through the plurality of gateway bridges (104) with the help of the Bluetooth beacon embedded in the wearable device (200). The Bluetooth beacons transmit signal that are received by the Bluetooth signal sniffer embedded in the plurality of wireless units (102) of the plurality of gateway bridges (104). These signals are further transmitted to the central server (106).
[00104] Herein, the tracking unit (206) present in the wearable device (200) detects the location of the male user loitering near the female washroom for more than 5 minutes and provides notification through the user interface (110) and the display unit (108) to authorities/next of kin of the user.

Case 3: If a student has not come out from the washroom for more than 10-15 minutes:
[00105] In an aspect, as the wearable device (200) is configured to send repetitive signals to the central server (106) after a predefined interval of time to enable the central server (106) for detection of location of the user. Thus, the identification unit (202) of the wearable device (200) detects the location of the user who has not come out from the washroom for more than 10-15 minutes and generates a warning signal by the alerting unit (208) present in the wearable device (200).
[00106] Thereinafter, the generated warning signal is transmitted to the central server (106) through the plurality of gateway bridges (104) through the help of beacon embedded in the wearable device (200). The beacons transmit signal that are received by the Bluetooth signal sniffer embedded in the plurality of wireless units (102) of the plurality of gateway bridges (104). These signals are further transmitted to the central server (106).
[00107] Herein, the tracking unit (206) present in the wearable device (200) detects the location of the user and provides notification through the user interface (110) and the display unit (108) to authorities/next of kin of the user.

Case 4: If a student of class 1 is found inside a laboratory for more than 5 minutes:
[00108] In an aspect, as the wearable device (200) is configured to send repetitive signals to the central server (106) after a predefined interval of time to enable the central server (106) for detection of location of the user. Thus, the identification unit (202) of the wearable device (200) detects the location and if any unauthorized user is detected inside the laboratory for more than 5 minutes, it generates a warning signal by the alerting unit (208) present in the wearable device (200).
[00109] Thereinafter, the generated warning signal is transmitted to the central server (106) through the plurality of gateway bridges (104) through the help of the Bluetooth beacon embedded in the wearable device (200). The Bluetooth beacons transmit signal that are received by the Bluetooth signal sniffer embedded in the plurality of wireless units (102) of the plurality of gateway bridges (104). These signals are further transmitted to the central server (106).
[00110] Herein, the tracking unit (206) present in the wearable device (200) detects the location of the user and provides notification through the user interface (110) and the display unit (108) to authorities/next of kin of the user.

[00111] In an aspect, the wearable device (200) may also be configured to restrict monitoring for specific period of time, and may also be used to send alerts to different people via different mediums like SMS, email, Push Notifications, Web socket based notifications, HTTP hooks for integration with Telegram, WhatsApp, Slack or other communication / ERP systems etc.

Advantages of the invention
[00112] The present system (100) described in the present disclosure is having the following advantages:
a) The fundamental advantage of the system (100) is the ability to track users 24x7.
b) The present system (100) is used for sending alarms and notify authorities and parents.
c) The present system (100) displays a real-time status.
d) The present system (100) is cost effective.
e) The present system (100) is durable and has efficient power.
f) The present system (100) is simple in design and is easy to implement.

It should be noted that the description and figures merely illustrate the principles of the present subject matter. It should be appreciated by those skilled in the art that conception and specific embodiment disclosed may be readily utilized as a basis for modifying or designing other structures for carrying out the same purposes of the present subject matter. It should also be appreciated by those skilled in the art that by devising various systems that, although not explicitly described or shown herein, embody the principles of the present subject matter and are included within its spirit and scope. Furthermore, all examples recited herein are principally intended expressly to be for pedagogical purposes to aid the reader in understanding the principles of the present subject matter and the concepts contributed by the inventor(s) to furthering the art and are to be construed as being without limitation to such specifically recited examples and conditions. The novel features which are believed to be characteristic of the present subject matter, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures.

Although embodiments for the present subject matter have been described in language specific to package features, it is to be understood that the present subject matter is not necessarily limited to the specific features described. Rather, the specific features and methods are disclosed as embodiments for the present subject matter. Numerous modifications and adaptations of the system/device of the present invention will be apparent to those skilled in the art, and thus it is intended by the appended claims to panel all such modifications and adaptations which fall within the scope of the present subject matter.

It will be understood by those within the art that, in general, terms used herein, and especially in the appended claims (e.g., bodies of the appended claims) are generally intended as “open” terms (e.g., the term “including” should be interpreted as “including but not limited to,” the term “having” should be interpreted as “having at least,” the term “includes” should be interpreted as “includes but is not limited to,” etc.). It will be further understood by those within the art that if a specific number of an introduced claim recitation is intended, such an intent will be explicitly recited in the claim, and in the absence of such recitation no such intent is present. For example, as an aid to understanding, the following appended claims may contain usage of the introductory phrases “at least one” and “one or more” to introduce claim recitations. However, the use of such phrases should not be construed to imply that the introduction of a claim recitation by the indefinite articles “a” or “an” limits any particular claim containing such introduced claim recitation to inventions containing only one such recitation, even when the same claim includes the introductory phrases “one or more” or “at least one” and indefinite articles such as “a” or “an” (e.g., “a” and/or “an” should typically be interpreted to mean “at least one” or “one or more”); the same holds true for the use of definite articles used to introduce claim recitations. In addition, even if a specific number of an introduced claim recitation is explicitly recited, those skilled in the art will recognize that such recitation should typically be interpreted to mean at least the recited number (e.g., the bare recitation of “two recitations,” without other modifiers, typically means at least two recitations, or two or more recitations). Furthermore, in those instances where a convention analogous to “at least one of A, B, and C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, and C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.).

In those instances, where a convention analogous to “at least one of A, B, or C, etc.” is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., “a system having at least one of A, B, or C” would include but not be limited to systems that have A alone, B alone, C alone, A and B together, A and C together, B and C together, and/or A, B, and C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase “A or B” will be understood to include the possibilities of “A” or “B” or “A and B.”

It will be further appreciated that functions or structures of a plurality of components or steps may be combined into a single component or step, or the functions or structures of one-step or component may be split among plural steps or components. The present invention contemplates all of these combinations. Unless stated otherwise, dimensions and geometries of the various structures depicted herein are not intended to be restrictive of the invention, and other dimensions or geometries are possible. In addition, while a feature of the present invention may have been described in the context of only one of the illustrated embodiments, such feature may be combined with one or more other features of other embodiments, for any given application. It will also be appreciated from the above that the fabrication of the unique structures herein and the operation thereof also constitute methods in accordance with the present invention. The present invention also encompasses intermediate and end products resulting from the practice of the methods herein. The use of “comprising” or “including” also contemplates embodiments that “consist essentially of” or “consist of” the recited feature.

,CLAIMS:We Claim:
1. A system (100) for facilitating real time detection and notification of abuse in children in schools, the system (100) comprising:
? a wearable device (200), wherein the wearable device (200) is having
an identification unit (202) equipped with a unique identity details of each user,
a plurality of sensors (204) configured to detect sensation of abusive touch and communicate same to the identification unit (202),
a tracking unit (206) configured to trace location of the user undergoing abuse after receiving inputs from the identification unit (202),
an alerting unit (208) coupled with the identification unit (202) and the tracking unit (206), wherein the alerting unit (208) generates warning/SOS signals to notify authorities of the abuse;
? a plurality of gateway bridges (104), configured to transmit alert signals generated from the alerting unit (208) of the wearable device (200) to a central server (106), through a plurality of wireless units (102),
wherein the central server (106) communicates with the authorities/next of kin of the abused user by displaying the warning/SOS signal in a display unit (108) and communicating through a user interface (110); and
? a data management device (112), configured to receive real time accountability of the user from the wearable device (200) and transmit it to the central server (106).

2. The system (100) as claimed in claim 1, wherein the wearable device (200) is configured to send repetitive signals to the central server (106) after a predefined interval of time to enable the central server (106) for detection of location of the user and wherein the wearable device (200) is embedded in a belt buckle of the user.

3. The system (100) as claimed in claim 1, wherein the wearable device (200) is used continuously for a duration ranging from 1.5 - 2 years, without requirement to change a battery.

4. The system (100) as claimed in claim 1, wherein the wearable device (200) is housed inside a casing, the casing being water proof and dust proof in nature.

5. The system (100) as claimed in claim 2, wherein the wearable device (200) is provided with a snap and a well-hidden screw technique to facilitate embedding with the belt buckle.
6. The system (100) as claimed in claim 1, wherein the alerting unit (208) of the wearable device (200) is a Bluetooth beacon which is able to send notification and alarming signals within a short span of 10 seconds and wherein the alerting unit (208) generates the warning/SOS signals in form of sirens in order to alert the authorities of the probable abuse.

7. The system (100) as claimed in claim 1, wherein the plurality of gateway bridges (104) transmit the warning/SOS signals through the plurality of wireless units (102), and wherein the plurality of wireless units (102) comprises a Bluetooth signal sniffer, which is powered by 4.5-5.5 V DC or 48V PoE.

8. The system (100) as claimed in claim 1, wherein the system (100) is implemented to detect and notify abuse of the user in places other than schools.

9. A method for facilitating real time detection and notification of abuse in children in schools using a system (100), the method comprising:
- identifying abuse of the user by an identification unit (202) present in a wearable device (200);
- generating a warning/SOS signal by an alerting unit (208) present in the wearable device (200);
- transmitting the warning/SOS signal to a central server (106) through a plurality of gateway bridges (104);
- detecting location of the user facing abuse by a tracking unit (206) present in the wearable device (200); and
- communicating by the central server (106) about abuse to authorities/next of kin of the user through a display unit (108)/user interface (110).

10. The method as claimed in claim 11, wherein the method includes sending repetitive signals by the wearable device (200) to the central server (106) after a predefined interval of time in order to enable the central server (106) to determine location of the user of the wearable device (200).

Dated this on 8th day of July, 2022


SONAL MISHRA
PATENT AGENT
IN/PA – 3929
OF L. S. DAVAR & CO.,
APPLICANT’S AGENT

Documents

Application Documents

# Name Date
1 202231039354-STATEMENT OF UNDERTAKING (FORM 3) [08-07-2022(online)].pdf 2022-07-08
2 202231039354-PROVISIONAL SPECIFICATION [08-07-2022(online)].pdf 2022-07-08
3 202231039354-FORM FOR STARTUP [08-07-2022(online)].pdf 2022-07-08
4 202231039354-FORM FOR SMALL ENTITY(FORM-28) [08-07-2022(online)].pdf 2022-07-08
5 202231039354-FORM 1 [08-07-2022(online)].pdf 2022-07-08
6 202231039354-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [08-07-2022(online)].pdf 2022-07-08
7 202231039354-DRAWINGS [08-07-2022(online)].pdf 2022-07-08
8 202231039354-DECLARATION OF INVENTORSHIP (FORM 5) [08-07-2022(online)].pdf 2022-07-08
9 202231039354-Proof of Right [27-07-2022(online)].pdf 2022-07-27
10 202231039354-FORM-26 [27-07-2022(online)].pdf 2022-07-27
11 202231039354-DRAWING [11-01-2023(online)].pdf 2023-01-11
12 202231039354-CORRESPONDENCE-OTHERS [11-01-2023(online)].pdf 2023-01-11
13 202231039354-COMPLETE SPECIFICATION [11-01-2023(online)].pdf 2023-01-11