Abstract: The present invention relates to a communication system (200) and method (300) which allows a user to communicate with a plurality of devices over a network server. Accordingly, the present invention relates to a user preferred communication system wherein a user can selectively communicate with a predefined group of users and wherein the system comprises a web server (210), an application server (220) comprising a plurality of modules to transmit the received data, and a database server (290).
Claims:1. A user preferred communication system (200) comprising:
a web server (210);
a database server (290) for storing details of existing users, details of devices used by the existing users wherein, the devices are pre-categorized as primary devices (D1) and secondary devices (D2, D3, … Dn), and all data received from the primary devices (D1) and the secondary devices (D2, D3, … Dn); and
an application server (220) comprising:
a receiving module (230) configured to receive data from the primary device (D1) and a plurality of secondary devices (D2, D3, … Dn);
an authentication module (240) configured to recognize and authenticate a received data based on user data saved in an employee database (214), the authentication module (240) further configured to validate data initiated from the primary device (D1), and to further validate the data received from the secondary devices (D2, D3, … Dn), only if the data is generated as a response to the data initiated from the primary device (D1);
a rule module (250) coupled with the web server (210), configured to process and organize the data received from the primary device (D1) and the secondary devices (D2, D3, … Dn), after authentication by the authentication module (240), based on predetermined preferences selected by the user of the primary device (D1), and communicating the same to the web server (210) for presenting the organized data; and
a transmitting module (260) configured to transmit the data which has been authenticated by the authentication module (240), either to the primary device (D1) or the secondary devices (D2, D3, … Dn), based on the output of the rule module (250).
2. The system (200) as claimed in claim 1 comprises a profanity filter module (270) configured to review all communication between the primary device (D1) and the secondary devices (D2, D3, … Dn), and send communication to an administrator of the system in case any profanity is found in the communication between the primary device (D1) and the secondary devices (D2, D3, … Dn).
3. The system (200) as claimed in claim 1 comprises a log module (280) configured to store all logs of the users of the primary device (D1) and the secondary devices (D2, D3, … Dn) on the database server (290).
4. The system (200) as claimed in claim 1 comprises a storage server (212) configured to store all communication, data, employee logs etc.
5. The system (200) as claimed in claim 1 wherein, the primary device (D1) is at least one of a mobile phone, a computer, a personal digital assistant (PDA), a laptop or a Smartphone.
6. The system (200) as claimed in claim 1 wherein, the secondary devices (D2, D3, … Dn) are mobile phones, computers, personal digital assistants (PDAs), laptops or Smartphones or any combination thereof.
7. A method (300) for user preferred communication, the method (300) comprising:
receiving (301), data from a primary device (D1) and a plurality of secondary devices (D2, D3, … Dn), by a receiving module (230);
recognizing and authenticating (302) by an authentication module (240) and validating the data initiated by the primary device (D1) and further validating the data received from the secondary device (D2, D3, … Dn) only if the data is generated as a response to the data initiated by the primary device (D1);
processing and organizing (303), the data received from the primary device (D1) and the secondary devices (D2, D3, … Dn) after authentication, by a rule module (250), based on predetermined preferences selected by the user of the primary device (D1); and
transmitting (305), the authenticated data either to the primary device (D1) or the secondary devices (D2, D3, … Dn) by a transmitting module (260).
8. The method (300) as claimed in claim 7 comprises reviewing all communication, by a profanity module (270), between the primary device (D1) and the secondary devices (D2, D3, … Dn), and sending communication to an administrator of the system in case any profanity is found in the communication between the primary device (D1) and the secondary devices (D2, D3, … Dn).
9. The method (300) as claimed in claim 7 comprises storing all logs of the users of the primary device (D1) and the secondary devices (D2, D3, … Dn) on the database server (290), by a log module (290).
, Description:FIELD OF THE INVENTION
[001] The invention generally relates to the field of communication, more particularly it relates to a communication system and method which allows a user to communicate with a plurality of devices over a network.
BACKGROUND OF THE INVENTION
[002] It is well-known that many organizations have multiple levels of hierarchy. Although these hierarchies are meant to create an efficient work and task flow, the hierarchies also create a barrier in communication between the top level management and the lower level work force. Many a times, top level managers feel a need to directly convey a message to the lower level work force, like company updates, reviews of products, feedbacks, timeline updates etc. However, in the current scenario, if the top level management wishes to communicate with the lower level work force, then the only way they can do it is through a two-way communication.
[003] A two-way communication for e.g. an instant messaging service; comprises of a sender and a receiver. In order to function, these services require a suitable platform. This platform is provided by client-server architecture which is accessed over a desired network. Further, these services also require specific applications like messengers upon which messages can be read, typed and sent. These applications are stored on servers of the client-server architecture. Thus, senders and receivers need to access the specific applications which facilitate sending and receiving of messages over the desired network.
[004] Instant messaging allows senders and receivers to establish private chat sessions with each other through their respective devices. For instance, a first user of an instant messaging application can transmit text to a second user of the instant messaging application in real-time, and the second user can respond to the first user. Thus, through use of an instant messaging application, the first and second user can hold a real-time conversation. Further, users of instant messaging, often maintain multiple instant message conversations simultaneously. It is not unusual for users to have multiple instant message conversations ongoing at the same time. A user may converse both in individual and group contexts.
[005] In several organizations, there are instances wherein a chairman or a CEO of the organization would often have the need to connect to certain or several employees directly regardless of the hierarchy; in order to give them company updates, or get weekly reports or get their collective views over certain company policies. However, a direct (two-way) communication with an employee would also mean unsolicited opinions in the future by the employees. Further, this would also create an undesirable culture in the organization whereby employees would skip forums like human resource – especially made to address employee problems – and directly try to contact the chairman.
[006] Hence, there is a need in the art which solves at least the aforementioned problems and provides a communication system which allows a sender to effectively communicate with a plurality of receivers without the message being diluted or a need of facing unwanted opinions.
SUMMARY OF THE INVENTION
[007] Accordingly, the present invention in one aspect provides a user preferred communication system. The user preferred communication system comprises a web server configured for presentation of an output; a database server for storing details of existing users, details of devices used by the existing users wherein, the devices are pre-categorized as primary devices and secondary devices, and all data received from the primary devices and the secondary devices.
[008] The user preferred communication system further comprises an application server comprising a receiving module configured to receive data from the primary device and a plurality of secondary devices; an authentication module configured to recognize and authenticate a received data based on user data saved in an employee database, the authentication module further configured to validate data initiated from the primary device, and to further validate the data received from the secondary devices, only if the data is generated as a response to the data initiated from the primary device.
[009] The application server further comprises a rule module coupled with the web server, configured to process and organize the data received from the primary device and the secondary devices, after authentication by the authentication module, based on predetermined preferences selected by the user of the primary device, and communicating the same to the web server for presenting the organized data;
[010] The user preferred communication system further comprises a profanity filter module configured to review all communication between the primary device and the secondary devices and send communication to an administrator of the system in case any profanity is found in the communication between the primary device and the secondary devices.
[011] The user preferred communication system further comprises a log module configured to store all logs of the users of the primary device and the secondary devices on the database server. The system further comprises a storage server configured to store all communication, data, employee logs etc.
[012] The user preferred communication system wherein, the primary device and the secondary devices are at least one of a mobile phone, a computer, a personal digital assistant (PDA), a laptop or a Smartphone.
[013] The present invention in another aspect provides a method for user preferred communication comprising receiving data from a primary device and a plurality of secondary devices by a receiving module; recognizing and authenticating by an authentication module and validating the data initiated by the primary device and further validating the data received from the secondary device only if the data is generated as a response to the data initiated by the primary device; processing and organizing the data received from the primary device and the secondary devices after authentication by a rule module based on predetermined preferences selected by the user of the primary device and transmitting the authenticated data either to the primary device or the secondary devices by a transmitting module.
[014] The method further comprises reviewing all communication, by a profanity module, between the primary device and the secondary devices and sending communication to an administrator of the system in case any profanity is found in the communication between the primary device and the secondary devices.
[015] The method further comprises storing all logs of the users of the primary device and the secondary devices on the database server by a log module.
BRIEF DESCRIPTION OF THE DRAWINGS
[016] Reference will be made to embodiments of the invention, examples of which may be illustrated in accompanying figures. These figures are intended to be illustrative, not limiting. Although the invention is generally described in context of these embodiments, it should be understood that it is not intended to limit the scope of the invention to these particular embodiments.
Figure 1 shows the communication system in accordance with an embodiment of the invention.
Figure 2 shows the system in accordance with an embodiment of the invention.
Figure 3 shows a method for user preferred communication in accordance with an embodiment of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[017] The present invention relates to a communication system which allows a user to preferably communicate with a plurality of users. In this regard, the system facilitates a communication only when it has been initiated from a predefined user or a communication has been received as a response to the one initiated by the predefined user.
[018] The presently described embodiments will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. Moreover, flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems and methods according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
[019] Figure 1 describes the communication system in accordance with the present invention. The communication system has a primary device D1 as shown in the figure. The primary device includes, but is not limited to, a portable computer, a personal digital assistant, a handheld device, a smartphone and a workstation. The primary device is a device which belongs to a member of a senior level management of an organization. In a preferred embodiment, the primary device is a handheld mobile smartphone and belongs to the chairman / CEO of the organization.
[020] Further, as shown in figure 1, the communication system has a plurality of secondary devices (D2, D3, … Dn). The secondary devices include, but are not limited to, portable computers, personal digital assistants, handheld devices, smartphones, etc. In accordance with the present invention, the secondary devices belong to employees of the organization.
[021] The primary device and the secondary devices are communicatively connected to the system 200 through a network 102. The network 102 may be a wireless network, a wired network or a combination thereof. The network can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The network 102 may either be a dedicated network or a shared network. The shared network may represent an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network 102 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like. In a preferred embodiment, the primary device and the secondary devices are connected to the server over a wireless network.
[022] Figure 2 describes the system 200 in accordance with the present invention. The system 200 has a web server 210, an application server 220 comprising of a plurality of modules (explained hereinunder), a database server 290, an employee database server 214, and a storage server 212 as shown in the figure. The aforementioned servers may additionally comprise of at least one processor each which may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
[023] The plurality of modules includes routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types.
[024] In a preferred embodiment and as shown in figure 2, the system essentially comprises of a web layer A, an application layer B and a database layer C. The web layer A comprises of the web server 210. Accordingly, the way in which the output is shown/ presented to a user is configured on the web server 210. Further, the application layer B comprises of the application server 220 and the database layer C comprise of the database server 290.
[025] As shown in figure 2, in the application layer B, the application server 220 comprises of the plurality of modules. In the present embodiment, the modules are: a receiving module 230, an authentication module 240, a rule module 250, a transmitting module 260, a profanity filter module 270 and a log module 280.
[026] The system 200 of the present invention further has the employee database server 214. The employee database server 214 serves as a repository for storing details of existing users, details of devices used by the existing users wherein, the devices are categorized as primary device and secondary devices. Alternatively, a company can use its existing employee database as an employee database server.
[027] The database server 290 present in the application layer C has all the processed, received, and generated data by the plurality of modules. The database server 290 may include a system database, a quality metric database, a business metric database, a domain benchmark values database, and any other data which is generated as a result of execution of the modules.
[028] As stated hereinabove, the system 200 has the storage server 212. The storage server 212 is an external memory server which includes any computer-readable medium or computer program product known in the art including, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[029] As shown in figure 2, the receiving module 230 is configured to receive data from the primary device D1 and the plurality of the secondary devices (D2, D3 … Dn).
[030] Further, the application server 220 present in the application layer B, has an authentication module 240. The authentication module 240 is coupled with the employee database server 214. Accordingly, the authentication module 240 is configured to recognize and authenticate a received message based on user data saved in the employee database server 214. Thus, every employee is initially required to register their respective secondary devices (D2, D3 … Dn) over the employee database server 214. This is done by sending an OTP (One Time Password) over the employee’s registered email-id. The employee verifies the respective device by sending the OTP from his device to the employee database server 214. Accordingly, the respective secondary device is registered on the employee database server 214.
[031] The authentication module 240 is further configured to validate all data which has been initiated from the primary device D1. The authentication module 240 is also configured to validate data received from the secondary devices (D2, D3 … Dn), only if such data is generated as a response to the data initiated from the primary device D1. Further, in an embodiment of the invention, at any given instance, the users of the secondary devices i.e. the employees of the organization, cannot suo motu initiate a conversation with the user of the primary device i.e. the CEO or the chairman of the organization.
[032] The application server 220 present in the application layer B further has the rule module 250. The rule module 250 is configured to process and organize the data received by the primary device D1 and the secondary devices (D2, D3 … Dn) and which has been authenticated by the authentication module 240. In this regard, the rule module 250 thus organizes/ arranges/ structures/ classifies/ aligns the data as per the preferences defined by the user of primary device D1 – which in an embodiment of the invention is the chairman or the CEO of the organization. For example, when the chairman creates a poll, the authentication module 200 authenticates the data, since it has been received by the primary device D1 of the chairman; and the rule module 250 further arranges this data which is to be presented as a ‘poll’ and communicates the same to the web server 210.
[033] The application server 220 present in the application layer B further has a transmitting module 260. The transmitting module 260 is configured to transmit the authenticated data either to the primary device D1 or the secondary devices (D2, D3 … Dn). The data is transmitted in accordance with the output of the rule module 250. Thus, as per the aforementioned example, when the chairman creates a poll, the authentication module 240, authenticates the data received (since it has been received by the primary device); and the rule module 250 organizes the data received – in this case, a poll. The transmitting module 260 thus transmits the data to the primary devices (D2, D3 … Dn). In the same embodiment, when the poll is received by the employees on the secondary devices (D2, D3 … Dn), the employees can thereby respond to the poll. The response/ data is received from the secondary devices (D2, D3 … Dn) by the authentication module 240. In this case, since the data received by the authentication module 240 is a response to the message initiated by the primary device D1, the data is hence authenticated. Consequently, the transmitting module 260 transmits the authenticated response/ data received from the secondary devices (D2, D3 … Dn) to the primary device D1. Accordingly, the chairman can now view the views/ opinions of the employees on his device, i.e the primary device D1.
[034] Further, the application server 220 present in the application layer B has the profanity filter module 270. The profanity filter module 270 is configured to review all communication between the primary device D1 and the secondary devices (D2, D3 … Dn). The profanity filter module 270 is further configured to send communication to an administrator of the system in case any profanity/ abusive/ offensive language is found to be used/ sent in the communication between the primary device D1 and the secondary devices (D2, D3 … Dn). In a preferred embodiment, the communication sent to the administrator is in the form of an email.
[035] In another embodiment, the profanity module 270 is coupled with the authentication module 240. Accordingly, in case any profanity/ abusive/ offensive language is found to be used/ sent in the communication between the primary device D1 and the secondary devices (D2, D3 … Dn), the profanity module 270 is configured to detect the offensive language and communicate with the authentication module 240. Accordingly, such a message, even though originated from the correct devices, will not be authenticated to be sent.
[036] As discussed hereinabove, the administrator is the only person in the organization who can access the database server 290 and the employee database server 214 which includes employee details, stored communication, employee logs etc. and can view all the communication/ data sent and received between the primary device D1 and the secondary devices (D2, D3 … Dn). Once a communication from the profanity filter module 270 has been received by the administrator, the administrator can choose to either delete or alter the communication. Further, the administrator can add and delete users, and their respective devices registered on the database server 290 and can alter the aforementioned details as well.
[037] Further, the application server 220 present in the application layer B has the log module 290. The log module 290 is coupled with the database server 290 and is configured to store all logs of the users of the primary device D1 and the secondary devices (D2, D3 … Dn) on the database server 290. Accordingly, all the logs of the users of the primary device D1 and the secondary devices (D2, D3 … Dn) can be accessed and viewed by the administrator of the system 200.
[038] Further, all data/ messages/ employer and employee details and all other data are saved onto the storage server 212.
[039] In a preferred embodiment, the system is configured such that the chairman / CEO can view a summary of all messages sent, and received and all polls responses received from the secondary devices (D2, D3 … Dn) in the form of bar charts, pie charts, candlestick charts etc., for each poll as configured to be presented by the web server 210.
[040] Referring now to figure 3. Figure 3 shows a method 300 for the user preferred communication in accordance with an embodiment of the present invention. In a preferred embodiment, the method of the present invention begins at block 310 with receiving data either from the primary device D1 or from the plurality of secondary devices (D2, D3 … Dn). Accordingly, the receiving module 230 is configured to primarily receive data.
[041] Once the data is received, the application server 220 communicates with the authentication module 240 to further process the received data. The authentication module 240 is configured to recognize and authenticate the received data based on the user data stored in the employee database server 214. Thus, when the received data has been initiated from either the primary device D1 or the secondary devices (D2, D3 … Dn), the authentication module 240 shall validate only the data which has been initiated by the primary device D1. In a preferred embodiment, the primary device D1 belongs to a member of the senior management, more particularly, a chairman or a CEO. Accordingly, at block 320, such data shall be validated. Further, the authentication module 240 is configured to validate data from the secondary devices (D2, D3 … Dn), only if such data is received as a response to the data initiated by the primary device D1. In a preferred embodiment, the secondary devices (D2, D3 … Dn) belong to the employees of the organization.
[042] Once the data has been validated by the authentication module 240, the rule module 250 further processes the validated data. Accordingly, at block 303, the validated data is processed/ organized/ arranged/ structured/ classified/ aligned by the rule module 250 in accordance with the predetermined preferences selected by the user of the primary device D1.
[043] In an embodiment of the present invention, the chairman / CEO creates either a poll, or a specific organization update, or creates an RSVP for a scheduled meeting or any other such communication in a text or an image format etc. Once, the specific data from the chairman is received by the receiving module 230, and has been authenticated by the authentication module 240, then, at block 303, the rule module 250 applies the specific preference on the data and communicates with the web server 210 for the data to be presented in a particular way.
[044] The present method involves transmitting of the data at block 305. This is done once the data onto which the specific rule has been applied in accordance with the preference set by the user of the primary device D1. Once the data has been authenticated and a specific rule has been communicated, the transmitting module 260 sends the data to the particular secondary device/s (D2, D3 … Dn) or the primary device D1, based on the nature of the conversation.
[045] In an embodiment of the present invention, if at any instance, any of the users use abusive language or profanity in their communication, the same message would be either altered or deleted by the administrator of the system. In this regard, when an abusive message containing profanity is used, the profanity module 270 is configured to review the message and shall send a communication to the system administrator. In a preferred embodiment, the communication is in the form of an email. Thus, upon receipt of the email, the system administrator reviews the message and either alters it or deletes it. Thus making the entire communication a profanity proof system.
[046] Further, the profanity module 270 is coupled with the authentication module 240. Accordingly, in case any profanity/ abusive/ offensive language is found to be used/ sent in the communication between the primary device D1 and the secondary devices (D2, D3 … Dn), the profanity module 270 is configured to detect the offensive language and communicate with the authentication module 240. Accordingly, such a message, even though originated from the correct devices, will not be authenticated to be sent.
[047] In yet another embodiment, the method 300 further involves storing all logs of all the communication between the primary device D1 and the secondary devices (D2, D3 … Dn) on the database server 290. Thus, all and any activities of the users on the system, including log in and log out times of the users are stored on the database server 220.
[048] It must be noted that in event that the chairman / CEO creates a poll, the system is configured such that the chairman can view aggregated responses received from the secondary devices (D2, D3 … Dn) by way of bar charts, pie charts, candlestick charts etc., for each poll as configured to be presented by the web server 210.
[049] A preferred method to execute the present invention is described hereinbelow. As an example, a chairman of an organization creates a message intending to give a brief of a recent update in the organization to a specific group of employees. Accordingly, the chairman creates the group and on his device D1 and subsequently types the message and then sends the message.
[050] The message is received by the receiving module 230 in the layer B of the application server 220. The authentication module 240 communicates with the employee database server 214 and accordingly recognizes the device and validates the message. However, if the message contains any profanity, the message is not validated in spite of it being generated from the primary device D1. Since the device is registered as a primary device D1, the message is validated by the authentication module 240.
[051] Now that the message is validated, the rule module 250 to processes/ organizes/ arranges/ aligns the received message in accordance with the preference set by the primary device D1. The rule module 250 communicates the same to the web server 220 for presenting the device in a preconfigured manner on to the respective devices. The message is also saved by the on the database server 290.
[052] Further, the transmitting module 270 then sends the message to the specific secondary devices (D2, D3 … Dn) as specified by the primary device D1. Accordingly, when the secondary devices (D2, D3 … Dn) receive the message, the users of the secondary devices (D2, D3 … Dn) can comment / respond/ reply to the communication. Accordingly, all replies sent by the secondary devices (D2, D3 … Dn) are received by the receiving module 230. The receiving module 210 then communicates with the authentication module 240 to validate the received messages. In this instance, the messages shall be validated by the authentication module 240 since they have been received as a response to the message initiated by the primary device D1. However, yet again, if the response contains of any profanity, the same will be detected by the profanity filter module 270 and will not be sent across to the primary device D1.
[053] Further, upon validation, the rule module 250 processes/ arranges/ aligns/organize the validated messages. The rule module 250 communicates the same to the web server 220 for presenting the device in a preconfigured manner on to the respective devices. The message is also saved by the on the database server 290.
[054] Upon receipt of the message, the transmitting module 270 transmits the responses to the primary device D1 to thus achieve the object of the present invention.
[055] Accordingly, the all communication, employee logs, poll results, images, news, updates are saved onto the storage server 212.
[056] Advantageously, the present invention provides a communication system which allows a user to effectively communicate with a predefined group of users. The communication system of the present invention accordingly prevents dilution of the message and also effectively prevents unsolicited and undesirable communication from the receivers of the message.
[057] While the present invention has been described with respect to certain embodiments, it will be apparent to those skilled in the art that various changes and modification may be made without departing from the scope of the invention as defined in the following claims.
| # | Name | Date |
|---|---|---|
| 1 | 201921049249-STATEMENT OF UNDERTAKING (FORM 3) [29-11-2019(online)].pdf | 2019-11-29 |
| 2 | 201921049249-POWER OF AUTHORITY [29-11-2019(online)].pdf | 2019-11-29 |
| 3 | 201921049249-FORM 1 [29-11-2019(online)].pdf | 2019-11-29 |
| 4 | 201921049249-DRAWINGS [29-11-2019(online)].pdf | 2019-11-29 |
| 5 | 201921049249-DECLARATION OF INVENTORSHIP (FORM 5) [29-11-2019(online)].pdf | 2019-11-29 |
| 6 | 201921049249-COMPLETE SPECIFICATION [29-11-2019(online)].pdf | 2019-11-29 |
| 7 | Abstract1.jpg | 2019-12-03 |
| 8 | 201921049249-RELEVANT DOCUMENTS [05-04-2022(online)].pdf | 2022-04-05 |
| 9 | 201921049249-POA [05-04-2022(online)].pdf | 2022-04-05 |
| 10 | 201921049249-FORM 18 [05-04-2022(online)].pdf | 2022-04-05 |
| 11 | 201921049249-FORM 13 [05-04-2022(online)].pdf | 2022-04-05 |
| 12 | 201921049249-FER.pdf | 2022-09-14 |
| 13 | 201921049249-FORM 4(ii) [13-03-2023(online)].pdf | 2023-03-13 |
| 1 | SearchHistory(1)E_13-09-2022.pdf |