Sign In to Follow Application
View All Documents & Correspondence

"A Web Based System To Nab A Misiing Person As Well As An Accused Person Having Past Criminal Records"

Abstract: A system and method of tracking as well as nabbing a missing person and an offender by using his past data through a web based system is provided. Where in the system is implementing Hypertext Mark-up Language (HTML) for a highly interactive graphical user interface, PHP and MySQL for a strong database and Apache HTTP server for the development of a web based system for easy analysis of data and the crime patterns.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
07 June 2021
Publication Number
38/2021
Publication Type
INA
Invention Field
ELECTRICAL
Status
Email
Parent Application

Applicants

DEEPAK GUPTA
35, DARU BHONDELA, BADA BAZAR, JHANSI, UTTAR PRADESH, INDIA-284002

Inventors

1. DEEPAK GUPTA
35, DARU BHONDELA, BADA BAZAR, JHANSI, UTTAR PRADESH, INDIA-284002

Specification

The present invention relates to a web based system to nab a missing person as well as an accused person having past criminal records of FIR, ongoing investigation, charge sheet, court cases, conviction and its application of tracking the progress of the case during trials as well as its use in analyzing the crime patterns and/ or modus operandi.
BACK GROUND OF INVENTION-
US6933849B2 discloses ah object locating, identifying, tracking, and surveillance system denoted the Assets Locating, Tracking, and Surveillance System (ALTSS), is provided for managing physical objects and evidence in environments such as police departments, law offices, and the Courts. ALTSS employs radio frequency identification (RFID) technology, computer programming and database applications, networking technologies, and hardware elements. ALTSS may locate and track physical evidence, merchandise, information carriers like files, folders or individual pieces of paper, and people, under certain conditions, in near-real time. It may be configured as part of a local area network, a wide area network, or the Internet. ALTSS may employ exemplary components such as RFED transponders, scanners, strategically located antennas and computers to facilitate tracking of objects and people as needed. Any number of users having access privileges and connected to the network may access ALTSS directly or remotely via the Internet to locate and track evidence or objects.

I I
US8188861B2 discloses an intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity.
CN100452871C discloses Systems and methods are disclosed for analyzing, managing and cataloguing video tracks generated by a video surveillance system. Systems and methods operating in accordance with the present invention receive video tracks from a video surveillance system; analyze them for particular categories of, for example, objects or events, assign unique identifying tags to the video tracks; and save them in highly-cross-referenced databases so
[3]
that video tracks containing, for example, particular objects or events can be easily searched for and recalled. In addition, the

*
present invention provides browsing facilities for viewing events that have just elapsed, events that are occurring in near real-time.
US9619984B2 discloses Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from one or more sensors are captured and analyzed to detect one or more events in the sensory data. The events are correlated by a correlation engine, optionally by weighing the events based on attributes of the sensors that were used to detect the primitive events. The events are then monitored for an occurrence of one or more correlations of interest, or one or more critical events of interest. Finally, one or more actions are triggered based on a detection of one or more correlations of interest, one or more anomalous events, or one or more critical events of interest. Events may come from sensory devices, legacy systems, third-party systems, anonymous tips, and other data sources. The present invention may be used to increase business productivity by improving security, safety, and increasing profitability of business processes.
US20030183695A1 discloses a method for making a secure ID card with multiple images is provided. Information is provided to an information bearing layer, the information constructed and arranged to be capable of providing multiple images when printed information is viewed at different predetermined angles through an appropriate lens. At least a portion of the information is covered
[4]
with a substantially a transparent film material. A lens profile is embossed on at least a second portion of the film material, the

embossing forming a lens on the film material, the lens enabling the information to display multiple images when the information-bearing laminar assembly is viewed at different predetermined angles.
MECELLA et.al, 2001, discloses approach to e-Government is based on the development and deployment of the Unitary Network, a "secure Intranet" interconnecting all the public administrations. The Cooperative Architecture, currently designed on top of it, is the reference distributed computing model in which each administration is represented as a Domain, exchanging data and application services with the others through Cooperative Gateways. Some issues have been, and currently need to be, addressed, such as the presence of legacy systems, the need of a cooperative development process, the identification of the more effective cooperative approaches.
[5]

t
PROBLEM STATEMENT
The literature is full of conventional method of documenting information of the prisoners, stores the name of the prisoners, information of the crime, date of FIR, background of the criminal and duration of the prison in physical format, which is quite cumbersome. Further it is very difficult to track a person having past criminal records once the individual is left the crime place or released or its tenure comes to an end, it becomes challenging for the law keeping agencies as well as law enforcing official to have a track of the particular offender. Since the real time information of the offender is not present with each and every legal agency, hence it is very hard to keep a tab on these offenders.
Therefore there is a need to develop a modern information technology solutions web based system to nab a missing person as well as an accused person having past criminal records of FIR, ongoing investigation, charge sheet, court cases, conviction and its application of tracking the progress of the case during trials as well as its use in analyzing the crime patterns and/ or modus operandi.
[6]

SUMMARY OF THE INVENTION
Accordingly the present invention depicts modern information technology web based system to nab a missing person as well as an accused person having past criminal records of FIR, ongoing investigation, charge sheet, court cases, conviction by implementing Hypertext Mark-up Language (HTML) for a highly interactive graphical user interface, PHP and MySQL for a strong database and Apache HTTP server. The web based system not only enhances the efficiency in old system but also use an effective tool for easy analysis of data and the crime patterns and/ or the modus operandi.
OBJECTS OF THE INVENTION
The present invention has been developed in response to the present state of the art, and in particular, in response to the problems and needs in the art that have not yet been fully solved by currently available techniques and processes.
Accordingly, the present invention has discloses the implementing Hypertext Mark-up Language (HTML) for a highly interactive graphical user interface, PHP and MySQL for a strong database and Apache HTTP server for the development of a web based system for easy analysis of data and the crime patterns .
[7]
More preferably, the present invention provides a web based system to nab an accused person having past criminal records of FIR,

I t
I I
ongoing investigation, charge sheet, court cases and conviction or a missing person with the help of an Indian People Character certificate (IPCC) Management system.
BRIEF DESCRIPTION OF FIGURES
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying figures in which like characters represent like parts throughout the figures, wherein:
Figure 1 to 6 along with, illustrates different aspects indicating the processing steps and results analysis of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
For the purpose of promoting an understanding of the principles of
the invention, reference will now be made to the embodiment
illustrated in the figures and specific language will be used to describe
the same. It will nevertheless be understood that no limitation of the
scope of the invention is thereby intended, such alterations and further
modifications in the illustrated system, and such further applications
of the principles of the invention as illustrated therein being
contemplated as would normally occur to one skilled in the art to
which the invention relates. [8]

It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to "an aspect", "another aspect" or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or systems or elements or structures or components proceeded by "comprises... a" does not, without more constraints, preclude the existence of other devices or other systems or other elements or other structures or other components or additional devices or additional systems or additional elements or additional structures or additional components.
[9]
Unless otherwise defined, all technical and scientific terms used

herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
The terms "a" and "an" herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced items.
The terms "having", "comprising", "including", and variations thereof signify the presence of a component
The terms "web based system" is an application that is accessed via HTTP. The term web-based is usually used to describe applications that run in a web browser. The host server for a web-based system could be a local server, or it could be accessed via the internet.
The term "database "is an organized collection of structured information, or data, typically stored electronically in a computer system. A database is usually controlled by a database management system (DBMS). Most databases use structured query language (SQL) for writing and querying data.
The term "user interface (UI)" is the point at which human users interact with a computer, website or application. The goal of effective UI is to make the user's experience easy and intuitive, requiring minimum effort on the user's part to receive

maximum desired outcome.
In the given invention a method of tracking as well as nabbing an offender by using his past data through a web based system is provided. Where in the system is implementing Hypertext Mark-up Language (HTML) for a highly interactive graphical user interface, PHP and MySQL for a strong database and Apache HTTP server for the development of a web based system for easy analysis of data and the crime patterns.
In the given invention the method of web based crime as well as missing reporting and management system are describes below.
Further the present invention discusses the flow chart of the web based crime as well as missing reporting and management system and its validation as well as implementation system with all the stakeholders.
Referring to Fig 1 is the schematic representation of the architecture of the web based crime as well as missing reporting and management system with the apprehensive interested party in accordance with the preferred embodiment of the present invention. The web based crime as well as missing reporting and management system comprises of an Indian People Character certificate (IPCC) Management system (Application Software) 100, wherein the IPCC Management system 100 is having a distinct sign-in protocol system for the web. Its objective is to permit the Commercial Users 101, Religious User 102,

Personal User 103 and Law enforcing agencies(Police) 104 to access IPCC Management system by providing their credentials (such as user ID and password) . It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. All the bonafied users of the States would drive the implementation at the district level as well as block level and would continue to use this the web based crime as well as missing reporting and management system after deployment. The Law enforcing agencies (Police) 104 provide access to different police stations at state and district level. The Law enforcing agencies (Police) 104 not only registered the report of the missing person as well as the offenders but also provide data of the offenders for validating the registered complaint with respect to the ID's provided to them.
Referring to Fig 2.2 and 2.3 depict the representation of secure registration with the help of user ID and password of the Commercial Users 101, Religious User 102, Personal User 103 and Law enforcing agencies (Police) 104 respectively to access IPCC Management system by providing their credentials such as Name, Address, Mobile number, e-mail ids, nearby police station address, Adhar enabled Ids and GST no (for commercial user).
Further the fig 2.1 to fig 2.3 describes the process of registration where in after the successful submission of credential to IPCC Management system which will generate a reference number that will

be send to the user mails ids automatically.
In another embodiment figure 3 discloses data collection and processing of the data to enable seamless secure data transfer between the IPCC Management system and Law enforcing agencies (Police) 104 where in the Law enforcing agencies (Police) 104 will provides the details of the crime reports as well as missing report by making entries of details of the offenders person as well as missing person by providing their credentials such as Name, Address, Mobile number, e-mail ids, nearby police station address, Adhar enabled Ids and details of the types of crime committed along with the section of IP Act under which the offender has been booked. After submission of the details along with their document a reference id will be generated having the UID number of the offender person inside it and the same will be communicated to the Law enforcing agencies (Police) 104 through theirs registered e-mail ids.
Further in another embodiment of the given system the Commercial Users 101, Religious User 102, Personal User 103 can provide details of the persons who come to them for residing by creating a login credentials with an ID and password. Once the user registered them with the IPCC Management system, he/she can upload the details of the person by just making entry of his adhar card number, once the UID number is submitted a reference id will be generated having the UID number of the person who is comes for residing. There after the

same reference id will be sent to the user through its e-mail id for the future references.
Once when a person by committing a crime or by missing, left the place and moved to another state where he is taking shelter in any of the three places like Commercial place like Hotels, Lodges, Restaurant's... Etc., Religious places like temple, churches, mosque... Etc., Personal places like personal homes, flats, apartment.. .Etc. before giving shelter to him the above registered user need to ask for the UID ids or adhar card of the offender person which are need to be provided in the IPCC Management system. Once the system took the adhar card numbers it will automatically generates a references number and send to server for matching and rechecking with the data stored in the system database (Z).
In another embodiment when the adhar number of the person entered by the registered user matched with that of offender person entered by 104 in the system database showing active case against him, then automatically a notification will be generated having details of the offended person (like Fir Number showing its active cases where the FIR is registered, place of its current location with pin code etc..) and communicated to the nearby police station where he is currently resides as well as the police station where the fir is registered through the SMS alert and registered e-mall4ds, once the nearby police station where he is currently resides as well as the police station where the fir

is registered got notification they will move their machinery to nab
the accused person easily as described in fig.5.
Working Example
Example-1
In the present embodiment figure 4 shows the working of adhar
verification for guest user where in the first step the user validate
himself by entering his adhar number and otp received in his/her
mobile number through the ipccertificate portal of the IPCC system.
Then in the second step the user can request for the adhar verification
of an unknown person by providing the adhar number of the unknow
person, once the adhar number of the unknown person get entered the
database will match and provides the following result as a. No data
found (if Person is not a criminal with no FIR found till date) b. Data
found (if person is a criminal with active FIR and active case found)
c. Inactive data found (if person was a criminal, no active case found
in present time) d. Missing (if person run away from home or lost)
Validation procedure for the Commercial Users 101, Religious User 102, Personal User 103 and the Law enforcing agencies (Police) 104 user
In the instant invention another embodiment in figure 2.1 depicts about the Indian People Character certificate (IPCC) Management system for nabbing an offender or a missing person , wherein the Indian People Character certificate (IPCC) Management system (Application Software) is having a distinct sign-in protocol system for the web, which comprises, registration module 110 of users/citizen

along with a module for filing details information and also uploading the proof documents of the user as well as the persons 120, thereafter uploading of details of the crime or missing reports and such recording of data in database 140 following with validation and matching of the recorded data 105.
In another embodiment where in figure 2.2 depicts the singing up as well as validation procedure for the Commercial Users 101, Religious User 102, Personal User 103 and the Law enforcing agencies (Police) 104 user. Wherein the Commercial Users 101 registered themselves by providing the details as mentioned in the form along with their GSTN number ,if the provided GSTN matches with the GST database( 112) then the Commercial Users 101 will be eligible for generation of IDs and password which will be send through their registered email ids and mobile number.
Similarly the Religious User 102 as well as Personal User 103 registered themselves by providing the details as mentioned in the form along with their Adhar number, if the provided Adhar number matches with the Adhar database (113) then the Religious User 102 as well as Personal User 103 will be eligible for generation of IDs and password which will be send through their registered email ids and mobile number. Further in figure 2.3 the Law enforcing agencies (Police) 104 user
registered themselves by providing the details as mentioned in the
[re
form along with their registered number as generated in the department of Ministry of Home Affairs (both in center & States) ,if

« t
the provided MHA registered number matches with the Home Affair database^ 114) then the Law enforcing agencies (Police) 104 user will be eligible for generation of IDs and password which will be send through their registered email ids and mobile number.
Working Example-2 Submission of FIRs and missing reports by police authority
When somebody commit crimes and run away from his crime place then the police authority will submit the FIR or missing reports by providing details of the crimes as well as the biometric details of the offenders. Once the details were entered it will automatically get updated in the IPCC database in real time as describes in figure.3.
Working of IPCC Management with their registered users
In another embodiment where in figure .5 depicts the working of IPCC Management with their registered users. The registered Commercial Users 101, Religious User 102, Personal User 103 can access the IPCC certificate database by providing their registered login credentials. With the IPCC Management system, the above registered user will upload the details of the unknown person by doing entry of the unknown person's adhar card number, once the UID number is submitted a reference id will be generated having the UID number of the person who comes!ifor residing. There after the same reference id will be sent to the user through its e-mail id for the future

references. In the next steps the IPCC Management system will do the data validation and matching and if the data of the unknown person matched with any of the offenders as stored in the database which is having an active case, then it will automatically send one notification to law enforcement agencies PS 104 where the fir is registered through sms & mail, and another notification to the nearby law enforcement agencies PS 104 the through sms & mail. Once the law enforcement agencies PS 104 got notification they will move their machinery to nab the accused person easily.
Changing the status of FIR and Missing report by the police authority
Once the accused person get arrested by the law enforcement agencies or the missing person was found by the police, then the police itself makes entries in the BPCC management system by providing details of the arrested persons and thereby changing the criminal as well as missing status of the offender in the database into an inactive state as described in figure. 6. Which will automatically updated in the database in real time.

I Claim,
1. A web based system to nab an accused person having past criminal records of FIR, ongoing investigation, charge sheet, court cases and conviction or a missing person , wherein the system comprising:
a. Indian People Character certificate (IPCC) Management system (Application Software) 100, wherein the IPCC Management system 100 is having a distinct sign-in protocol system for the web, which comprises:
i. registration module 110 of users/citizen along with a module for filing details information and also uploading the proof documents of the user as well as the persons 120 ;
ii. Uploading of details of the crime or missing reports and such recording of data in database 140;
iii. Validation and matching of the recorded data 105.
b. a commercial user 101 having access for data sharing and
data uploading with 100.
c. a religious user 102 having access to registration and sharing
of data with 100.
d. a Personal user 103 having access to registration and sharing
of data with 100. [20

I t
I 1
e. a Law enforcing agency (police) user 104 having access to registration , uploading details of the crime records as well as assigning IPC status to the crime and also provided access to the recorded data through an IPCC Management system.
2. A web based system to nab an accused person or a missing person, wherein the Commercial Users 101 registered and validate them by entering theirs GSTIN number as well as otp received in their mobile number through the ipccertificate portal.
3. A web based system to nab an accused person or a missing person, wherein the Religious User 102 as well as Personal User 103 registered themselves by providing their Adhar number and otp received in their mobile number through the ipccertificate portal.
4. A web based system to nab an accused person or a missing person, wherein the Law enforcing agencies (Police) 104 user registered themselves by providing their registered number as generated in the department of Ministry of Home Affairs (both in center & States) and otp received in their mobile number through the ipccertificate portal.
5. A web based system to nab an accused person or a missing person, wherein the police authority will submit the FIR or missing reports by providing details of the crimes as well as the biometric details of the offenders and the missing person in the database, which is updated in real time.
[21

I '
6. A web based system to nab an accused person or a missing person, wherein registered user will upload the adhar card number of the unknown person and thereby automatically generated a reference id having the UID number of the unknown person who comes for residing.
7. A web based system to nab an accused person or a missing person, wherein the BPCC Management system will do the data validation and matching, once the UID number of the unknown person is provided by a registered user, and if the data of the unknown person matched with any of the offenders or missing person as stored in the database, which is having an active case, then it will automatically send one notification to law enforcement agencies PS 104 through sms & mail , where the FIR is registered and another notification to the nearby law enforcement agencies PS 104 the through sms & mail.
8. A web based system to nab an accused person or a missing person, wherein once the law enforcement agencies PS 104 got notification they will move their machinery to nab the accused person easily and thereby change the criminal as well as missing status of the accused person from an active to an inactive state in the database .

Documents

Application Documents

# Name Date
1 202111025157-FER.pdf 2022-06-16
1 202111025157-OTHERS-160821.pdf 2021-10-19
2 202111025157-Form 1-070621.pdf 2021-12-03
2 202111025157-Form 9-160821.pdf 2021-10-19
3 202111025157-Form 18-160821.pdf 2021-10-19
3 202111025157-Form 3-160821.pdf 2021-10-19
4 202111025157-Form 2(Title Page)-070621.pdf 2021-10-19
4 202111025157-Form 2(Title Page)-160821.pdf 2021-10-19
5 202111025157-Form 2(Title Page)-070621.pdf 2021-10-19
5 202111025157-Form 2(Title Page)-160821.pdf 2021-10-19
6 202111025157-Form 18-160821.pdf 2021-10-19
6 202111025157-Form 3-160821.pdf 2021-10-19
7 202111025157-Form 1-070621.pdf 2021-12-03
7 202111025157-Form 9-160821.pdf 2021-10-19
8 202111025157-FER.pdf 2022-06-16
8 202111025157-OTHERS-160821.pdf 2021-10-19

Search Strategy

1 aadhaarE_14-06-2022.pdf