Sign In to Follow Application
View All Documents & Correspondence

Smart Doorbell

Abstract: A system and method for a smart doorbell (102) is provided. The smart doorbell (102) comprises one or more circuits configured to receive a password from a visitor, validate the password and identify the visitor based on the received password by communicating with a server (106). Further, the server (106) may be configured to ring the smart doorbell (102) in case the identified visitor is authorized by a resident associated with the smart doorbell (102). Reference figure: FIG. 1.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 August 2016
Publication Number
37/2016
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

VIVISH TECHNOLOGIES PRIVATE LIMITED
Flat No: P-703, Rohan Jharoka-Ii, Yemalur, Kempapura Main Road, Bengaluru-560037

Inventors

1. ARISETTY VIJAY KUMAR
Flat No: P-703, Rohan Jharoka-II, Yemalur, Kempapura Main Road, Bengaluru-560037

Specification

Claims:We claim:
1. A smart doorbell comprising:
one or more circuits configured to:
receive a password from a visitor;
validate the password and identify the visitor based on the received password by communicating with a server (106); and
ring the smart doorbell (102) in case the identified visitor is authorized by a resident associated with the smart doorbell (102).

2. The smart doorbell according to claim 1, wherein the resident, using a resident’s mobile device (108), shares information of the visitor with the server (106), and wherein the server (106) is configured to generate and share the password with the visitor.

3. The smart doorbell according to claim 1, wherein a notification is sent to a resident’s mobile device (108) of the resident by the server (106) in case the identified visitor is authorized by the resident, and wherein the notification includes one or more details of the visitor.

4. The smart doorbell according to claim 1, wherein the password is randomly generated by the server (106) and is valid for a predetermined time.

5. The smart doorbell according to claim 1, wherein the one or more circuits are configured to refrain the smart doorbell (102) from ringing in case the identified visitor is not authorized by the resident.
6. The smart doorbell according to claim 5, wherein in case the identified visitor is not authorized by the resident, the server (106) is configured to send an alert to one or more security personnel and/or security agencies.

7. The smart doorbell according to claim 6, wherein the alert is sent after a list of predefined rules is satisfied.

8. The smart doorbell according to claim 1, wherein the one or more circuits are configured to set the smart doorbell (102) to a do not disturb mode, in which the smart doorbell (102) is refrained from ringing and the server (106) is configured to send a notification to a resident’s mobile device (108) of the resident in case of a visitor authorized by the resident.

9. A method for operating a smart doorbell, the method comprising:
receiving, using a server (106), information corresponding to one or more visitors from a resident’s mobile device (108) of a resident;
generating, using the server (106), a password for each of the one or more visitors;
receiving, using a smart doorbell (102), a password from a visitor among the one or more visitors;
validating the password and identifying the visitor, using a server (106), based on the received password; and
ringing the smart doorbell (102) in case the identified visitor is authorized by the resident associated with the smart doorbell (102).

10. The method according to claim 9, wherein the generated password for one or more selected visitors is a permanent password. , Description:Field of invention:
[0001] The subject matter in general relates to access control systems. More particularly, but not exclusively, the subject matter relates to a smart doorbell.
Discussion of related art:
[0002] Generally, doorbells are used by visitors to indicate the residents of their arrival. Such doorbells usually make some type of sound when a visitor rings the doorbell. In most cases, the sounds produced are loud in order to efficiently notify the residents about the visitor at the door. More often than not, such doorbells act as a source of unwanted disturbance to the residents, especially to elderly people or infants sleeping at home. Adding to it are local children who play around ringing resident’s doorbells, and sales agents.
[0003] One conventional system tried to address this problem by using a password based doorbell, where the resident is allowed to assign a unique password and ringtone for every expected visitor. Thereafter, when the visitor inputs the unique password, a ringtone associated with the password is played, thereby allowing the resident to identify the visitor at the door and also stopping others from ringing the doorbell. However, such systems introduce new problems to the residents as they have to manually alter the password every time a new visitor is expected. Further, the password remains active until the resident manually deletes it. Additionally, it is next to impossible for any resident to identify a large number of visitors based on ringtones.
[0004] Such conventional systems usually have a limit to the number of passwords that can be assigned at a given time, thus making it more annoying for the residents to go through the entire process of deleting some old visitor’s password and creating a new password for the revisiting visitor.
[0005] Conventional security systems use video cameras, bio-metric identification and RFID cards among other means to open a door. However, none of these provide a reasonable solution to overcome the above stated drawbacks of doorbell. Further, such security systems are generally installed at the entry point of the gated communities, campuses, and apartments, among other closed enclaves. Thereby, the systems are again vulnerable to all the above mentioned drawbacks of existing doorbells since a person who enters the closed enclave can ring any resident’s doorbell.
[0006] In view of the foregoing discussion, there is a need for an improved doorbell to overcome the above problems while improving resident’s security and privacy.

SUMMARY
[0007] Accordingly, an improved technique to overcome the above problems is needed. To fulfil this need, a system and method for a smart doorbell is provided. In an embodiment, the smart doorbell may comprise of one or more circuits configured to receive a password from a visitor, validate the password and identify the visitor based on the received password by communicating with a server. Further, the server may be configured to ring the smart doorbell in case the identified visitor is authorized by a resident associated with the smart doorbell.
[0008] In an embodiment, the resident may use a mobile device to share information of the visitor with the server, which is configured to generate and share the password with the visitor.
[0009] In an embodiment, a notification may be sent by the server to a mobile device of the resident in case the identified visitor is authorized by the resident. The notification may include one or more details of the visitor.
[0010] In an embodiment, the password may be randomly generated by the server computer and may be valid for a predetermined time.
[0011] In an embodiment, the one or more circuits may be configured to refrain the smart doorbell from ringing in case the identified visitor is not authorized by the resident.
[0012] In an embodiment, the server may be configured to send an alert to one or more security personnel and/or security agencies in case the identified visitor is not authorized by the resident.
[0013] In an embodiment, the alert may be sent after a list of predefined rules is satisfied.
[0014] In an embodiment, the one or more circuits may be configured to set the smart doorbell to a do not disturb mode, in which the smart doorbell may be refrained from ringing. Further, the server may be configured to send a notification to a mobile device of the resident in case of a visitor authorized by the resident.
[0015] In an embodiment, a method for operating a smart doorbell may include receiving information corresponding to one or more visitors from a mobile device of a resident using a server. Further, the method may include generating a password for each of the one or more visitors using the server. Further, the method may include receiving a password from a visitor among the one or more visitors using a smart doorbell. Thereafter, the method may include validating the password and identifying the visitor based on the received password using a server and ringing the smart doorbell in case the identified visitor is authorized by the resident associated with the smart doorbell.
[0016] Other objects, features, and advantages of the present invention will become apparent from the following detailed description. It should however, be understood that the detailed description and specific examples, while indicating preferred embodiments of the present invention, are given by way of illustration only and various modifications may naturally be performed without deviating from the present invention.

BRIEF DESCRIPTION OF DIAGRAMS
[0017] This disclosure is illustrated by way of example and not limitation in the accompanying figures. Elements illustrated in the figures are not necessarily drawn to scale, in which like references indicate similar elements and in which:
[0018] FIG. 1 is an exemplary architecture of a system 100 including a smart doorbell 102, in accordance with an embodiment;
[0019] FIG. 2 is an exemplary block diagram of the smart doorbell 102 of the system 100, in accordance with an embodiment;
[0020] FIG. 3 is an exemplary block diagram of a resident’s mobile device 108 of the system 100, in accordance with an embodiment;
[0021] FIG. 4 is an exemplary block diagram of a server 106 of the system 100, in accordance with an embodiment;
[0022] FIG. 5 is a flowchart of an exemplary method 500 for operating the smart doorbell 102, in accordance with an embodiment;
[0023] FIG. 6A, 6B, 6C and 6E illustrate an exemplary user interface 602 on the resident’s mobile device 108, in accordance with an embodiment; and
[0024] FIG. 6D illustrates an exemplary user interface 604 on the visitor’s mobile device 110, in accordance with an embodiment.

DETAILED DESCRIPTION OF THE INVENTION
[0025] The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments, which may be herein also referred to as “examples” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, other embodiments can be utilized, or structural, logical, and design changes can be made without departing from the scope of the claims. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope is defined by the appended claims and their equivalents.
[0026] In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
[0027] It should be understood that the capabilities of the invention described in the present disclosure and elements shown in the figures may be implemented in various forms of hardware, firmware, software, non-transitory computer readable medium or combinations thereof.
[0028] The embodiments disclose a smart doorbell and a method for operating the smart doorbell. A resident using the smart doorbell may share information of expected visitors with a server which is configured to generate and share a unique temporary password with each of the visitors. Further, when the smart doorbell receives a password from a visitor, the same may be communicated with the server for validation and identification of the visitor. Upon validation, the smart doorbell may ring, and a notification corresponding to the information of the visitor may be sent to a resident’s device. Other variations, modifications and working of the smart doorbell will be apparent to a person ordinarily skilled in the art in view of the following description and accompanying drawings.
[0029] FIG. 1 is an exemplary architecture of a system 100 including a smart doorbell 102, in accordance with an embodiment. The system 100 includes the smart doorbell 102, a server 106, a resident’s mobile device 108, a visitor’s mobile device 110 and a communication network 104 to enable communication between the mobile devices 108, 110 and the server 106.
[0030] FIG. 2A illustrates the exemplary smart doorbell 102, in accordance with an embodiment. The smart doorbell 102 may include a keypad 214 to enter data such as a password. The entered data may be configured to be displayed on a display 202. Further, the smart doorbell 102 may include a microphone 212 which can be used for audio communication upon pressing a button 210 to communicate using the microphone 212 and a speaker 208. The smart doorbell 102 may also include a biometric scanner 206 and a camera 204 which may be used to identify visitors.
[0031] In an embodiment, the keypad 214 may contain buttons with specific keys to use numerals 0-9, cancel, clear, enter, return and arrow buttons for navigation. The keypad 214 may be a tactile, QWERTY, touch screen or a customised keypad with special function keys or a combination of the above mentioned keypads. The visitor may use the keypad 214 to input data such as the received password, their name and the name of the resident they are visiting, among others.
[0032] In an embodiment, the display 202 may be configured to display content. The display 202 may also be used to receive an input from a visitor. The display 202 may be of any display type known in the art, for example, Liquid Crystal Displays (LCD), Light emitting diode displays (LED), Organic Light-Emitting Diode (OLED), Cathode Ray Tube Displays (CRT), Orthogonal Liquid Crystal Displays (OLCD) or a combination of these or any other type of display currently existing or which may exist in the future.
[0033] In an embodiment, the button 210 may be configured to activate the microphone 212 when the button 210 is pressed. The microphone 212 may send audio signals of the visitor to a speaker/intercom located in the house or to the resident’s mobile device 108 via the server 106. Additionally, the audio may be recorded and stored in the smart doorbell 102 or in the server 106.
[0034] The speaker 208 may be configured to play audio. The audio may include a live message or a recorded message from the resident. The camera 204 and the biometric scanner 206 may be used in addition to the password to view and/or identify the visitor.
[0035] FIG. 2B is an exemplary block diagram of the smart doorbell 102 of the system 100, in accordance with an embodiment. The smart doorbell 102 may include a processing module 216, a memory module 222, an input/output module 220, a communication module 224, and a bus 218 connecting all the modules of the smart doorbell 102.
[0036] The processing module 216 may comprise of one or more circuits which are implemented in the form of one or more processors that may be implemented as appropriate in hardware, computer-executable instructions, firmware, or combinations thereof. Computer-executable instruction or firmware implementations of the processing module 216 may include computer-executable or machine-executable instructions written in any suitable programming language to perform the various functions described. Further, the processing module 216 may communicate with the other modules of the smart doorbell 102 through the bus 218.
[0037] The memory module 222 may be implemented in the form of a primary and a secondary memory. The memory module 222 may store additional data and program instructions that are loadable and executable by the processing module 216, as well as data generated during the execution of these programs. Further, the memory module 222 may be volatile memory, such as random access memory and/or a disk drive, or non-volatile memory. The memory module 222 may comprise of removable memory such as a Compact Flash card, Memory Stick, Smart Media, Multimedia Card, Secure Digital memory, or any other memory storage that exists currently or may exist in the future.
[0038] The input/output module 220 may provide an interface for devices such as the keypad 214, the display 202, the microphone 212, the camera 204, the biometric scanner 206 and the speaker 208, among other input devices and/or output devices.
[0039] The communication module 224 may provide an interface to communicate with the communication network 104, the resident’s mobile device 108 and the server 106. The communication module 224 may include an antenna and a communication port, among others and may include devices supporting both wired and wireless protocols. Data in the form of electronic, electromagnetic and optical signal, among other signals may be transferred via the communication module 224. Further, the communication module 224 may be compatible with different technologies including WLAN, USB and GPS, among others.
[0040] FIG. 3 is an exemplary block diagram of the resident’s mobile device 108 of the system 100, in accordance with an embodiment. The resident’s mobile device 108 may include a processing module 302, a memory module 304, an input/output module 306, a display module 308, a communication interface 310, an application module 314, and a bus 312 connecting all the modules of the resident’s mobile device 108.
[0041] The processing module 302, the memory module 304, the input/output module 306, the communication interface 310 and the bus 312 may be similar to the processing module 216, memory module 222, input/output module 220, communication module 224 and bus 218 of the smart doorbell 102, respectively.
[0042] The display module 308 may be configured to display content. The display module 308 may also be used to receive an input from a resident and/or display information to the resident. The display module 308 may be of any display type known in the art, for example, Liquid Crystal Displays (LCD), Light emitting diode displays (LED), Cathode Ray Tube Displays (CRT), Orthogonal Liquid Crystal Displays (OLCD) or any other type of display currently existing or which may exist in the future.
[0043] The application module 314 may be implemented as software. The server 106 may be operable to configure and download an installer file that includes at least one application bundled with at least one configuration parameter to a plurality of resident’s mobile devices 108 via communication network 104.
[0044] The application module 314 may further comprise an entry management module 316. The application module 314 may allow the resident to perform various actions through the resident’s mobile device 108 such as sharing information about the visitor with the server 106, authorizing or forbidding the entry of a visitor to the resident’s house for a particular day and time, and setting the smart doorbell 102 to a do-not-disturb mode where the smart doorbell 102 may refrain from ringing, among other actions.
[0045] Additionally, the entry management module 316 may receive one or more notifications from the server 106 in case an expected visitor or an unidentified visitor is at the door, among others. The notifications may include one or more of visitor’s information such as the visitor’s name, contact, photograph, purpose of visit and date and time of entry, among others.
[0046] FIG. 4 illustrates an exemplary block diagram of the server 106, in accordance with an embodiment. The server 106 may be implemented in the form of one or more circuits built as one or more processors. The server 106 may include a processing module 402, a memory module 404, an input/output module 406, a communication interface 408, an application module 412, and bus 410 connecting all the modules in the server 106.
[0047] The processing module 402, memory module 404, input/output module 406, communication interface 408 and bus 410 may be similar to the processing module 302, memory module 304, input/output module 306, communication interface 310 and bus 312 of the resident’s mobile device 108, respectively. Additionally, the memory module 404 may comprise of one or more databases. The application module 412 may execute processes through the processing module 402 by using data stored in the memory module 404.
[0048] The application module 412 may include an analysis module 414 configured to receive and analyze data received from one or more smart doorbells 102, resident’s mobile devices 108 and/or visitor’s mobile devices 110 through the communication interface 408.
[0049] Referring to FIG. 1, the communication network 104 may include a wired network, a wireless network, or a combination of wired network and wireless network. For example, the communication network 104 may include local area network, wide area network, and metropolitan area network, among others.
[0050] The visitor’s mobile device 110 may include a processing module 302, a memory module 304, an input/output module 306, a display module 308, a communication interface 310 and a bus 312 connecting all the modules. These modules may be similar by construction and function to the corresponding modules of the resident’s mobile device 108.
[0051] In an embodiment, the mobile devices 108 and 110 may include mobile phones, palmtops, PDAs, tablet PCs, notebook PCs, laptops and computers, among other computing devices. In an embodiment, the mobile devices 108 and 110 may include any electronic device equipped with a browser to communicate with the server 106.
[0052] In an embodiment, a resident may input details related to one or more visitors using the entry management module 316 of the resident’s mobile device 108. This information may be shared by the application module 314 with the server 106 through the communication network 104. In case the resident authorizes a visit by a visitor, the server 106 may generate a password for the visitor. Further, the password may be shared with the visitor’s mobile device 110.
[0053] In an embodiment, the password may be randomly generated by the server 106 and may include one or more of a numeric password, an alphanumeric password, a password pattern, a scannable password, and a barcode or a QR code which may be scanned by the smart doorbell 102, among other types of passwords. In an embodiment, the biometrics of a visitor may also be used as a password. Further, the generated password may be valid for a predetermined time, wherein the visitor may determine the time of validity of the password.
[0054] In an embodiment, the visitor’s mobile device 110 may receive one or more notifications from the server 106 or the resident’s mobile device 108 which may include one or more of an electronic notification such as a voice call, a pop-up window on the user interface of the visitor’s mobile device 110, an automated push notification, a Short Message Service (SMS), and/or an e-mail, among other ways of notifying a visitor.
[0055] Further, the visitor may provide the received password at the smart doorbell 102. The processing module 216 of the smart doorbell 102 may communicate the received password to the application module 412 of the server 106 using the communication module 224. The analysis module 414 of the server 106 may receive and analyze the password to identify the visitor. Further, in case the visitor is identified to have authorized entry, the application module 412 of the server 106 may communicate with the processing module 216 of the smart doorbell 102 to ring the smart doorbell 102.
[0056] In an embodiment, the visitor’s mobile device 110 may receive the above mentioned notification through an application stored in the application module 314 of the visitor’s mobile device 110 which may contain some functionalities such as checking the day and time of authorized entry, password for the visit, address of the resident’s house and a history of past visits, among others.
[0057] In an embodiment, the information entered by the resident into the resident’s mobile device 108 may include one or more of the visitor’s name, mobile number, address, e-mail id, photograph, visit date, visit time and purpose of visit, approximate duration of stay, and frequency of visiting and among other such information. In an embodiment, the resident may also give permanent access to one or more visitors, such as family members, maids or other daily service personnel among others.
[0058] In an embodiment, in case the analysis module 414 receives an unidentified password from a visitor, or if an identified visitor is not authorised for a visit, the server 106 may be configured to refrain the smart doorbell 102 from ringing. Further, the server 106 may send an alert/notification to one or more security personnel, security agencies, building management, residents and/or police, among others.
[0059] In an embodiment, the alert may also be sent in case one or more predefined rules are satisfied. The one or more pre-defined rules may include one or more of a visitor repeatedly entering the wrong password for predetermined number of times, in case the house of the resident is vacant, and in case a visitor tries to ring the smart doorbell 102 before or after his scheduled visit, among other rules.
[0060] In an embodiment, the resident may activate a “Do-not-disturb mode” during which the smart doorbell 102 may be configured to remain silent even when the correct password is entered. In case a visitor visits the resident’s house and enters the correct password, the server 106 may be configured to send one or more notifications to the resident’s mobile device 108 to inform them about the arrival of the visitor. Further, in case the visitor is not authorized by the resident to enter the house, the server 106 may send an alert to security personnel and other authorities.
[0061] In an embodiment, the notification received by the resident’s mobile device 108 in case a visitor arrives may include one or more of an electronic notification such as a voice call, a pop-up window on the user interface of the visitor’s mobile device 110, an automated push notification, a Short Message Service (SMS), and/or an e-mail, among other ways of notifying a visitor.
[0062] In an embodiment, the resident may invite a visitor either before or at the time of the visit.
[0063] In an embodiment, the server 106 may generate a password before the visit or at the time of a visit. In another embodiment, the visitor using the visitor’s mobile device 110 may request the server 106 to resend a password.
[0064] In an embodiment, there may be several residents in a house, where one or more resident’s mobile devices 108 may be configured to run an application containing an entry management module 316, thereby enabling those residents’ devices 108 to manage visitors.
[0065] In an alternative embodiment, one resident’s mobile device 108 among multiple resident’s mobile devices 108 in a house may be selected as a master resident’s mobile device 108. Several additional features may be incorporated into the entry management module 316 of the master resident’s mobile device 108 such as options to block or allow visitors, and maintain a log of visitors, among others features.
[0066] In an embodiment, the resident may authorize periodic entry for certain visitors on particular days at a predetermined time. Such visitors may include servants, milk delivery persons and newspaper delivery persons, among other regular visitors. In an embodiment, the resident may authorize permanent access for one or more visitors. Such visitors may include family members, close friends, servants or maids, milk delivery persons and newspaper delivery persons, among other regular visitors.
[0067] FIG. 5 depicts a flowchart of an exemplary method 500 for operating the smart doorbell 102, in accordance with an embodiment. At step 502, information about one or more expected visitors may be received by the server 106 from the resident’s mobile device 108 of a resident. Additionally, the received information may also include the expected time of visit, duration of stay, nature of visit, and frequency of visit, among other information. Further, at step 504, the received information may be analyzed by the server 106 and thereafter a password may be generated for each of the visitors, where the validity of the generated password may vary based on the received information.
[0068] In an embodiment, the generated password may be used for a pre-determined number of times, where the pre-determined number is based on the information received from the resident. Alternatively, the generated password may be a One-Time-Password (OTP).
[0069] Further, the generated password may be shared by the server 106 with the visitors via the visitor’s mobile device 110. At step 506, the generated password may be received via the smart doorbell 102 from the visitor. The received password may be communicated to the server 106 by the smart doorbell 102. Further, at step 508 the password’s validity may be checked by the server 106 by comparing it with data stored in the server 106 in order to identify the visitor and determine whether the identified visitor is an expected visitor for the resident’s house.
[0070] In an embodiment, the identity of the visitor may be determined by the server 106 based on the entered password. Additionally, the data received from the camera 204 and the biometric scanner 206 may also be used to identify the visitor at the door.
[0071] In case the entered password is determined to be invalid, the server 106 may check whether a list of predefined rules is satisfied. In case the list of predefined rules is not found to be satisfied, the server 106 may wait for a predetermined period of time to receive the correct password from the visitor through the smart doorbell 102, beyond which the server 106 may raise an alert to notify one or more security personnel or security agencies about the suspicious behavior of the visitor.
[0072] Further, at step 510, in case the received password is valid and the visitor is identified, the smart doorbell 102 may ring. Simultaneously, a notification may be sent to the resident’s mobile device 108 with details of the visitor at the door.
[0073] In an embodiment, the resident may be allowed to configure the smart doorbell 102 for “Do not disturb” mode. In such a case, the smart doorbell 102 may refrain from ringing even if the visitor password is valid, instead a notification may be sent to the resident’s mobile device 108 based on which the resident will be made aware of the visitor’s arrival.
[0074] In an embodiment, in case of a closed enclave with multiple houses equipped with smart doorbells 102, it is possible for a visitor to enter the generated password at a wrong smart doorbell 102. In such a scenario, the wrong smart doorbell 102 may refrain from ringing, and further the server 106 may identify the visitor based on the received password and notify the correct resident who invited the visitor about the incident. Additionally, a message may be displayed on the display 202 of the wrong smart doorbell 102 to inform the visitor that he/she is at the wrong house, and needs to go to the correct house.
[0075] FIG. 6A illustrates an exemplary user interface 602 on the resident’s mobile device 108, in accordance with an embodiment. The entry management module 316 may provide a user interface 602 as shown in FIG. 6A. Further, the resident “Arun” using the resident’s mobile device 108 may choose the option “Invite a friend” to invite a friend to his residence. Arun may also choose “Invite a service provider” option to authorize entry for regular visitors such as servants and other such regular visitors. The ‘Do not disturb’ option may be used in case Arun does not wish to be disturbed.
[0076] Additionally, Arun may be able to block a visitor invited by other residents in his house using “Block visitor” option. Also, ‘View visitor log’ option may be used to keep track of visitors and their visits.
[0077] In case Arun chooses ‘Invite a friend’ option to invite a friend, the user interface 602 may show an option as depicted in FIG. 6B, where Arun may choose between an option to add a new visitor or choose an existing visitor. In case the ‘Add visitor’ option is chosen by Arun, the entry management module 316 may seek the visitors details through the user interface 602 as shown in FIG. 6C. Further, the visitor details may be entered into the entry management module 316. In case the ‘Choose an existing visitor’ option is chosen in FIG. 6B, a visitor whose details are already stored in the entry management module 316 may be selected from a list of visitors.
[0078] Arun may click on the ‘Add visitor’ and a window as depicted in FIG 6C may open on his resident’s mobile device 108. Here, Arun may input details related to the visitor “Vishal” such as his name, mobile number, date and time of visit and information about the visitor as shown in FIG. 6C.
[0079] Subsequently, the server 106 may generate a password, and communicate the invite to Vishal’s mobile device 110 as depicted in FIG. 6D. Further details may also be included in the message such as the date and time of the visit, and Arun’s house address, among others.
[0080] Vishal may visit Arun’s house and input the received password into the smart doorbell 102 as depicted in FIG. 2. Subsequently, the server 106 may validate the password to identify Vishal. Further, Arun may receive a notification regarding Vishal’s visit on his resident’s mobile device 108 as depicted in FIG 6E. The notification may include details such as Vishal’s photograph and name as shown in the FIG. 6E.
[0081] The forgoing disclosure overcomes the drawbacks of the conventional doorbell and security systems, by identifying and authenticating a visitor who may visit the house of a resident before ringing the smart doorbell. Thus, the present invention as discussed in this document with respect to different embodiments will be advantageous at least in providing additional privacy and security for a resident. Further, it is advantageous in providing better transparency and decreasing the chances of security lapses and crime. It is also advantageous in helping the resident to keep track of visitors and avoid inconveniences caused by unnecessary disturbances from salespeople and other such people. Furthermore, the system is also advantageous in detecting fraudulent persons. Additional advantages not listed above may be understood by a person of ordinary skill in the art in view of the embodiments disclosed above.
[0082] In the foregoing detailed description, numerous specific details, examples, and scenarios are explained in order to facilitate a thorough understanding of the present disclosure. However, the embodiments of the disclosure may be practiced without such specific details. Further, such examples and scenarios are provided for illustration, and are not intended to limit the disclosure in any way. Those of ordinary skill in the art, with the included descriptions, should be able to implement appropriate functionality without undue experimentation. Thus the scope of the invention should be determined by the appended claims and their legal equivalents rather than by details, examples, and scenarios provided.
[0083] It shall be noted that the processes described above are described as sequence of steps; this was done solely for the sake of illustration. Accordingly, it is understood that some steps may be added, some steps may be omitted, the order of the steps may be re-arranged, or some steps may be performed simultaneously.
[0084] Although embodiments have been described with reference to specific example embodiments, it will be evident that various combinations, modifications, additions, and omissions may be made to these embodiments without departing from the broader spirit and scope of the foregoing disclosure and appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
[0085] It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation.

Documents

Application Documents

# Name Date
1 201641028677-AbandonedLetter.pdf 2017-07-18
1 PROOF OF RIGHT [23-08-2016(online)].pdf 2016-08-23
2 201641028677-FER.pdf 2016-10-26
2 Power of Attorney [23-08-2016(online)].pdf 2016-08-23
3 Form 9 [23-08-2016(online)].pdf_229.pdf 2016-08-23
3 201641028677-Assignment-260816.pdf 2016-09-27
4 Form 9 [23-08-2016(online)].pdf 2016-08-23
4 201641028677-Correspondence-Assignment-260816.pdf 2016-09-27
5 OTHERS [20-09-2016(online)].pdf 2016-09-20
5 Form 5 [23-08-2016(online)].pdf 2016-08-23
6 Form 3 [23-08-2016(online)].pdf 2016-08-23
6 abstract201641028677.jpg 2016-08-31
7 Form 20 [23-08-2016(online)].jpg 2016-08-23
7 Form 18 [24-08-2016(online)].pdf 2016-08-24
8 Drawing [23-08-2016(online)].pdf 2016-08-23
8 Form 26 [24-08-2016(online)].pdf 2016-08-24
9 Description(Complete) [23-08-2016(online)].pdf 2016-08-23
10 Form 26 [24-08-2016(online)].pdf 2016-08-24
10 Drawing [23-08-2016(online)].pdf 2016-08-23
11 Form 20 [23-08-2016(online)].jpg 2016-08-23
11 Form 18 [24-08-2016(online)].pdf 2016-08-24
12 Form 3 [23-08-2016(online)].pdf 2016-08-23
12 abstract201641028677.jpg 2016-08-31
13 OTHERS [20-09-2016(online)].pdf 2016-09-20
13 Form 5 [23-08-2016(online)].pdf 2016-08-23
14 Form 9 [23-08-2016(online)].pdf 2016-08-23
14 201641028677-Correspondence-Assignment-260816.pdf 2016-09-27
15 Form 9 [23-08-2016(online)].pdf_229.pdf 2016-08-23
15 201641028677-Assignment-260816.pdf 2016-09-27
16 Power of Attorney [23-08-2016(online)].pdf 2016-08-23
16 201641028677-FER.pdf 2016-10-26
17 PROOF OF RIGHT [23-08-2016(online)].pdf 2016-08-23
17 201641028677-AbandonedLetter.pdf 2017-07-18

Search Strategy

1 SearchStrategy_25-10-2016.pdf
2 SearchStrategy_25-10-2016.pdf