Sign In to Follow Application
View All Documents & Correspondence

System And Method For Entrance Mangement And Tracking Visitors

Abstract: A system and method for entrance management and visitor tracking is provided. The method includes receiving information corresponding to one or more visitors from a mobile device of a first resident (102). Further, generating a password and communicating the password to each of the one or more visitors. Thereafter, receiving the password from a mobile device of a security personnel (110), and identifying a visitor among the one or more visitors based on the received password from the mobile device of the security personnel (110). Further, computing rating for the identified visitor based on feedback information stored in a database (106) associated with the server computer (104). Finally, communicating the received information and computed rating of the identified visitor to the mobile device of the security personnel (110). Reference figure: FIG. 4

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
23 August 2016
Publication Number
37/2016
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
ipo@invntree.com
Parent Application

Applicants

VIVISH TECHNOLOGIES PRIVATE LIMITED
Flat No: P-703, Rohan Jharoka-Ii, Yemalur, Kempapura Main Road, Bengaluru-560037

Inventors

1. ARISETTY VIJAY KUMAR
Flat No: P-703, Rohan Jharoka-II, Yemalur, Kempapura Main Road, Bengaluru-560037

Specification

Description:Field of invention:

[0001] The subject matter in general relates to the field of security systems for closed enclaves. More particularly, but not exclusively, the subject matter relates to entrance management and tracking of visitors for closed enclaves.
Discussion of related art:
[0002] Burglary, break-in, crime have all been the prevalent issues in the present society and issues related to security may arise any time, with consequences being grave. This makes security an important aspect across all walks of life. In light of this a good security system in place would help to ensure the overall safety and possessions of all individuals are comprehensively protected.
[0003] Conventional security systems have an entrance management system that enables the residents to view and allow the visitors using a video camera. Also there are systems that let the residents talk to the visitor over an intercom, and upon authenticating, notifying the security guard to allow the visitor. Some modern security systems have password enabled access control that allows the visitors to enter the secured area only upon the authentication of the visitor. But the problem with these security systems are that the password can be used again and again and any visitor can enter the closed enclave using the same password.
[0004] More often than not, visitors may take longer time in reaching the intended place. This may happen due to various reasons such as a senior citizen seeking some help, due to some work in progress, and the visitor indulging in some illegal activity. In such scenarios, it is necessary to keep the security personnel and the residents informed. Additionally, some behavioural information about the visitors will help the security personnel and the residents to take precautionary actions.
[0005] In view of the foregoing discussion, there is a need for an improved
entrance management and visitor tracking technique.
SUMMARY
[0006] Accordingly, an improved technique to overcome the above problems is needed. To fulfill this need, a system and method for entrance management and tracking of visitors is provided. In an embodiment, the method includes the steps of receiving information of a visitor from a resident device. Further, sending, to a device of the visitor, a password corresponding to the entrance of a closed enclave. Further, receiving, the password from a security device corresponding to the visitor. Further, identifying the visitor, corresponding to the password. Further, receiving, from a second security device, the password and a time stamp corresponding to the visitor. Further, raising an alert, if the password entered by the visitor is incorrect or the visitor does not show up at the second security device after entering the password at the entrance within a predetermined time. Further, compute and communicate the feedback of the visitor, to the security device.
[0007] In another embodiment, a system for entrance management and tracking of visitors is provided. The system comprises one or more processors that are operable to receive information corresponding to the visitor from the resident device. Further, generate and communicate, to the visitor device the password corresponding to the entrance of the closed enclave. Further, receive the password from the security device at the entrance of the closed enclave. Further, identify the visitor based on the password received from the security device. Further, raise an alert, if the password is not received within a predetermined time or if an incorrect password is received from a second security device. Further, compute and communicate the feedback of the visitor, received from the resident device, to the security device.
[0008] In yet another embodiment, a non-transitory computer readable medium for entrance management and tracking of visitors is provided. The non-transitory computer readable medium includes a set of instructions for entrance management and tracking visitors. The instructions when executed by a processor cause the processor to perform steps including: receiving visitor information from the device of the resident. Further, generate and communicate the password corresponding to the entrance of the closed enclave, to the visitor device. Further, receive the password from the security device at the entrance of the closed enclave and identify the visitor. Further, raise an alert if the password obtained is wrong or if the password is not obtained from the second security device within a predetermined time. Further, compute and communicate the feedback of the visitor, received from the resident device, to the security device.
[0009] Other objects, features, and advantages of the present invention may become apparent from the following detailed description. It should be understood that however, the detailed description and specific examples, while indicating preferred embodiments of the present invention, are given by way of illustration only and various modifications may naturally be performed without deviating from the present invention.
BRIEF DESCRIPTION OF DIAGRAMS
[0010] Embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
[0011] FIG. 1 is an exemplary architecture of a system 100 for entrance management and tracking, in accordance with an embodiment;
[0012] FIG. 2 is an exemplary block diagram of a resident device 102 of the system 100, in accordance with an embodiment;
[0013] FIG. 3 is an exemplary block diagram of a server computer 104 of the system 100, in accordance with an embodiment;
[0014] FIG. 4 is a flowchart of an exemplary method 400 for entrance management and tracking, in accordance with an embodiment;
[0015] FIG. 5A, 5B and 5C illustrate an exemplary user interface 502 on the resident device 102 of the system 100, in accordance with an embodiment.
[0016] FIG. 6A and 6B illustrate an exemplary user interface 602 on a security device 110 of system 100, in accordance with an embodiment.


DETAILED DESCRIPTION OF THE INVENTION
[0017] The following detailed description includes references to the accompanying drawings, which form part of the detailed description. The drawings show illustrations in accordance with example embodiments. These example embodiments are described in enough details to enable those skilled in the art to practice the present subject matter. However, it may be apparent to one of ordinary skill in the art that the present invention may be practised without these specific details. In other instances, well-known methods, procedures and components have not been described in detail so as not to unnecessarily obscure aspects of the embodiments. The embodiments can be combined, other embodiments can be utilized or structural and logical changes can be made without departing from the scope of the invention. The following detailed description is, therefore, not to be taken as a limiting sense.
[0018] In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a non-exclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated.
[0019] It should be understood that the capabilities of the invention described in the present disclosure and elements shown in the figures may be implemented in various forms of hardware, firmware, software, recordable medium or combinations thereof.
[0020] The embodiments disclose technique for entrance management and tracking of visitors. For example, an embodiment provides a system and method for a visitor to enter a closed enclave and keep a track of his whereabouts within the closed enclave, when a visitor is invited by a resident or an occupant of the closed enclave. Specifically, the system includes a server computer configured to receive details about the visitor, from the resident. Thereafter, the visitor may receive a password to enter the closed enclave. The visitor may then enter the password at the entrance of the closed enclave using a security device. The server computer may then identify the visitor based on the received password.
[0021] Thereafter, the visitor may use the same password at one or more check points on the way to the resident location. In case the password is used at an unauthorized checkpoint the server computer may alert a security personnel. Further, the server computer may also raise an alert in case the visitor, after passing through the checkpoint, has not reached the next destined checkpoint within a predetermined time. Thereafter, the server computer may request for feedback from the resident, and collate such received feedbacks of the visitor from multiple residents, which may be used to notify the resident in case the same visitor revisits the closed enclave.
[0022] FIG. 1 is an exemplary architecture of a system 100 for entrance management and tracking, in accordance with an embodiment. The system 100 may include a resident device 102, a server computer 104, a database 106, a visitor device 108, a security device 110, a closed enclave 112 and a communication network 114.
[0023] The resident device 102, the server computer 104, the visitor device 108, and the security device 110 may communicate with each other through the communication network 114. The database 106 may be communicably coupled to the server computer 104.
[0024] The resident device 102, the visitor device 108 and the security device 110 may include smart phones, PDAs, tablet PCs, notebook PCs, laptops and computers, among other computing devices. In an embodiment, the resident device 102, the visitor device 108 and the security device 110 may include any electronic device equipped with a browser to communicate with the server computer 104.
[0025] FIG. 2 is an exemplary block diagram of the resident device 102 of the system 100, in accordance with an embodiment. The resident device 102 may include a processing module 202, a memory module 204, an input/output module 206, a display module 208, a communication interface 210, a bus 214 interconnecting all the modules of the resident device 102, and an application module 212.
[0026] The application module 212 on the resident device 102, may send or receive information corresponding to the one or more visitors to the server computer 104 through the communication network 114. It may also communicate with additional servers through the communication network 114.
[0027] The processing module 202 is implemented in the form of one or more processors and may be implemented as appropriate in hardware, computer-executable instructions, firmware, or combinations thereof. Computer-executable instruction or firmware implementations of the processing module 202 may include computer-executable or machine-executable instructions written in any suitable programming language to perform the various functions described.
[0028] The memory module 204 may include a permanent memory such as hard disk drive, may be configured to store data, and executable program instructions that are implemented by the processing module 202.
[0029] The memory module 204 may be implemented in the form of a primary and a secondary memory. The memory module 204 may store additional data and program instructions that are loadable and executable on the processing module 202, as well as data generated during the execution of these programs. Further, the memory module 204 may be a volatile memory, such as a random access memory and/or a disk drive, or a non-volatile memory. The memory module 204 may comprise of removable memory such as a Compact Flash card, Memory Stick, Smart Media, Multimedia Card, Secure Digital memory, or any other memory storage that exists currently or may exist in the future.
[0030] The input/output module 206 may provide an interface for input devices such as keypad, touch screen, mouse, and stylus among other input devices; and output devices such as speakers, printer, and additional displays among others. The input/output module 206 may be used to show received data from the server computer 104 or send instruction data between the resident device 102 and the server computer 104, through the communication interface 210.
[0031] The display module 208 may be configured to display content. The display module 208 may also be used to receive an input from a user. The display module 208 may be of any display type known in the art, for example, Liquid Crystal Displays (LCD), Light Emitting Diode (LED) Displays, Cathode Ray Tube (CRT) Displays, Orthogonal Liquid Crystal Displays (OLCD) or any other type of display currently existing or which may exist in the future. The display module 208 may be used to display the data exchanged between the server computer 104 and the resident device 102.
[0032] The communication interface 210 may provide an interface between the communication network 114 and the resident device 102. The communication interface 210 may include a modem, a network interface card (such as Ethernet card), a communication port, and a Personal Computer Memory Card International Association (PCMCIA) slot, among others. The communication interface 210 may include devices supporting both wired and wireless protocols. Data in the form of electronic, electromagnetic, optical, among other signals may be transferred via the communication interface 210.
[0033] In an embodiment, the visitor device 108 and the security device 110 of the system 100 may be similar to the resident device 102, and may include the similar components as that of the resident device 102.
[0034] FIG. 3 is an exemplary block diagram of the server computer 104 of the system 100, in accordance with an embodiment. The server computer 104 includes a processing module 302, a memory module 304, an input/output module 306, a communication interface 308, a bus 312 interconnecting all the modules of the server computer 104, and an entrance management module 310.
[0035] The processing module 302, memory module 304, input/output module 306, communication interface 308 and bus 312 are similar to the processing module 202, memory module 204, input/output module 206, communication interface 210 and bus 214 of the resident device 102, respectively.
[0036] The entrance management module 310 may analyse, verify and authenticate the visitor and the information corresponding to the visitor based on the information stored in the database 106 and received from one or more resident devices 102 or one or more external sources.
[0037] The communication network 114 may include a wired network, a wireless network, or a combination of wired network and wireless network. For example, the communication network 114 may include local area network, wide area network, and metropolitan area network, among others.
[0038] Referring to FIG. 1, the database 106 is external to the server computer 104. However, it is possible to implement the database 106 and the server computer 104 in a single system, or to have the database 106 and the server computer 104 at a single location with wired or wireless communication there between. The database 106 may include details of previous visits by the visitors, their behavioural analysis data, and visitors’ feedback from residents, among other data. Further, the database 106 may be populated by receiving information from one or more external information sources. The one or more external information sources may include social media servers, e-commerce servers, news portals, government portals and job portals among others. Alternatively, the server computer 104 may access the one or more external information sources in real time to eliminate the need of the database 106. Further, multiple server computers 104 and multiple databases 106 may be implemented to improve redundancy.
[0039] In an embodiment, the server computer 104 may include one or more processors, a memory coupled to the one or more processors, and a communication interface 308. The server computer 104 may communicate with one or more external sources, one or more resident devices 102, one or more visitor devices 108 and one or more security devices 110 through the communication interface 308. The communication interface 308 of the server computer 104 may be connected to the communication network 114.
[0040] In an embodiment, the application module 212 of the resident device 102 may communicate with the server computer 104 via the communication network 114. The application module 212 enables the resident to add the visitor and the information corresponding to the visitor via the display module 208 and the input/output module 206 in the resident device 102. Additionally, a visit detail corresponding to the visitors can be added using the application module 212. Additionally, the application module 212 may enable the resident to add one or more visitors.
[0041] In an embodiment, the information corresponding to the visitor may include identification details of the visitor, a contact number of the visitor, photograph, name, address, purpose of visit, approximate time of stay, and other details. Further, the visit details of the visitor may include location, the day, and the timeslot during which the visitor is expected. These details may be added using the input/output module 206 of the resident device 102 and may be communicated to the server computer 104 using the communication interface 210.
[0042] Further, the application module 212 may store the data corresponding to the visitor in the memory module 204, for future references. Additionally, the server computer 104 may store the data communicated by the resident device 102, in the memory module 304 and/or the database 106.
[0043] In an embodiment, the processing module 302 of the server computer 104 may generate and communicate a password to the visitor device 108 using the communication interface 308.
[0044] In an embodiment, the server computer 104 may send the generated password to the visitor device 108 via an email, text message, voice call, a popup on the display screen, and to an application running on the visitor device 108, among other ways. Additionally, the password may be delivered to the visitor’s address via one or more known mediums such as courier and post among others.
[0045] The password may be of different forms, for example a random alpha-numeric password, face recognition, visitor’s biometrics, and lock pattern, among others.
[0046] In an embodiment, the server computer 104, may allow a random user to purchase goods and/or services from the resident device 102. Further, the server computer 104 may identify a unique identification number associated with the resident device 102 of the random user, and determine the address of the random user by accessing the database 106 and/or one or more external sources.
[0047] In an embodiment, the unique identification number may include one or more of the device identification number, mobile number, International Mobile Subscriber Identity (IMSI) number, International Mobile Station Equipment Identity (IMEI) number, and Subscriber Identity Module (SIM) number, among others.
[0048] Further, the server computer 104 may identify a delivery personnel assigned to deliver the purchased goods and/or services, from a delivery company. Further, the server computer 104 may generate and communicate the password to a mobile device of the delivery personnel 108. Additionally, the server computer 104 may also send the identified address of the random user along with the location co-ordinates to the mobile device of the delivery personnel 108.
[0049] Further, the server computer 104, when the password is received from one or more security devices 110 within the closed enclave 112, may validate the password in case the visitor is expected at that time. Additionally, the sever computer 104 may not validate the password in case the visitor is not expected at that time, also a message may be displayed for the visitor indicating the same on the security device 110.
[0050] Additionally, the server computer 104 may set a validity to the generated password, to a predetermined number of times. In an embodiment, the predetermined number of times may be determined based on the number of security devices 110 that the visitor has to pass through, to reach the resident’s destination. In an embodiment, in case of multiple security devices 110, the server computer 104 may set the validity of the generated password to the predetermined number of times for each of the multiple security devices 110.
[0051] Further, the server computer 104 may receive feedback for each of the visitors from the resident through the resident device 102. The server computer 104 may collate the feedback for the visitor received from one or more residents. In an embodiment, the feedback received from the resident may include an overall rating, one or more comments, and/or a separate rating for one or more predefined categories, among others. Further, the server computer 104 may prepare an aggregated feedback report for the visitor, which includes the server computer 104 calculated overall rating and/or received comments from one or more residents.
[0052] In an embodiment, the server computer 104 may share the aggregated feedback report with the residents who invite the visitor and/or a security personnel operating the security device 110. The feedback may be retrieved and/or calculated by the server computer 104 by receiving data from the database 106, and sent to the security device 110 along with the information corresponding to the visitor when the visitor enters the password in the security device 110 at the entrance of the closed enclave 112.
[0053] In an embodiment, the server computer 104 may identify the visitor based on the password received from the security device 110 of the security personnel, at the entrance of the closed enclave 112. In an embodiment, the closed enclave 112 may be gated residential communities, schools, colleges, work spaces, hostels, hotels among others.
[0054] Further, the security device 110 at the entrance of the closed enclave 112 may be a handheld security device 110 that may be operable by the security personnel, or may also be a security device 110 which may be wall mounted at the entrance and/or other areas within the closed enclave 112.
[0055] In an embodiment, the server computer 104 may raise an alert in case the password is not received within the predetermined time from the security device 110, at the immediate next checkpoint, after receiving the password from the security device 110 located at the entrance of the closed enclave 112.
[0056] Since, it is understood that there can be multiple such security devices 110, between the entrance of the closed enclave 112 to the resident’s location, within the closed enclave 112, alternatively, the server computer 104 may raise the alert in case the password is received from an unauthorised security device 110. Additionally, in such a scenario the server computer 104 may notify the resident who invited the visitor, and/or the security personnel about the location of the expected visitor. Additionally, the server computer 104 may then provide the visitor an extended time to enter the password at a second security device 110, failing which the alert would be raised.
[0057] In an embodiment, the server computer 104 may timely update the predetermined time for reaching from one checkpoint to other checkpoint within the closed enclave 112 based on the time taken by past visitors, any work in progress, or other details of the visitor such as age, and gender, among other factors.
[0058] In an embodiment, the application module 212 of the resident device 102 may communicate with the server computer 104 via the communication network 114. The server computer 104 may receive information corresponding to the visitor from the resident device 102.
[0059] In an embodiment, the server computer 104 may receive the password and a first time stamp from the visitor using a first security device 110. The first security device 110 may be the device located at the main entrance of the closed enclave 112, and may be operated by the security personnel. The server computer 104 may identity the visitor based on the received password from the first security device 110.
[0060] In an embodiment, the server computer 104 may receive the password and a second time stamp from the second security device 110. The server computer 104 may save the time stamp at every checkpoint corresponding to the visitor, in the database 106. This data may be retrieved by the server computer 104 for future references, for example, in determining the predetermined time for the visitor to reach from the first security device 110 to the second security device 110.
[0061] In an embodiment, the server computer 104 may raise the alert in case the password is not received from the second security device 110 within the predetermined time after receiving the password from the first security device 110.
[0062] In an embodiment, the server computer 104 after receiving a wrong password may wait for the predetermined time before raising the alert. Such that, the visitor may re-enter the password correctly. The server computer 104, may similarly wait until a predetermined number of wrong entries from the visitor before raising the alert.
[0063] In an embodiment, the server computer 104 may not immediately raise the alert, if the password is not received from the second security device 110 within the predetermined time after receiving the password from the first security device 110, but may provide a buffer time for the visitor to enter the password.
[0064] FIG. 4 is a flowchart of an exemplary method 400 for entrance management and tracking of visitors, in accordance with an embodiment. The method 400 may be implemented by the server computer 104. At step 402, the resident may add and invite the visitor or multiple visitors using the application module 212, through the input/output module 206. Additionally, the information corresponding to the visitor may be added by the resident. The server computer 104 may then receive the information from the resident device 102 using the communication interface 210.
[0065] At step 404, the server computer 104 may generate and communicate the password to the visitor device 108. The generated and communicated password may be valid only for a timeslot during which the visitor is expected. Further, the validity of the password is set by the server computer 104, using the processing module 302, to predetermined number of time.
[0066] At step 406, the password and the first time stamp is received by the security device 110 at the entrance of the closed enclave 112. Since there can be multiple such security devices 110 within the closed enclave 112, for sake of easy understanding the security device 110 at the entrance of the closed enclave 112 is sometimes referred to as the first security device 110.
[0067] In an embodiment, the security device 110 at the entrance of the closed enclave 112 may be the handheld security device 110 that may be operable by the security personnel, or may also be the security device 110 which may be wall mounted at the entrance of the closed enclave 112.
[0068] At step 408, the visitor is identified by the server computer 104 based on the password received from the security device 110 or the first security device 110 at the entrance of the closed enclave 112.
[0069] At step 410, the password and the second time stamp is received by the server computer 104 from the second security device 110. This is stored as visitor tracking data by the server computer 104 in the database 106 and can be retrieved anytime by the server computer 104.
[0070] At step 412, the alert is raised by the server computer 104 in case the password is not retrieved from the second security device 110 within the predetermined time after the password has been received from the first security device 110. In an embodiment, the second security device 110 may be the security device 110 that falls along the way of the visitor's intended path to the destination i.e. invited resident’s location within the closed enclave 112.
[0071] In an embodiment, the alert is raised by the server computer 104 in case the password of the identified visitor is received from the unauthorized security device 110, wherein the identified visitor is not authorized entry.
[0072] Further, once the visitor exits the closed enclave 112, at step 414, the resident may communicate the feedback of the visitor to the server computer 104 using the resident device 102, which may be stored in the database 106 by the server computer 104. The server computer 104 may then compute an aggregated feedback based on all such feedbacks received from multiple residents using the processing module 302.
[0073] Further, at step 416, the computed rating of the identified visitor along with the information corresponding to the visitor is sent to the security device 110 by the server computer 104.
[0074] Figs. 5A, 5B and 5C illustrate an exemplary user interface 502 on the resident device 102, in accordance with an embodiment. The resident device 102 may be provided with the user interface 502 to communicate with the server computer 104.
[0075] FIG. 6A and 6B illustrates an exemplary user interface 602 on the security device 110, in accordance with an embodiment. The security device 110 may be provided with the user interface 602 to communicate with the server computer 104.
[0076] The user interface 502 on the resident device 102 provides the resident with an option to “Invite a friend” or to “Invite a service provider.” In case the visitor chooses to “Invite a friend” a pop-up 504 may show up on the user interface 502 as shown in Fig. 5A to select between “Choose an existing visitor” or “New visitor”.
[0077] Alternatively, in case the resident chooses to “Invite a service provider”, the server computer 104 may display a popup (not shown in figures) with options to choose an existing service provider or to invite a new service provider. In an embodiment, the service providers may include a daily maid, milk boy, newspaper boy, and other people who very frequently visit. The resident may be able to change information pertaining to the service providers and/or friends at anytime using the application module 212 installed in the resident device 102.
[0078] Further, in case the resident chooses “New visitor”, the user interface 502 on the resident device 102 may display a page 506 to receive the information corresponding to the visitor as shown in the FIG. 5B. The resident may enter the details of the visitor, which may include identification details of the visitor, a contact number, a timeslot during which the visitor is expected along with other details.
[0079] Further, the received details are shared with the server computer 104, which upon receiving may generate and communicate the password to the visitor device 108.
[0080] Further, if the resident orders items from an ecommerce site using the resident device 102, the server computer 104 may receive such information from the respective ecommerce server and identify the resident based on the unique identification number associated with the resident device 102. The server computer 104 may then obtain details of the delivery personnel from the delivery company and would communicate the determined address of the resident and the password to the delivery personnel, without depending on the residents request to invite.
[0081] The password communicated to the visitor device 108 by the server computer 104 can only be used for the given timeslot and at predetermined number of places. The timeslot is processed by the processing module 302 of the server computer 104, depending upon the information given by the resident, whereas the number of times the password can be used is processed by the server computer 104 depending on the resident address and the number of checkpoints the visitor has to cross before reaching the resident house.
[0082] Later when the visitor shows up at the entrance of the closed enclave 112, he may be instructed by the security personnel to enter the password using the keypad 604 laid out on the user interface 602, on the security device 110 as shown in the FIG. 6A. In some closed enclaves 112 there may not be the security personnel but there would only be the security device 110 attached to the wall or some other means and the visitor or the delivery personnel or the service provider is required to enter the password on the security device 110 to gain access into the closed enclave 112.
[0083] Further, in case the password entered by the visitor is recognized by the server computer 104, it may send the information corresponding to the identified visitor to the security device 110 as shown in the FIG. 6B. The security personnel at the entrance of the closed enclave 112, upon verifying the information may let the visitor in. Alternatively, in case the visitor enters the wrong password, the server computer 104 may fail to identify the visitor and may send a message to the security device 110 saying the password is not valid. Upon receiving the message, the security personnel may restrict the entry of the visitor to the closed enclave 112.
[0084] Additionally, the security device 110 may also request the visitor to input details of his/her belongings, which may be manually verified by the security personnel.
[0085] The visitor can use the communicated password to ring the doorbell of the resident house.
[0086] The visitor after entering the password at the entrance of the closed enclave 112 may be required to enter his/her password at the subsequent security device 110 (at the next checkpoint) on the way to the resident’s house. The next checkpoint may be the entrance to a particular block. The visitor may be required to input his/her password at the next check point within the predetermined time after entering the closed enclave 112 to prevent the server computer 104 from raising the alert. This may ensure that the visitor is not indulging in any other illegal activities.
[0087] In case the visitor reaches the checkpoint and inputs a wrong password, the visitor may be given a preset number of chances to enter the right password, after which the alert may be generated to notify the resident who invited the visitor and the security personnel.
[0088] As and when the visitor enters the password at various locations, a time stamp is also recorded by the server computer 104 and stored in the database 106. This data is used to time track the visitors and used to set the predetermined time for reaching from one security device 110 to another security device 110 within the closed enclave 112, among other purposes.
[0089] After the visitor leaves, the server computer 104 may send a pop-up, 508 to the resident device 102 asking for feedback for the visitor as shown in the FIG. 5C. After the feedback has been filled and sent, the server computer 104 may compute the collective rating based on various feedbacks obtained by the resident devices 102 and store in the database 106.
[0090] The next time when the same visitor enters the closed enclave 112 the server computer 104 may send the visitor details along with the visitor rating to the security device 110. Thereafter, based on the rating, the security personnel may choose to take necessary action.
[0091] The present invention overcomes the drawbacks of the conventional security systems, by providing an improved security system. The present invention as discussed in this document with respect to different embodiments may be advantageous at least in providing the resident or the occupant, a safe and secure feeling, within the closed enclave. This is enabled by securing the premises with an entrance management system that receives information of the visitor from the resident and provides a unique password to the visitor, every single time he visits the closed enclave. This is advantageous in eliminating the possibility of the visitor entering the closed enclave, without the resident’s permission. Further, it is advantageous in having a track of the visitor within the closed enclave which reduces the risk of visitors involving in illegal activities. Additionally, it is advantageous in providing a secure environment, by intimating the resident about the behavioural analysis of the visitors. Additional advantages not listed may be understood by a person skilled in the art in light of the embodiments disclosed above.
[0092] It shall be noted that the processes described above are described as sequence of steps; this was done solely for the sake of illustration. Accordingly, it is contemplated that some steps may be added, some steps may be omitted, the order of the steps may be re-arranged, or some steps may be performed simultaneously.
[0093] Although embodiments have been described with reference to specific example embodiments, it may be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the system and method described herein. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense.
[0094] Many alterations and modifications of the present invention may no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. It is to be understood that the description above contains many specifications; these should not be construed as limiting the scope of the invention but as merely providing illustrations of some of the personally preferred embodiments of this invention. Thus the scope of the invention should be determined by the appended claims and their legal equivalents rather than by the examples given.

Claims:We claim
1. An entrance management method, the method comprising:
receiving, using a server computer (104), information corresponding to one or more visitors from a mobile device of a first resident (102);
generating and communicating, using the server computer (104), a password to each of the one or more visitors;
receiving the password, using the server computer (104), from a mobile device of a security personnel (110);
identifying a visitor among the one or more visitors, using the server computer (104), based on the received password from the mobile device of the security personnel (110);
computing, using the server computer (104), rating for the identified visitor based on feedback information stored in a database (106) associated with the server computer (104); and
communicating, using the server computer (104), the received information and computed rating of the identified visitor to the mobile device of the security personnel (110).

2. The entrance management method according to claim 1, wherein the information corresponding to the visitor among the one or more visitors may include identification details of the visitor, a contact number of the visitor, and a timeslot during which the visitor is expected.

3. The entrance management method according to claim 2, wherein the generated and communicated password is valid only for the timeslot during which the visitor is expected.

4. The entrance management method according to claim 3, further comprising setting, using the server computer (104), the validity of the password to a predetermined number of times.

5. The entrance management method according to claim 1, wherein the generated password is communicated to a mobile device of the visitor (108).

6. The entrance management method according to claim 1, further comprising:
identifying, using the server computer (104), a unique identification number associated with the mobile device of the first resident (102);
determining, using the server computer (104), an address of the first resident based on the unique identification number; and
communicating the determined address to a mobile device of the visitor (108) among the one or more visitors.

7. The entrance management method according to claim 1, further comprising:
receiving, using the server computer (104), a purchase order from the mobile device of the first resident (102);
identifying, using the server computer (104), a unique identification number associated with the mobile device of the first resident (102); and
generating and communicating, using the server computer (104), a password to a mobile device of a delivery personnel (108).

8. The entrance management method according to claim 1, further comprising:
receiving, using the server computer (104), a feedback for the identified visitor from the mobile device of the first resident (102).

9. The entrance management method according to claim 1, further comprising:
raising an alert, using the server computer (104), in case the password is not received from a security device (110) within a predetermined time after receiving the password from the mobile device of the security personnel (110).

10. The entrance management method according to claim 1, further comprising raising an alert, using the server computer (104), in case the password of the identified visitor is received from a third security device (110), wherein the identified visitor is not authorized for the third security device (110).

11. A visitor tracking method, the method comprising:
receiving, using a server computer (104), information corresponding to a visitor from a mobile device of a resident (102);
generating and communicating, using the server computer (104), a password to a mobile device of the visitor (108);
receiving, using the server computer (104), the password and a first time stamp from a first security device (110);
identifying, using the server computer (104), the visitor based on the received password from the first security device (110);
receiving, using the server computer (104), the password and a second time stamp from a second security device (110); and
raising an alert, using the server computer (104), in case the password is not received from the second security device (110) within a predetermined time after receiving the password from the first security device (110).

12. The visitor tracking method according to claim 11, further comprising raising the alert, using the server computer (104), in case the password of the identified visitor is received from a third security device (110), wherein the visitor is not authorized for the third security device (110).

13. An entrance management system, the system comprising:
one or more processors (302) configured to:
receive information corresponding to one or more visitors from a mobile device of a first resident (102);
generate and communicate a password to each of the one or more visitors;
receive the password from a mobile device of a security personnel (110);
identify a visitor among the one or more visitors based on the received password from the mobile device of the security personnel (110);
compute rating for the identified visitor based on feedback information stored in a database (106) associated with the server computer (104); and
communicate the received information and computed rating of the identified visitor to the mobile device of the security personnel (110).

14. The entrance management system according to claim 13, wherein the information corresponding to the visitor among the one or more visitors may include identification details of the visitor, a contact number of the visitor, and a timeslot during which the visitor is expected.

15. The entrance management system according to claim 14, wherein the generated and communicated password is valid only for the timeslot during which the visitor is expected.

16. The entrance management system according to claim 15, the one or more processers are further configured to set validity of the password to a predetermined number of times.

17. The entrance management system according to claim 13, wherein the generated password is communicated to a mobile device of the visitor (108).

18. The entrance management system according to claim 13, wherein the one or more processors (302) are further configured to:
identify a unique identification number associated with the mobile device of the first resident (102);
determine an address of the first resident based on the unique identification number; and
communicate the determined address to a mobile device of the visitor (108) among the one or more visitors.

19. The entrance management system according to claim 13, wherein the one or more processors (302) are further configured to:
receive a purchase order from the mobile device of the first resident (102);
identify a unique identification number associated with the mobile device of the first resident (102); and
generate and communicate the password to a mobile device of a delivery personnel (108).

20. The entrance management system according to claim 13, wherein the one or more processors (302) are further configured to receive a feedback for the identified visitor from the mobile device of the first resident (102).

21. The entrance management system according to claim 13, wherein the one or more processors (302) are further configured to raise an alert in case the password in not received from a security device (110) within a predetermined time after receiving the password from the mobile device of the security personnel (110).

22. The entrance management system according to claim 13, wherein the one or more processors (302) are further configured to raise an alert in case the password of the identified visitor is received from a third security device (110), wherein the identified visitor is not authorized for the third security device (110).

Documents

Application Documents

# Name Date
1 201641028675-AbandonedLetter.pdf 2017-07-07
1 PROOF OF RIGHT [23-08-2016(online)].pdf 2016-08-23
2 201641028675-FER.pdf 2016-09-28
2 Power of Attorney [23-08-2016(online)].pdf 2016-08-23
3 Form 9 [23-08-2016(online)].pdf_193.pdf 2016-08-23
3 201641028675-Assignment-260816.pdf 2016-09-27
4 Form 9 [23-08-2016(online)].pdf 2016-08-23
4 201641028675-Correspondence-Assignment-260816.pdf 2016-09-27
5 Form 5 [23-08-2016(online)].pdf 2016-08-23
5 201641028675-Correspondence-PA-260816.pdf 2016-09-27
6 Form 3 [23-08-2016(online)].pdf 2016-08-23
6 201641028675-Power of Attorney-260816.pdf 2016-09-27
7 OTHERS [20-09-2016(online)].pdf 2016-09-20
7 Form 20 [23-08-2016(online)].jpg 2016-08-23
8 Drawing [23-08-2016(online)].pdf 2016-08-23
8 abstract201641028675 .jpg 2016-08-31
9 Description(Complete) [23-08-2016(online)].pdf 2016-08-23
9 Form 18 [24-08-2016(online)].pdf 2016-08-24
10 Description(Complete) [23-08-2016(online)].pdf 2016-08-23
10 Form 18 [24-08-2016(online)].pdf 2016-08-24
11 abstract201641028675 .jpg 2016-08-31
11 Drawing [23-08-2016(online)].pdf 2016-08-23
12 Form 20 [23-08-2016(online)].jpg 2016-08-23
12 OTHERS [20-09-2016(online)].pdf 2016-09-20
13 201641028675-Power of Attorney-260816.pdf 2016-09-27
13 Form 3 [23-08-2016(online)].pdf 2016-08-23
14 201641028675-Correspondence-PA-260816.pdf 2016-09-27
14 Form 5 [23-08-2016(online)].pdf 2016-08-23
15 201641028675-Correspondence-Assignment-260816.pdf 2016-09-27
15 Form 9 [23-08-2016(online)].pdf 2016-08-23
16 201641028675-Assignment-260816.pdf 2016-09-27
16 Form 9 [23-08-2016(online)].pdf_193.pdf 2016-08-23
17 201641028675-FER.pdf 2016-09-28
17 Power of Attorney [23-08-2016(online)].pdf 2016-08-23
18 PROOF OF RIGHT [23-08-2016(online)].pdf 2016-08-23
18 201641028675-AbandonedLetter.pdf 2017-07-07

Search Strategy

1 GooglepatentSearchStrategy_23-09-2016.pdf
1 PatSeer_23-09-2016.pdf
2 GooglepatentSearchStrategy_23-09-2016.pdf
2 PatSeer_23-09-2016.pdf