Sign In to Follow Application
View All Documents & Correspondence

System And Method For Securing Computing Devices In Retail And Commercial Establishments Against Theft

Abstract: A system and method for securing computing devices in retail and commercial establishments against theft is provided. The system (i) generates an alert using an inbuilt speaker in corresponding computing device and (ii) captures an image of one or more users 104A-N using a camera of the one or more computing devices 102A-N when at least one of (a) the one or more users 104A-N unplugged the one or more computing devices 102A-N from one or more charging cables 106A-N and (b) the motion is detected using an accelerometer. The system generates the alert when the one or more computing devices 102A-N are force shutdown or switched off by the one or more users 104A-N even the one or more charging cables 106A-N are plugged with or unplugged from the one or more computing devices 102A-N.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
09 September 2018
Publication Number
11/2020
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
arjun@myipstrategy.com
Parent Application

Applicants

ENTASIS TECHNOLOGY PRIVATE LIMITED
B46, SECOND FLOOR, OKHLA PHASE 1 NEW DELHI-110019, INDIA.

Inventors

1. MANISH CHANDRA
B46 SECOND FLOOR, OKHLA PHASE 1, NEW DELHI-110019, India
2. NIKHIL CHHABRA
B46 SECOND FLOOR, OKHLA PHASE 1, NEW DELHI-110019, India

Specification

Embodiments of this disclosure generally relate to secure computing devices, more particularly, to a system and method for securing the computing devices in retail and commercial establishments against theft and providing device usage analytics to a retailer.
Description of the Related Art
[0002] Cell phones, tablet devices and other kinds of hand-held devices are commonly displayed for sale as an array of products at retail locations and in cell phone stores. Theft prevention and/or theft security is an ongoing issue for the merchants who sell these devices to the general public. Touch and feel and live demonstration are the means by which phones or tablets are experienced in the retail environment. They are prone to theft and shrinkage. World over they are secured using hardware harnesses which increases the cost of display. Expensive equipment needs to be purchased by retailer to showcase their products in the retail store front. In addition, the retailer gets no customer insight from these hardware devices.
[0003] In modern security systems, the tether is often a cord with one or more wires for providing device power to the puck and, also, power for security sensors to the puck. Short adaptor cables are then used to connect the power jack on the device to a similar fitting on the puck. It is common to use security sensors at the physical interface where the device contacts the puck. These sensors may take different forms, but in many cases, they consist of a spring-loaded push-button that is released when the device is removed from the puck. The button's release breaks an electric circuit that triggers an alarm. Sometimes, separate or "secondary" sensor cables, with similar sensors, connect

the puck to other kinds of device parts that have the capability of being independently removed from the device, without removing the device from the puck (e.g., a removable camera lens).
[0004] However, whatever form the alarm actually takes, the under-the-counter system provides the alarm functions in response to a circuit break between the under-the-counter system and the puck or a circuit break occurring at the puck level.
[0005] Accordingly, there remains a need for a system and method for securing computing devices in retail and commercial establishments against theft and providing device usage analytics to a retailer.
SUMMARY
[0006] In view of the foregoing, an embodiment herein provides a system for securing one or more computing devices in retail and commercial establishments. The system includes a sever that includes (i) a memory that stores a set of instructions and (ii) a processor that executes the set of instructions. The processor is configured to (i) obtain a login credential from a retailer device associated with a retailer to generate a unique password for at least one computing device, (ii) obtain status of a charging port, motion information and a status of a power button of the at least one computing device, (iii) analyse the status of the charging port of the at least one computing device to determine at least one of (a) a charging cable is connected with the charging port of the at least one computing device or (b) the charging cable is disconnected from the charging port of the at least one computing device, (iv) analyse the motion information to determine if motion is detected in the at least one computing device, (v) analyse the status of the power button of the at least one computing device to determine if the at least one computing device is switched off or shut down by a one or more users and (vi) generate an alert notification to (a) generate an alert sound at the at least one computing device and (b) capture an image of the one or more users using a camera of the at least one computing device when at least

one of (a) the one or more users unplug the charging cable from the at least one computing device, (b) the at least one computing device forcely shut down or switched off by the one or more users, or (iii) the motion is detected in the at least one computing device. The login credential includes a user name and a default password for the at least one computing device. The motion information is obtained using an accelerometer associated with the at least one computing device
[0007] In some embodiments, the at least one computing device (i) generates the alert sound using an inbuilt speaker associated with the at least one computing device and (ii) captures images of the one or more users when the alert notification is received from the server.
[0008] In some embodiments, the server (i) sends a request for a unique password to the retailer device associated with the retailer to stop the alert when the alert is generated at the at least one computing device, (ii) obtains the unique password from the retailer device associated with the retailer, (iii) analyses the unique password obtained from the retailer device associated with the retailer to determine if he unique password is valid, and (iv) sends a stop notification to the at least one computing device if the unique password obtained from the retailer device associated with the retailer is valid.
[0009] In some embodiments, the server determines a maximum interest of the one or more users in a retail outlet by analysing (i) log records, (ii) a number of times the images of the one or more users are captures, and (iii) a number of times the alert is stopped when the obtained unique password is valid.
[0010] In some embodiments, the server generates a report based on the maximum interest of the one or more users and communicates the report to the retailer device associated with the retailer to increase stock planning, productivity and sales of the retailer.
[0011] In an aspect, a method for securing a one or more computing devices in

retail and commercial establishments includes (i) obtaining a login credential from a retailer device associated with a retailer to generate a unique password for at least one computing device at a sever, (ii) obtaining a status of a charging port, motion information and a status of a power button of the at least one computing device at the server, (iii) analysing the status of the charging port of the at least one computing device to determine at least one of (a) a charging cable is connected with the charging port of the at least one computing device or (b) the charging cable is disconnected from the charging port of the at least one computing device at the server, (iv) analysing the motion information to determine if motion is detected in the at least one computing device at the server, (v) analysing the status of the power button of the at least one computing device to determine if the at least one computing device is switched off or shut down by a one or more users, and (vi) generating an alert notification to (a) generate an alert sound at the at least one computing device and (b) capture an image off the one or more users using a camera of the at least one computing device when at least one of (a) the one or more users unplug the charging cable from the at least one computing device, (b) the at least one computing device forcely shut down or switched off by the one or more users, or (c) the motion is detected in the at least one computing device.
[0012] In some embodiments, the at least one computing device (i) generating the alert sound using an inbuilt speaker associated with the at least one computing device at the computing device and (ii) capturing images of the one or more users when the alert notification is received from the server at the computing device.
[0013] In some embodiments, the server (i) sending a request for a unique password to the retailer device associated with the retailer to stop the alert when the alert is generated at the at least one computing device at the server, (ii) obtaining the unique password from the retailer device associated with the retailer at the server, (iii) analysing the unique password obtained from the retailer device associated with the retailer to

determine the unique password us valid and (iv) sending a stop notification to the at least one computing device if the unique password obtained from the retailer device associated with the retailer is valid at the server.
[0014] In some embodiments, the server determining a maximum interest of the one or more users in a retail outlet by analysing (i) the log records, (ii) a number of times the images of the one or more users are captured and (iii) a number of times the alert is stopped when the obtained unique password is valid at the server.
[0015] In some embodiments, the server generating a report based on the maximum interest of the one or more users and communicates the report to the retailer device associated with the retailer to increase stock planning, productivity and sales of the retailer.
[0016] The system and method are used to display the computing devices in their retail stores of the retailer with lower operating costs. The system and method encourage more retailers to display more computing devices in touch and feel format hence increasing sales. The system and method provide valuable analytics of the one or more users behaviour for numerous operational and marketing benefits.
[0017] These and other aspects of the embodiments herein will be better appreciated and understood when considered in conjunction with the following description and the accompanying drawings. It should be understood, however, that the following descriptions, while indicating preferred embodiments and numerous specific details thereof, are given by way of illustration and not of limitation. Many changes and modifications may be made within the scope of the embodiments herein without departing from the spirit thereof, and the embodiments herein include all such modifications.
BRIEF DESCRIPTION OF THE DRAWINGS
[0018] The embodiments herein will be better understood from the following

detailed description with reference to the drawings, in which:
[0019] FIG. 1 is a block diagram that illustrates securing one or more computing devices in retail and commercial establishments against theft according to some embodiments herein;
[0020] FIG. 2 is a block diagram of a server of FIG.l according to some embodiments herein;
[0021] FIG. 3 is a block diagram of a retailer device according to some embodiments herein;
[0022] FIG. 4 is a flow diagram that illustrates a method for theft detection of one or more computing devices according to some embodiments herein; and
[0023] FIGS. 5A-5C are flow diagram that illustrate a method for securing the one or more computing devices in the retail and commercial establishments against theft according to some embodiments herein.
DETAILED DESCRIPTION OF PREFERRED EMBODFMENTS
[0024] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0025] As mentioned, there remains a need for a system and method for securing computing devices in retail and commercial establishments against theft. The system and method further provide device usage analytics i.e. maximum interest of one or more users

at retailer outlet to a retailer. The embodiments herein achieve this by using a theft detection system to secure the computing devices in the retail and commercial establishments against theft. Referring now to the drawings, and more particularly to FIGS. 1 through 5C, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments.
[0026] FIG. 1 is a block diagram 100 that illustrates securing one or more computing devices 102A-N in retail and commercial establishments against theft according to some embodiments herein. The block diagram 100 view includes the one or more computing devices 102A-N, one or more users 104A-N, one or more charging cables 106A-N, a charging point 108, a retailer device 110, a retailer 112, a network 114 and a server 116. The system is installed in the one or more computing devices 102A-N along with the server 116. In some embodiments, the retailer 112 is an owner or a manager of the retail and commercial establishments. The server 116 obtains login credential from the retailer device associated with the retailer 112 for each computing device to generate a unique password for the one or more computing devices 102A-N. In some embodiments, the login credential includes a user name and a default password for the one or more each computing device 102A-N. In some embodiments, the default password is a PIN number or a pattern. In some embodiments, the one or more computing devices 102A-N may include a mobile phone, a kindle, a PDA (Personal Digital Assistant), a tablet, a music player, a computer, an electronic notebook or a smartphone. In some embodiments, the system may be installed in android based devices, windows-based devices or any such operational systems devices. The server is configured to connect with a charging port, an accelerometer, a camera and an inbuilt speaker of the one or more computing devices 102A-N.
[0027] The server 116 obtains a status of the charging port, motion information and a status of a power button of the one or more computing devices 102A-N. In some

embodiments, the motion information is obtained using an accelerometer associated with the one or more computing devices 102A-N. The server 116 analyses the status of the charging port of the one or more computing devices 102A-N to determine at least one of (i) the one or more charging cables 106A-N are connected with the charging port of the one or more computing devices 102A-N or (ii) the one or more charging cables 106A-N are disconnected from the charging port of the one or more computing devices 102A-N. The server 116 determines the motion information to determine if motion is detected in the one or more computing devices 102A-N. The server 116 analyses a status of a power button of the one or more computing devices 102A-N to determine that the one or more computing devices 102A-N are switched off or shut down by the one or more users 104A-N. The server 116 generates an alert notification to (i) generate an alert sound at the one or more computing devices 102A-N and (ii) capture an image of the one or more users 104A-N using the camera (i.e. a selfie camera) of the one or more computing devices 102A-N when at least one of (a) the one or more users 104A-N unplug the one or more charging cables 106A-N from the one or more computing devices 102A-N, (b) the one or more computing devices 102A-N forcely shut down or switched off by the one or more users 104A-N or (c) the motion is detected in the one or more computing devices (102A-N). In some embodiments, the one or more computing devices 102A-N may capture images of the one or more users 104A-N using the rear camera i.e. a back camera. In one embodiment, the alert may be an alarm sound.
[0028] The server 116 further generates the alert using the inbuilt speaker in the one or more computing devices 102A-N when the one or more computing devices 102A-N are force shutdown or switched off by the one or more users 104A-N even the one or more charging cables 106A-N are plugged with or unplugged from the one or more computing devices 102A-N. In some embodiments, the one or more users 104A-N fails to control or reduce volume of the alert using volume keys of the one or more computing

devices 102A-N when the one or more users 104A-N tries to steal the one or more computing devices 102A-N. In some embodiments, the alert is not generated when (i) the one or more users 104A-N picks up the one or more computing devices 102A-N with the one or more charging cables 106A-N and (ii) the one or more computing devices 102A-N are unplugged from the one or more charging cable 106A-N by the one or more users 104A-N without the motion. In some embodiments, the retailer device 110 may be a computer, a mobile phone, a kindle, a PDA (Personal Digital Assistant), a tablet, a music player, an electronic notebook or a smartphone. In some embodiments, the server 116 connects the retailer device 110 of the retailer 112 with each computing device in the retail and commercial establishments.
[0029] The server 116 requests the unique password from the retailer 112 to stop the alert when the alert is generated by the one or more computing devices 102A-N. The server 116 analyzes the unique password that is entered by the one or more users 104A-N or the retailer 112 to determine the unique password is valid or invalid. The server 116 at least one of (i) stops the alert and communicates a notification status to the server 116 and the retailer device 110 when the unique password is valid or (ii) continuously generates the alert when the unique password is invalid. In some embodiments, the status includes an information about the alert is stopped when the unique password is valid. The server 116 generates and communicates a notification to at least one of (a) the user device 110 of the retailer 112 or (b) the server 116 when at least one of (i) the alert is generated using the inbuilt speaker of the one or more computing devices 102A-N, (ii) the password that is entered by the one or more users 104A-N or the retailer 112 is incorrect or invalid and (iii) the alert is stopped when the password is correct or valid.
[0030] The server communicates at least one of (i) log records and (ii) the captured images with notification updates to the server 116 though the network 114. In some embodiments, the log records include an information about number of times the

alert is generated by the one or more computing based devices 102A-N. In some embodiments, the network 114 is a wired network or a wireless network. The server determines a maximum interest of the one or more users 104A-N at the retail outlet by analyzing (i) the log records, (ii) number of times the images of the one or more users 104A-N are captured, (iii) number of times the alert is stopped when the entered unique password is correct or valid and (iv) number of times the one or more users 104-N picks up or use the one or more computing devices 102A-N at the retail outlet. The server generates a report based on a maximum interest of the one or more users 104A-N and communicates the report to the retailer device 110 to increase stock planning, productivity and sales of the retailer 112. In some embodiments, the server 116 communicates the one or more data and the maximum interest to the retailer device 110 of the retailer 112 through the network 114. In some embodiments, the one or more data includes at least one of (i) the log records, (ii) the number of times the images are captured and (iii) the number of times the alert is stopped when the unique password is correct or valid.
[0031] In some embodiments, the retailer device 110 includes a store manager control unit that is configured to connect the one or more computing devices 102A-N with the retailer device 110 of the retailer 112. The store manager control may be installed in the retailer device 110 of the retailer 112. In some embodiments, the retailer 112 adds/connects or removes the one or more computing devices 102A-N to the store manager control using a corresponding unique ID of each computing device. In some embodiments, the unique ID is an android application package (APK), iOS App Store Package (IPA) or any such application packages. In some embodiments, the store manager control communicates with the one or more computing devices 102A-N and the server 116 through the wired network or the wireless network such as Bluetooth, Wi-Fi, ZigBee or any other communication networks. In some embodiments, an alert is

generated by the retailer device 110 of the retailer 112 when the one or more computing devices 102A-N generates the alert and communicates the notification to the retailer device 110. In some embodiments, the retailer 112 identifies the corresponding computing device when the one or more users 104A-N tries to steal the one or more computing devices 102A-N using the unique password of the corresponding computing device. In some embodiments, the store manager control provides the maximum interest of the one or more users 104A-N and the reports to the retailer 112 based on at least one of (i) the log records, (ii) number of times the images of the one or more users 104A-N are captured, (iii) number of times the alert is stopped when the entered unique password is correct or valid and (iv) number of times the one or more users 104-N picks up or uses the one or more computing devices 102A-N at the retail outlet.
[0032] FIG. 2 is a block diagram of a server of FIG. 1 according to some embodiments herein. The exploded view 200 includes a server database 200, a login credentials obtaining module 202, an alert notification generating module 204, a password verification module 206, a user images obtaining module 208, an alert stopping data obtaining module 210, a user interest determining module 212 (determine and report generation and communication). The login credentials obtaining module 202 obtains login credentials from the retailer 112 for the computing device 102A to provide a unique password for the computing device 102A.
[0033] The alert notification module 204 includes (i) obtaining a status of a charging port of the computing device 102A to determine at least one of (a) a charging cable 106A is connected with the charging port of the computing device 102A or (b) the charging cable 106A is disconnected from the charging port of the computing device 102 A, (ii) determining a motion of the computing device 102 A using an accelerometer of the computing device 102A, and (iii) obtaining the status of the power button of the computing device 102A to determine that the computing device 102A is switched off or

shut down by the one or more users 104A-N to generate an alert to the one or more computing devices 102A-N when at least one of (i) the one or more users 104-N unplugged the at least one computing device 102A-N from the charging cable 106A, (ii) the motion is detected using the accelerometer of the at least one computing device 102A-N and (iii) the at least one computing device 102A-N is force shutdown or switched off by the one or more users 104A-N even the charging cable 106A is plugged with or unplugged from the at least one computing device 102A-N.
[0034] The user images obtaining module 208 obtains the images of the one or more users 104A-N when at least one of (i) the one or more users 104-N unplugged the at least one computing device 102A-N from the at least one charging cable 106A-N and (ii) the motion is detected using the accelerometer of the at least one computing device 102A-N. The alert stopping data obtaining module 214 includes (i) requesting a unique password from the retailer 112 to stop the alert when the alert is generated by the at least one computing device 102A-N, (ii) analyzing the unique password that is entered by the one or more users 104A-N or the retailer 112 to determine the unique password is valid or invalid to at least one of (i) stops the alert when the unique password is valid or (ii) continuously generates the alert when the unique password is invalid or incorrect with the unique password verification module. The user interest determining module 212 (a) determines a maximum interest of the one or more users 104A-N at the retail outlet by analyzing (i) the log records, (ii) number of times the images of the one or more users 104A-N are captured, (iii) number of times the alert is stopped when the entered unique password is correct or valid and (iv) number of times the one or more users 104-N picks up or use the one or more computing devices 102A-N at the retail outlet, (b) generates a report based on a maximum interest of the one or more users 104A-N and communicates the report to the retailer device 110 through network 114 to increase stock planning, productivity and sales of the retailer. In some embodiments, the one or more data includes

at least one of (i) the log records that include the information about the number of times the alert is generated by the one or more computing devices 102A-N, (ii) number of times the images are captured and (iii) number of times the alert is stopped when the unique password is correct or valid.
[0035] FIG. 3 is a block diagram of a retailer device 112 according to some embodiments herein. The exploded view 300 includes a database 302, a login credentials obtaining module 304, a unique password requesting module 306 and a user interest obtaining module 308. The login credentials obtaining module 304 obtains login credentials from the retailer 112 for the at least one computing device 102A-N to provide the unique password for the at least one computing device 102A-N. The unique password requesting module 306 requests a unique password from the retailer 112 to stop the alert when the alert is generated by the at least one computing device 102A-N. The user interest obtaining module 308 obtains the maximum interest of the one or more users 104A-N at the retail outlet from the server of the one or more computing devices 102A-N.
[0036] FIG. 4 is a flow diagram that illustrates a method for theft detection of one or more computing devices 102A-N according to some embodiments herein. At step 402, the system is installed in the one or more computing devices 102A-N. At step 404, the alert is not generated when the one or more users 104A-N are picked up the one or more computing devices 102A-N with the one or more charging cables 106A-N. At step 406, the alert is not generated when the one or more users 104A-N picked up the one or more computing devices 102A-N even unplugged the one or more charging cable 106A-N without any motion.
[0037] At step 412 and 414, the alert is generated and the images of the one or more users 104A-N are captured when (i) the one or more users 104-N unplugged the one or more charging cables 106A-N from the charging port of the one or more computing

devices 102A-N and (ii) the motion is detected. At step 412, the alert is generated when the one or more users 104A-N force shutdown or switched off the one or more computing devices 102A-N even the one or more charging cables plugged with or unplugged from the one or more computing devices 102A-N.
[0038] At step 416, the unique password is requested to stop the alert when the alert is generated by the theft detection system. At step 418, the unique password is analyzed to determine whether the entered unique password is valid or not. At step 420, the alert is stopped when the entered unique password is valid else the notification is generated and communicated to at least one of (i) the user device 110 of the retailer 112 and (ii) the server 116 at step 422. At step 424, (i) the log records and (ii) the captured images with the notification updates are obtained in the server 116 from the one or more computing devices 102AN. At step 426, the notifications are communicated to at least one of (i) the user device 110 of the retailer 112 and (ii) the server 116.
[0039] FIGS. 5A-5C are flow diagram that illustrate a method for securing the one or more computing devices 102A-N in the retail and commercial establishments against theft according to some embodiments herein. At step 502, a login credential is obtained from a retailer device 110 associated with a retailer 112 to generate a unique password for at least one computing device 102A-N at the server. At step 504, a status of a charging port, motion information and a status of a power button of the at least one computing device 102A-N is obtained at the server. At step 506, the status of the charging port of the at least one computing device to determine at least one of (i) a charging cable 106A-N is connected with the charging port of the at least one computing device 102A-N or (ii) the charging cable 106A-N is disconnected from the charging port of the at least one computing device 102A-N at the server.
[0040] At step 508, the motion information is analysed to determine if motion is

detected in the at least one computing device at the server. At step 510, the status of the power button of the at least one computing device 102A-N is analysed to determine if the at least one computing device 102A-N is switched off or shut down by the one or more users 104A-N at the server. At step 512, an alert notification is generated to (i) generate an alert sound at the at least one computing device and (ii) capture an image of the one or more users 104A-N using a camera (i.e. a selfie camera) of the at least one computing device 102A-N when at least one of (a) the one or more users 104A-N unplug the charging cable from the at least one computing device 102A-N or (b) the at least one computing device forcely shutdown or switched off by the one or more users 104A-N or (c) the motion is detected in the at least one computing device at the server. At step 514, the alert sound is generated using an inbuilt speaker associated with the at least one computing device 102A-N and capturing images of the one or more users 104 A-N when the alert notification is received from the server 116 at the computing device.
[0041] At step 516, a request for the unique password is sent to the retailer device 110 associated with the retailer 112 to stop the alert when the alert is generated at the at least one computing device 102A-N at the server. At step 518, the unique password is obtained from the retailer device 110 associated with the retailer at the server. At step 520, the unique password obtained from the retailer device 110 associated with the retailer 112 is analysed to determine the unique password is valid at the server 116. At step 522, a stop notification is sent to the at least one computing device if the unique password obtained from the retailer device 110 associated with the retailer 112 is valid at the server 116.
[0042] At step 524, a maximum interest of the one or more users 104A-N in a retail outlet is determined by analyzing (i) the log records, (ii) a number of times the images of the one or more users 104A-N are captured, and (iii) a number of times the alert is stopped when the obtained unique password is valid at the server. At step 526, a

report is generated based on the maximum interest of the one or more users 104A-N and communicates the report to the retailer device associated with the retailer 112 to increase stock planning, productivity and sales of the retailer at the server.
[0043] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the appended claims.

We claim

1.A system for securing a plurality of computing devices (102A-N) in retail and
commercial establishments, the system comprising: a server (116) that comprises
a memory that stores a set of instructions; and
a processor that executes the set of instructions and is configured to
obtain a login credential from a retailer device (110) associated with a retailer (112) to generate a unique password for at least one computing device (102A-N), wherein the login credential comprises a user name and a default password for the at least one computing device (102A-N);
obtain a status of a charging port, motion information and a status of a power button of the at least one computing device (102A-N), wherein the motion information is obtained using an accelerometer associated with the at least one computing device (102A-N);
analyse the status of the charging port of the at least one computing device (102A-N) to determine at least one of (i) a charging cable (106A-N) is connected with the charging port of the at least one computing device (102A-N) or (ii) the charging cable (106A-N) is disconnected from the charging port of the at least one computing device (102A-N);
analyse the motion information to determine if motion is detected in the at least one computing device (102A-N);
analyse the status of the power button of the at least one computing device (102A-N) to determine if the at least one computing device (102A-N) is switched off or shut down by a plurality of users (104A-N); and
generate an alert notification to (i) generate an alert sound at the at least one computing device (102A-N) and (ii) capture an image of the plurality of users (104A-N) using a camera of the at least one computing device (102A-N) when at least one of (i) the plurality of users (104A-N) unplug the charging cable (106A-N) from the at least one computing device (102A-N), (ii) the at least one computing device (102A-N) forcely shut down or switched off by the plurality of users (104A-N), or (iii) the motion is detected in the at least one computing device (102A-N).

2. The system as claimed in claim 1, wherein the at least one computing device (102A-
N)
generates the alert sound using an inbuilt speaker associated with the at least one computing device (102A-N); and
captures images of the plurality of users (104A-N) when the alert notification is received from the server (116).
3. The system as claimed in claim 1, wherein the server (116)
sends a request for a unique password to the retailer device (110) associated with the retailer (112) to stop the alert when the alert is generated at the at least one computing device (102A-N);
obtains the unique password from the retailer device (110) associated with the retailer
(H2);
analyses the unique password obtained from the retailer device (110) associated with the retailer (112) to determine if the unique password is valid; and
sends a stop notification to the at least one computing device (102A-N) if the unique password obtained from the retailer device (110) associated with the retailer (112) is valid.
4. The system as claimed in claim 1, wherein the server (116) determines a maximum interest of the plurality of users (104A-N) in a retail outlet by analysing (i) log records, (ii) a number of times the images of the plurality of users (104A-N) are captured and (iii) a number of times the alert is stopped when the obtained unique password is valid.
5. The system as claimed in claim 4, wherein the server (116) generates a report based on the maximum interest of the plurality of users (104A-N) and communicates the report to the retailer device (110) associated with the retailer (112) to increase stock planning, productivity and sales of the retailer (112).
6. A method for securing a plurality of computing devices (102A-N) in retail and commercial establishments, the method comprising:
obtaining, at a server (116), a login credential from a retailer device (110) associated with a retailer (112) to generate a unique password for at least one computing device (102A-
N);

obtaining, at the server (116), a status of a charging port, motion information and a status of a power button of the at least one computing device (102A-N);
analysing, at the server (116), the status of the charging port of the at least one computing device (102A-N) to determine at least one of (i) a charging cable (106A-N) is connected with the charging port of the at least one computing device (102A-N) or (ii) the charging cable (106A-N) is disconnected from the charging port of the at least one computing device (102A-N);
analysing, at the server (116), the motion information to determine if motion is detected in the at least one computing device (102A-N);
analysing, at the server (116), the status of the power button of the at least one computing device (102A-N) to determine if the at least one computing device (102A-N) is switched off or shut down by a plurality of users; and
generating, at the server (116), an alert notification to (i) generate an alert sound at the at least one computing device (102A-N) and (ii) capture an image of the plurality of users (104A-N) using a camera of the at least one computing device (102A-N) when at least one of (i) the plurality of users (104A-N) unplug the charging cable (106A-N) from the at least one computing device (102A-N), (ii) the at least one computing device (102A-N) forcely shut down or switched off by the plurality of users (104A-N), or (iii) the motion is detected in the at least one computing device (102A-N).
7. The method as claimed in claim 6, wherein the method comprises
generating, at the at least one computing device (102A-N), the alert sound using an inbuilt speaker associated with the at least one computing device (102A-N); and
capturing, at the at least one computing device (102A-N), images of the plurality of users (104A-N) when the alert notification is received from the server (116).
8. The method as claimed in claim 6, wherein the method comprises
sending, at the server (116), a request for the unique password to the retailer device (110) associated with the retailer (112) to stop the alert when the alert is generated at the at least one computing device (102A-N);
obtaining, at the server (116), the unique password from the retailer device (110) associated with the retailer (112);
analysing, at the server (116), the unique password obtained from the retailer device (110) associated with the retailer (112) to determine the unique password is valid; and

sending, at the server (116), a stop notification to the at least one computing device (102A-N) if the unique password obtained from the retailer device (110) associated with the retailer (112) is valid.
9. The method as claimed in claim 6, wherein method comprises
determining, at the server (116), a maximum interest of the plurality of users (104A-N) in a retail outlet by analysing (i) the log records, (ii) a number of times the images of the plurality of users (104A-N) are captured and (iii) a number of times the alert is stopped when the obtained unique password is valid.
10. The method as claimed in claim 9, wherein the method comprises
generating, at the server (116), a report based on the maximum interest of the plurality of users (104A-N) and communicates the report to the retailer device (110) associated with the retailer (112) to increase stock planning, productivity and sales of the retailer (112).

Documents

Application Documents

# Name Date
1 201811008852-STATEMENT OF UNDERTAKING (FORM 3) [09-03-2018(online)].pdf 2018-03-09
2 201811008852-PROVISIONAL SPECIFICATION [09-03-2018(online)]_71.pdf 2018-03-09
3 201811008852-PROVISIONAL SPECIFICATION [09-03-2018(online)].pdf 2018-03-09
4 201811008852-PROOF OF RIGHT [09-03-2018(online)].pdf 2018-03-09
5 201811008852-POWER OF AUTHORITY [09-03-2018(online)].pdf 2018-03-09
6 201811008852-FORM FOR STARTUP [09-03-2018(online)].pdf 2018-03-09
7 201811008852-FORM FOR SMALL ENTITY(FORM-28) [09-03-2018(online)].pdf 2018-03-09
8 201811008852-FORM 1 [09-03-2018(online)].pdf 2018-03-09
9 201811008852-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [09-03-2018(online)]_163.pdf 2018-03-09
10 201811008852-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [09-03-2018(online)].pdf 2018-03-09
11 201811008852-EVIDENCE FOR REGISTRATION UNDER SSI [09-03-2018(online)].pdf 2018-03-09
12 201811008852-DRAWINGS [09-03-2018(online)]_123.pdf 2018-03-09
13 201811008852-DRAWINGS [09-03-2018(online)].pdf 2018-03-09
14 201811008852-Power of Attorney-230318.pdf 2018-04-06
15 201811008852-OTHERS-230318.pdf 2018-04-06
16 201811008852-Correspondence-230318.pdf 2018-04-06
17 abstrarct.jpg 2018-05-03
18 201811008852-APPLICATIONFORPOSTDATING [09-03-2019(online)].pdf 2019-03-09
19 201811008852-DRAWING [09-09-2019(online)].pdf 2019-09-09
20 201811008852-CORRESPONDENCE-OTHERS [09-09-2019(online)].pdf 2019-09-09
21 201811008852-COMPLETE SPECIFICATION [09-09-2019(online)].pdf 2019-09-09