Sign In to Follow Application
View All Documents & Correspondence

System And Method To Enable Authentication And Presence Determination Of A User At A Location

Abstract: A system carried by a user to enable authentication and presence determination of the user at a location is disclosed. The system receives at pre-determined intervals from a transmitter a plurality of signals each comprising at least a first unique identity (FUID) of the transmitter upon the system being within a pre-determined distance from the transmitter; receives from the user at least one biometric parameter of the user and conjoins the at least one biometric parameter, the FUID , a second unique identity (SUID) of the system, time of generation and/or time of receipt of first of the plurality of signals received by the system, and a location parameter pertaining to the location to generate an authentication signal; and transmits to an attendance marking system (AMS) data to enable the AMS authenticate the user at the location and time period the user stays there. Corresponding method is described.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 May 2019
Publication Number
46-2020
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
info@khuranaandkhurana.com
Parent Application

Applicants

Fitnano Technologies Pvt. Ltd.
F - 23, Kalkaji, New Delhi -110019, India.

Inventors

1. SHEKHAR, Tarun
F - 23, Third Floor, Kalkaji, New Delhi -110019, India.

Specification

FIELD OF DISCLOSURE

The present disclosure relates to systems for authenticating a user anddetermining the user’s presence at a location.

BACKGROUND OF THE DISCLOSURE

The background description includes information that may be useful in
understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
[0003] In many situations it is required to verify that a particular individual is present at aparticular location at a particular time. Typically, this is required for most situations where one of a factor on which a person is paid or his/her performance evaluated pertains to his/her presence for a fixed tenure at a fixed location. Such a situation prevails in many industries and offices in different sectors. For instance, construction industry, call centers, schools and even hospitals require systems wherein identity of a worker as well as the worker’s arrival and departure time from a pre-determined location needs to be recorded. Such systems are generally termed as ‘Attendance Systems’ and can be as simple as an attendance register wherein a person marks with his/her signature his/her arrival and departure time, and electro-mechanical systems based on workers ‘punching’ their attendance cards. Such simple systems however are highly prone to misuse. For instance ‘proxy’ attendance can easily be marked in such systems with consequent ill effects [0004] For instance, in education sectors in India, particularly in Government schools in remote, far-flung areas, teacher absenteeism is a major issue. Teachers do not take all classes, reach late, leave early, arrange for ‘proxies’ to mark their attendance while they devote themselves to other work, all the continuing to be paid full salaries and retaining their jobs. As can be appreciated, besides the financial loss to the Government in form of salaries given while
2 duties are not performed, the standard of education of students also seriously suffers as a
consequence.
[0005] Some existing systems aim to alleviate problems elaborated above. Attendance
marking systems using fingerprint sensing are well known. They capture fingerprint data of a
person along with a timestamp to mark attendance of a person. However, they mark only if the
person provides the fingerprint and do not determine if the person actually remained in the
premises after marking himself/herself present and for how long.
[0006] For instance, a person /user can easily mark himself going into a location where
such a system is configured and then can simply walk out to attend to other works. The system
will continue to mark the user as present. Obviously this is a serious limitation.
[0007] Further, fingerprints can easily be spoofed nowadays using, for instance, low
priced silicon finger masks readily available in the market. Such masks can easily be used to
spoof a person’s attendance at a location using such a system.
[0008] Another system uses face recognition. FRS cameras along with a handheld device
like a smartphone or tablet. However, the system does not give exact location of the person
accurately (indoors). For instance, the system may not reliably determine if a teacher is inside a
classroom he/she is supposed to be in, or if an employee is on/near his/her seat or work area.
Further, it does not determine tenure of a person’s stay in a location. Only that person’s
movement in or out of the location is detected and further processed to generate attendance and
related reports.
[0009] Hence there is a need in the art for a system that can enable reliable authentication
of a user at a location as well as thereafter enable determination of time period the user was
present at the location.
[00010] All publications herein are incorporated by reference to the same extent as if each
individual publication or patent application were specifically and individually indicated to be
incorporated by reference. Where a definition or use of a term in an incorporated reference is
inconsistent or contrary to the definition of that term provided herein, the definition of that term
provided herein applies and the definition of that term in the reference does not apply.
[00011] In some embodiments, the numbers expressing quantities or dimensions of items,
and so forth, used to describe and claim certain embodiments of the invention are to be
3

understood as being modified in some instances by the term “about.” Accordingly, in some embodiments, the numerical parameters set forth in the written description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[00012] The recitation of ranges of values herein is merely intended to serve as a
shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein.
[00013] Groupings of alternative elements or embodiments of the invention disclosed
herein are not to be construed as limitations. Each group member can be referred to and claimed individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
OBJECTSOFTHEINVENTION
[00014] It is an object of the present disclosure to provide for a system to enable reliable
authentication of a user at a location.
[00015] It is another object of the present disclosure to provide for a system to enable
determination of time period the person user present at the location.
4

SUMMARY
[00016] The present disclosure relates to systems for authenticating a user and
determining the user’s presence at a location. In particular, it pertains to a system to determine if a user is present at location for a pre-determined time interval.
[00017] This summary is provided to introduce simplified concepts of an authentication
and presence determination system, which are further described below in the Detailed Description. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended for use in determining/limiting the scope of the claimed subject matter.
[00018] In an aspect, present disclosure elaborates on a system carried by a user to enable
authentication and presence determination of the user at a location.
[00019] The system can include one or more processors coupled with a memory, the
memory storing instructions executable by the one or more processors to: receive at pre¬
determined intervals from a transmitter a plurality of signals each comprising at least a first
unique identity (FUID) of the transmitter upon the system being within a pre-determined
distance from the transmitter; receive from the user at least one biometric parameter of the user
and conjoin the at least one biometric parameter, the FUID , a second unique identity (SUID) of
the system, any or a combination of time of generation and time of receipt of first of the plurality
of signals received by the system, and a location parameter pertaining to the location to generate
an authentication signal; transmit the authentication signal to an authentication system for
authentication of the user; conjoin for each of the plurality of signals the SUID, the FUID, any or
a combination of corresponding times of generation and times of receipt of each of the plurality
of signals, and the location parameter to generate presence signals; and transmit the presence
signals to a presence determination system upon the authentication to confirm presence of the
user at the location at any or a combination of the times of generation and the times of receipt.
[00020] In another aspect, the location parameter can be provided by any or both of the
transmitter and the system, or determined by the system using triangulation of signals received from at least two of the transmitters.
5

[00021] In yet another aspect, the at least one biometric parameter can include any or a
combination of self-image of the user, one or more fingerprints of the user and iris image of one
or both eyes of the user.
[00022] In another aspect, the system can store the authentication signal upon disruption
of communication between the system and the authentication system, and can send the
authentication signal to the authentication system upon restoration of the communication.
[00023] In yet another aspect, the system can store the presence signal upon disruption of
communication between the system and the presence determination system, and can send the
presence signal to the presence determination system upon restoration of the communication and
upon the authentication.
[00024] In an aspect, the system can automatically select the transmitter from a plurality
of transmitters based upon the system being within a pre-determined distance from the
transmitter, or can enable the user to manually select the transmitter.
[00025] In another aspect, the times of generation can be provided by the transmitter and
the times of receipt can be provided by the system.
[00026] In yet another aspect, upon non-receipt of the at least one biometric parameter
within a pre-determined time, the system can provide a log of actions made by the user on a
computing device configured with the system to the presence determination system for further
analysis thereupon.
[00027] In an aspect, proposed system can randomly perform authentication of the
transmitter by: transmitting to the transmitter a second signal upon receipt of a first signal from
the transmitter, the second signal enabling the transmitter to generate and transmit to the system
a third signal carrying a code per a pre-determined sequence; and transmitting the third signal to
a central server to perform the authentication based upon matching of the code with
corresponding code as per the pre-determined sequence stored at the central server.
[00028] In another aspect, the system can be configured in a mobile device associated with
the user, and the SUID can be associated with the mobile device.
[00029] In yet another aspect, the SUID can be any or a combination of IMEI of the
mobile device, SIM card inserted in the mobile device, and unique identity of a mobile
application pertaining to the system installed on the mobile device.
6

[00030] In an aspect, present disclosure elaborates upon a computer implemented method
to enable authentication and presence determination of a user carrying the computer at a location. The method can include steps of : receiving, at the computer, at pre-determined intervals from a transmitter a plurality of signals each comprising at least a first unique identity (FUID) of the transmitter upon the computer being within a pre-determined distance from the transmitter; receiving, at the computer from the user at least one biometric parameter of the user and conjoining the at least one biometric parameter, the FUID , a second unique identity (SUID) of the computer, any or combination of time of generation and time of receipt of first of the plurality of signals received by the computer, and a location parameter pertaining to the location to generate an authentication signal; transmitting, from the computer the authentication signal to an authentication system for authentication of the user; conjoining, at the computer for each of the plurality of signals the SUID, the FUID, any or a combination of corresponding times of generation and times of receipt of each of the plurality of signals, and the location parameter to generate presence signals; and transmitting, from the computer the presence signals to a presence determination system upon the authentication to confirm presence of the user at the location at any or a combination of the times of generation and the times of receipt.
[00031] The technical problem resolved by the system elaborated herein pertains to
determination of presence of a user at a location for a pre-determined time period. Proposed system resolves this problem by receiving signals at periodic intervals from a transmitter and further processing them to generate an authentication signal and presence signals to be used by other systems to evaluate whether the user was at a location he/she was expected to be and, if so, the time period the user was at the location.
[00032] Within the scope of this application it is expressly envisaged that the various
aspects, embodiments, examples and alternatives set out in the preceding paragraphs, in the
claims and/or in the following description and drawings, and in particular the individual features
thereof, may be taken independently or in any combination. Features described in connection
with one embodiment are applicable to all embodiments, unless such features are incompatible.
[00033] Various objects, features, aspects and advantages of the present disclosure will
become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like features.
7

BRIEFDESCRIPTIONOFDRAWINGS
[00034] The accompanying drawings are included to provide a further understanding of
the present disclosure, and are incorporated in and constitute a part of this specification. The
drawings illustrate exemplary embodiments of the present disclosure and, together with the
description, serve to explain the principles of the present disclosure. The diagrams are for
illustration only, which thus is not a limitation of the present disclosure, and wherein:
[00035] FIG. 1 illustrates architecture of system proposed to illustrate its overall working
in accordance with an exemplary embodiment of the present disclosure.
[00036] FIG. 2 illustrates functional units of system proposed in accordance with an
exemplary embodiment of the present disclosure.
[00037] FIG. 3A to FIG. 3C illustrate examples of working of system proposed in
accordance with an exemplary embodiment of the present disclosure.
[00038] FIG. 4 illustrates a method of working of system proposed in accordance with an
exemplary embodiment of the present disclosure.
DETAILED DESCRIPTION
[00039] The following is a detailed description of embodiments of the disclosure depicted
in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims. In the description numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present invention. However, it will be apparent to one skilled in the art that embodiments of the present invention may be practiced without some of these specific details.
[00040] Exemplary embodiments will now be described more fully hereinafter with
reference to the accompanying drawings, in which exemplary embodiments are shown. These exemplary embodiments are provided only for illustrative purposes and so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. The invention disclosed may, however, be embodied in many different
8

forms and should not be construed as limited to the embodiments set forth herein. Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software.
[00041] The general principles defined herein may be applied to other embodiments and
applications without departing from the spirit and scope of the invention. Moreover, all
statements herein reciting embodiments of the invention, as well as specific examples thereof,
are intended to encompass both structural and functional equivalents thereof. Additionally, it is
intended that such equivalents include both currently known equivalents as well as equivalents
developed in the future (i.e., any elements developed that perform the same function, regardless
of structure). Also, the terminology and phraseology used is for the purpose of describing
exemplary embodiments and should not be considered limiting. Thus, the present invention is to
be accorded the widest scope encompassing numerous alternatives, modifications and
equivalents consistent with the principles and features disclosed. For purpose of clarity, details
relating to technical material that is known in the technical fields related to the invention have
not been described in detail so as not to unnecessarily obscure the present invention.
[00042] Those of ordinary skill in the art further understand that any exemplary hardware,
software, processes, methods, and/or operating systems described herein are for illustrative
purposes and, thus, are not intended to be limited to any particular named element.
[00043] Embodiments of the present invention may be provided as a computer program
product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The term “machine-readable storage medium” or “computer-readable storage medium” includes, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium
9

suitable for storing electronic instructions (e.g., computer programming code, such as software or
firmware).A machine-readable medium may include a non-transitory medium in which data can
be stored and that does not include carrier waves and/or transitory electronic signals propagating
wirelessly or over wired connections. Examples of a non-transitory medium may include, but are
not limited to, a magnetic disk or tape, optical storage media such as compact disk (CD) or
digital versatile disk (DVD), flash memory, memory or memory devices. A computer-program
product may include code and/or machine-executable instructions that may represent a
procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software
package, a class, or any combination of instructions, data structures, or program statements. A
code segment may be coupled to another code segment or a hardware circuit by passing and/or
receiving information, data, arguments, parameters, or memory contents. Information,
arguments, parameters, data, etc. may be passed, forwarded, or transmitted via any suitable
means including memory sharing, message passing, token passing, network transmission, etc.
[00044] Furthermore, embodiments may be implemented by hardware, software,
firmware, middleware, microcode, hardware description languages, or any combination thereof.
When implemented in software, firmware, middleware or microcode, the program code or code
segments to perform the necessary tasks (e.g., a computer-program product) may be stored in a
machine-readable medium. A processor(s) may perform the necessary tasks.
[00045] Systems depicted in some of the figures may be provided in various
configurations. In some embodiments, the systems may be configured as a distributed system where one or more components of the system are distributed across one or more networks in a cloud computing system.
[00046] Similarly, any switches shown in the figures are conceptual only. Their function
may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention
[00047] Embodiments of the present invention include various steps, which will be
described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps
10

may be performed by a combination of hardware, software, and firmware and/or by human
operators.
[00048] Various methods described herein may be practiced by combining one or more
machine-readable storage media containing the code according to the present invention with
appropriate standard computer hardware to execute the code contained therein. An apparatus for
practicing various embodiments of the present invention may involve one or more computers (or
one or more processors within a single computer) and storage systems containing or having
network access to computer program(s) coded in accordance with various methods described
herein, and the method steps of the invention could be accomplished by modules, routines,
subroutines, or subparts of a computer program product.
[00049] All methods described herein can be performed in any suitable order unless
otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all
examples, or exemplary language (e.g., “such as”) provided with respect to certain embodiments
herein is intended merely to better illuminate the invention and does not pose a limitation on the
scope of the invention otherwise claimed. No language in the specification should be construed
as indicating any non-claimed element essential to the practice of the invention.
[00050] If the specification states a component or feature “may”, “can”, “could”, or
“might” be included or have a characteristic, that particular component or feature is not required
to be included or have the characteristic.
[00051] As used in the description herein and throughout the claims that follow, the
meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates
otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on”
unless the context clearly dictates otherwise.
[00052] In an implementation, proposed system may be configured in a variety of types of
computing device, including without limitation, a desktop computer system, a data entry
terminal, a laptop computer, a notebook computer, a tablet computer, a handheld personal data
assistant, a smartphone, a body-worn computing device incorporated into clothing, a computing
device integrated into a vehicle (e.g., a car, a bicycle, etc.), a server, a cluster of servers, a server
farm, etc. In an exemplary embodiment elaborated herein, the system is configured in a mobile
11

device such as a mobile phone. The proposed system can be configured as a wearable device that
can be in form of a wrist band, watch etc.
[00053] As used herein, and unless the context dictates otherwise, the term “communication
network” is intended to include internet, LAN, WAN, intranet or cloud networks or any
communication medium possible for interaction between system proposed and external devices
and systems such as a server. Communication network may use techniques/ protocols such as
NBIOT (narrow band IOT), LoRA (long range wireless communication protocol) and similar for
mobile networks.
[00054] In an aspect, the proposed system (interchangeably termed as system herein) can
be operatively connected to a website accessible by any Internet enabled computing device, and
can as well have a mobile application that can be downloaded on a mobile device that can
connect to Internet for such connection . In such manner, the proposed system can be available
24*7 to its users. Any other manner of implementation of the proposed system or a part thereof is
well within the scope of the present disclosure/invention.
[00055] It would be appreciated that units of the proposed system described further are
only exemplary units and any other unit or sub-unit can be included as part of the proposed
system. These units too can be merged or divided into super-units or sub-units as may be
configured.
[00056] Each of the appended claims defines a separate invention, which for infringement
purposes is recognized as including equivalents to the various elements or limitations specified
in the claims. Depending on the context, all references below to the "invention" may in some
cases refer to certain specific embodiments only. In other cases it will be recognized that
references to the "invention" will refer to subject matter recited in one or more, but not
necessarily all, of the claims.
[00057] Various terms as used herein are shown below. To the extent a term used in a
claim is not defined below, it should be given the broadest definition persons in the pertinent art
have given that term as reflected in printed publications and issued patents at the time of filing.
[00058] In an aspect, present disclosure elaborates on a system carried by a user to enable
authentication and presence determination of the user at a location.
12

[00059] The system can include one or more processors coupled with a memory, the
memory storing instructions executable by the one or more processors to: receive at pre¬
determined intervals from a transmitter a plurality of signals each comprising at least a first
unique identity (FUID) of the transmitter upon the system being within a pre-determined
distance from the transmitter; receive from the user at least one biometric parameter of the user
and conjoin the at least one biometric parameter, the FUID , a second unique identity (SUID) of
the system, any or a combination of time of generation and time of receipt of first of the plurality
of signals received by the system, and a location parameter pertaining to the location to generate
an authentication signal; transmit the authentication signal to an authentication system for
authentication of the user; conjoin for each of the plurality of signals the SUID, the FUID, any or
a combination of corresponding times of generation and times of receipt of each of the plurality
of signals, and the location parameter to generate presence signals; and transmit the presence
signals to a presence determination system upon the authentication to confirm presence of the
user at the location at any or a combination of the times of generation and the times of receipt.
[00060] In another aspect, the location parameter can be provided by any or both of the
transmitter and the system, or determined by the system using triangulation of signals received from at least two of the transmitters.
[00061] In yet another aspect, the at least one biometric parameter can include any or a
combination of self-image of the user, one or more fingerprints of the user and iris image of one or both eyes of the user.
[00062] In another aspect, the system can store the authentication signal upon disruption
of communication between the system and the authentication system, and can send the
authentication signal to the authentication system upon restoration of the communication.
[00063] In yet another aspect, the system can store the presence signal upon disruption of
communication between the system and the presence determination system, and can send the presence signal to the presence determination system upon restoration of the communication and upon the authentication.
[00064] In an aspect, the system can automatically select the transmitter from a plurality
of transmitters based upon the system being within a pre-determined distance from the transmitter, or can enable the user to manually select the transmitter.
13

[00065] In another aspect, the times of generation can be provided by the transmitter and
the times of receipt can be provided by the system.
[00066] In yet another aspect, upon non-receipt of the at least one biometric parameter
within a pre-determined time, the system can provide a log of actions made by the user on a computing device configured with the system to the presence determination system for further analysis thereupon.
[00067] In an aspect, proposed system can randomly perform authentication of the
transmitter by: transmitting to the transmitter a second signal upon receipt of a first signal from
the transmitter, the second signal enabling the transmitter to generate and transmit to the system
a third signal carrying a code per a pre-determined sequence; and transmitting the third signal to
a central server to perform the authentication based upon matching of the code with
corresponding code as per the pre-determined sequence stored at the central server.
[00068] In another aspect, the system can be configured in a mobile device associated with
the user, and the SUID can be associated with the mobile device.
[00069] In yet another aspect, the SUID can be any or a combination of IMEI of the
mobile device, SIM card inserted in the mobile device, and unique identity of a mobile application pertaining to the system installed on the mobile device.
[00070] In an aspect, present disclosure elaborates upon a computer implemented method
to enable authentication and presence determination of a user carrying the computer at a location. The method can include steps of : receiving, at the computer, at pre-determined intervals from a transmitter a plurality of signals each comprising at least a first unique identity (FUID) of the transmitter upon the computer being within a pre-determined distance from the transmitter; receiving, at the computer from the user at least one biometric parameter of the user and conjoining the at least one biometric parameter, the FUID , a second unique identity (SUID) of the computer, any or combination of time of generation and time of receipt of first of the plurality of signals received by the computer, and a location parameter pertaining to the location to generate an authentication signal; transmitting, from the computer the authentication signal to an authentication system for authentication of the user; conjoining, at the computer for each of the plurality of signals the SUID, the FUID, any or a combination of corresponding times of generation and times of receipt of each of the plurality of signals, and the location parameter to
14

generate presence signals; and transmitting, from the computer the presence signals to a presence
determination system upon the authentication to confirm presence of the user at the location at
any or a combination of the times of generation and the times of receipt.
[00071] Various objects, features, aspects and advantages of the present disclosure will
become more apparent from the following detailed description of preferred embodiments, along
with the accompanying drawing figures in which like numerals represent like features.
[00072] FIG. 1 illustrates architecture of system proposed to illustrate its overall working
in accordance with an exemplary embodiment of the present disclosure.
[00073] In an aspect, proposed system 100 can be carried by a user to enable
authentication and presence determination of the user at a location.
[00074] In an exemplary embodiment, as illustrated in FIG. 1, proposed system 100 can be
configured in a mobile device (UMD102) of a user 104 whose presence is required to be
determined at a location.
[00075] It is expected that the mobile device is continuously in possession of the user.
The system can as well be configured in a wearable device (for instance a smart watch) having
capabilities as further elaborated, the wearable device being on the person of the user.
[00076] System 100 can be operatively connected to a transmitter 106 ( interchangeably
termed as beacon 106 herein) that can have a unique identity (termed as first unique identity or
FUID herein) and can transmit a plurality of beacon signals (interchangeably termed as first
signals herein) carrying at least the FUID at pre-determined intervals of time. System 100 can be
configured to receive the first signal as long as UMD102 is within a pre-determined distance of
beacon 106.
[00077] In another aspect, system 100 can as well have a unique ID ( hereinafter termed a
as second unique identity or SUID) and can enable user 104 provide at least one of his/her
biometric parameter (for instance, his/her self-image in the exemplary embodiment being
described herein, using a camera configured in (or operatively connected to) it. Thereafter, either
automatically or upon appropriate command (s) being provided by the user 104 to it, system 100
can conjoin the at least one biometric parameter, the FUID, the SUID, any or combination of
time of generation and time of receipt of first of the plurality of signals received by the system,
and a location parameter pertaining to location of the beacon or system 100 to generate an
15

authentication signal shown as AS108 in FIG. 1. System 100 can get the times of generation of signals generated by transmitter 106 from a real-time clock (RTC) configured in the transmitter 106. Or system 100 can instead determine times of receipt of the signals by it using an RTC configured in it and use such times of receipt instead. Or a combination of both the times of receipt and the times of generation can be used. This provides for a level of redundancy should RTC in system 100 or that in transmitter 106 fail.
[00078] The location parameter can be provided to the system 100 by beacon 106 (in
which case it may be part of the first signal), or it may be generated by system 100 itself (wherein system 100 can receive the location parameter, for instance, from a GPS configured in UMD 102). Appropriate Global Positioning System (GPS) may be configured in beacon 106 or system 100 or UMD 102 for the purpose, or beacon 106 may be hard coded with a pre¬determined location parameter mapped to location where the beacon 106 is to be affixed. Or the location parameter can be provided both by beacon 106 as well as UMD 102. In another embodiment, system 100 proposed can be configured to receive signals carrying location information form at least two of the transmitters and perform triangulation on the signals to determine the location parameter.
[00079] Thereafter, system 100 can send AS108 to an authentication system that can be
part of an attendance marking system shown as AMS110. AMS110 can be remote from UMD102 and a communication network (such as LAN, WAN, NBIOT, LoRA or Internet) can enable communication between UMD102 and AMS110.
[00080] AMS110 can compare the at least one biometric parameter (for instance self-
image of user 104 in AS108) with a corresponding biometric parameter of user 104 already in its
database and accordingly authenticate user 104 using systems known in the art. That is, AMS110
is enabled by proposed system 100 to authenticate that the user 104 was present at the location at
time of generation of the first of plurality of signals received by the proposed system.
[00081] In an exemplary embodiment, AMS110 can store a time-table for user 104.The
time table can provide to AMS110 times and corresponding classes where user 104 is supposed to be at those times. Each of the classes can be configured with a beacon 106. Upon receipt of AS108, AMS110 can determine if the user 104 is in a class where he/she is supposed to be at the
16

time. If so, the user 104 can be considered to be authenticated. Else authentication of the user 104 fails since he/she is not in the class required but at some place else.
[00082] As long as system 100 is within pre-determined distance of beacon 106, it can
continue to receive the signals at the pre-determined intervals and can conjoin the SUID, the
FUID, any or a combination of times of generation and times of receipt of the signals, and the
location parameter to generate corresponding presence signals (shown as PS 112-1, 112-2…112-
N in FIG. 1) for each of the signals. Upon authentication of the user 104, system 100 can
transmit these presence signals PS112 to a presence determination system (that can as well be
part of attendance marking system AMS110). AMS110 can accordingly confirm presence of user
104 at the location at any or a combination times of generation and times of receipt of the
signals. In this manner. AMS110 can be enabled by the proposed system to determine present of
user 104 at the location at times of generation of the presence signals. As can be readily
understood, AMS110 can easily determine from such times the total time user 104 was present.
Thus AMS110 can be enabled to determine when the user 104 reached the location where he/she
was required to be (as confirmed by authentication of the user), and also total time user 104 was
present at the location (as can be determined from series of the presence signals received by
AMS110 without interruption). In this manner, AMS110 can determine attendance of user104.
[00083] As already elaborated, reception of the signals (transmitter signals, that is) by
system 100 requires that the system 100 is within a pre-determined distance of the beacon/transmitter 106.
[00084] In an exemplary embodiment, user 104 can be a teacher supposed to be teaching a
class in a classroom for a period of 9AM to 10AM. Beacon 106 can be affixed in the classroom. Upon entering the classroom the user 104 can switch on the proposed system 100 using a mobile application installed on UMD102. Beacon 106 can be continuously transmitting signals at pre-determined intervals (say 2 minutes), as described. Upon UMD102 coming within a pre-determined distance (say 5 meters) of beacon 106, user 104 can be prompted to authenticate himself/herself. For the purpose, user 104 can take a self-image (colloquially known as a ‘selfie’) using camera in UMD102. System 100 can generate authentication signal 108 as elaborated above that can be sent to AMS110. Upon authentication therein, user 104 can be marked as being
17

present in the classroom at time of generation of first of the signal received by the proposed system.
[00085] Proposed system 100 can continue to receive the signals every two minutes as
long as UMD102 is within 5 meters of the beacon 106. For each the signals received, system 100
can generate presence signals comprising the SUID, the FUID, time of generation of the signals,
and the location parameter. For example, user 104 can be in classroom only till, say 9:30 AM
and then move more than 5 meters away from beacon 106. As can be readily understood, the
reception of the signals by system 100 can stop. Accordingly generation of the presence signals
can as well stop and so, user 104 can be marked present in the classroom only till 9:30 AM.
AMS110 can raise an alert or an attendance report as appropriate accordingly.
[00086] In another aspect, proposed system can handle disruption in communications
between itself and the authentication system/ presence determination system. This can be a very useful feature in remote areas. For the purpose, system 100 can store the authentication signal upon disruption of communication between the system and the authentication system, and can send the authentication signal to the authentication system upon restoration of the communication.
[00087] Similarly, proposed system 100 can store the presence signals upon disruption of
communication between the system and the presence determination system, and can send the presence signals upon restoration of the communication and upon the authentication. As can be appreciated, before a presence signal can be sent, the system needs to authenticate the user and only upon successful authentication can the presence signals be sent to the presence determination system otherwise not.
[00088] In another aspect, system 100 can automatically select the transmitter
(beacon106) from a plurality of transmitters based upon the system being within a pre¬determined distance from the transmitter, or can enable the user to manually select the transmitter.
[00089] In yet another aspect, the system can be configured as a mobile application that
can be installed on a mobile device. The application can provide necessary user interfaces (such as graphical user interfaces) to enable a user operate the system as elaborated above. In such a case, the SUID can be, for instance, any or a combination of IMEI of the mobile device, its SIM
18

number, unique identity of a mobile application used to operate the proposed system etc. These
examples are not to be construed as a limitation and any unique identity a computing system
where proposed system is installed can be utilized. The FUID can be similarly determined.
[00090] As can be readily understood, the authentication signal and the presence signals
can be used by AMS110 or other similar systems for many different purposes. Analysis of absenteeism, late arrivals and early leavings etc. can be done at remote multiple locations. Data can be graphically presented for better management decisions. Payroll systems can use such signals to automatically calculate pay of various users. Most importantly, attendance can be improved leading to greater productivity. For instance, with regular attendance of teachers at schools, quality of education can increase.
[00091] In this manner, proposed system can generate a signal to enable authentication of
a user at a location and thereafter to determine total time the user stays at the location. In conjunction with appropriate authentication and attendance marking systems, the proposed system can be used in different circumstances. For instance, it can be used to determine what time a teacher entered a classroom per time table of the teacher and for how much time did the teacher remain in the classroom. Similarly proposed system can find application in different sectors such as hospitals, offices, various events etc. etc.
[00092] In an aspect, in case the user 104 does not provide the at least one of his/her
biometric parameter within a pre-determined time, proposed system 100 can provide a log of actions made by the use 104 on a computing device carrying the system (for instance UMD 102) to the presence determination system (or another system configured at a server) for further analysis thereupon. In this manner, proposed system can monitor presence of anyone within a pre-determined distance of transmitter/beacon 106, as long as he/she has the proposed system configured in his/her mobile device. The log can carry the IMEI of the mobile device to provide at least a partial identification of person generating the log.
[00093] In an aspect proposed system can perform random authentication of transmitter
106 as well to ensure that no fake transmitters (and signals consequent) can be used to spoof/fool the system.
[00094] For the purpose, proposed system can receive a first signal from beacon 106 and
upon such receipt, can generate a signal (say a second signal) and send it back to beacon 106.
19

Proposed system can enable beacon 106 to generate and transmit to the system a third signal
carrying a code per a pre-determined sequence. Proposed system can transmit the third signal to
a central server where authentication can be performed based upon matching of the code with
corresponding code as per said pre-determined sequence stored at the central server
[00095] The procedure can be repeated randomly. As can be readily understood, this can
ensure that no fake beacons and signals thereupon can be used to spoof the proposed system.
[00096] FIG. 2 illustrates functional units of system proposed in accordance with an
exemplary embodiment of the present disclosure.
[00097] FIG. 2 illustrates components of a system to enable authentication and presence
determination of a user at a location in accordance with an exemplary embodiment of the present disclosure.
[00098] In an exemplary embodiment, proposed system 100 to enable authentication and
presence determination of a user at a location may include one or more processors 202, one or more input/output (I/O) interfaces 204, and a memory 206. The processor(s) 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the processor(s) 202 are configured to fetch and execute computer-readable instructions stored in the memory 206.
[00099] The I/O interfaces 204 may include a variety of software and hardware interfaces,
for example, a web interface, a graphical user interface (GUI), and the like. The I/O interfaces 204 may allow the proposed system 100 to interact with a user directly or through the appropriately configured client devices. Further, the I/O interfaces 204 may enable proposed system 100 to communicate with other computing devices, such as web servers and external data servers (not shown). The I/O interfaces 204 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite. The I/O interfaces 204 may include one or more ports for connecting a number of devices to one another or to another server.
20

[000100] The memory 206 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. The memory 206 may include instructions, modules, routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types.
[000101] In an aspect, proposed system 100 can include a data transceiver 208, an authentication signal generator 210, and a presence signals generator 212 besides other units that may be required.
Data Transceiver 208
[000102] In an aspect, data transceiver 208 can, based upon a first set of the instructions,
control the one or more processors to receive at pre-determined intervals from a transmitter a
plurality of signals each comprising at least a first unique identity (FUID) of the transmitter upon
the system being within a pre-determined distance from the transmitter.
[000103] In another aspect, data transceiver 208 can receive an authentication signal from
authentication generator 210 ( as further described) and can, based upon a third set of the
instructions, control the one or more processors to transmit the authentication signal to an
authentication system for authentication of the user;
[000104] In another aspect, data transceiver 208 can receive presence signals from presence
signals generator 212 (as further described) and can, based upon a fifth set of the instructions,
control the one or more processors to transmit the presence signals to a presence determination
system upon the authentication to confirm presence of the user at the location at the times of
generation (of the signals generated by the transmitter).
Authentication Signal Generator 210
[000105] In an aspect, authentication signal generator 210 can, based upon a second set of the instructions, control the one or more processors to receive from the user at least one biometric parameter of the user and conjoin the at least one biometric parameter, the FUID , a second unique identity (SUID) of the system, any or a combination time of generation and time
21

of receipt of first of the plurality of signals received by the system, and a location parameter pertaining to the location to generate the authentication signal;
Presence Signals Generator 212
[000106] In an aspect, presence signals generator 212 can, based upon a fourth set of the instructions, control the one or more processors to conjoin for each of the plurality of signals the SUID, the FUID, any or a combination of corresponding times of generation and times of receipt of each of the plurality of signals, and the location parameter to generate presence signals. [000107] In this manner various units as elaborated above can, based upon various instructions stored memory 206, control the one or more processors 202 of system 100 to perform respective functions as elaborated above. In an exemplary embodiment, the units can include one or more processors dedicatedly used to perform their functions as elaborated. [000108] Units and components as elaborated above can be configured to be installed on a mobile device and can be operated through a mobile application, thereby making the proposed system available to a user using his/her mobile device.
[000109] It would be appreciated that units elaborated above are only exemplary units and any other unit or sub-unit can be included as part of the proposed system. These units too can be merged or divided into super-units or sub-units as may be configured and can be spread across one or more computing devices operatively connected to each other using appropriate communication technologies.
[000110] Although the proposed system has been elaborated as above to include all the main units, it is completely possible that actual implementations may include only a part of the described units etc. or a combination of those or a division of those into sub-units in various combinations across multiple devices that can be operatively coupled with each other, including in the cloud. Further the units etc. can be configured in any sequence to achieve objectives elaborated. Also, it can be appreciated that proposed system can be configured in a computing device or across a plurality of computing devices operatively connected with each other, wherein the computing devices can be any of a computer, a laptop, a smart phone, an Internet enabled mobile device and the like. Therefore, all possible modifications, implementations and embodiments of where and how the proposed system is configured are well within the scope of the present invention.
22

[000111] FIGs. 3A to 3C illustrate examples of working of system proposed in accordance with an exemplary embodiment of the present disclosure.
[000112] As illustrated FIG. 3A, a user can start mobile application of the proposed system in order to operate it. The user may get on display of his mobile device an indication of beacons (first signal transmitters) nearby along with their locations and can select one based upon his time table. For instance, if the user (a teacher, for example) is supposed to be in classroom 3 at that time instant, he can select corresponding beacon and then press button 302 to receive data from that beacon on his mobile device. An appropriate message as shown at 304 may be displayed on the mobile device to guide the user. In another exemplary embodiment, first signal transmitters can be Bluetooth enabled and the user can ‘pair’ his mobile device with the appropriate first signal transmitter (each first signal transmitter can be labelled with classroom it is installed in to help in such pairing).
[000113] As shown in FIG. 3B, thereafter the user’s mobile device can start receiving a
signal at pre-determined intervals from the beacon earlier selected by the user( beacon in classroom 3), as long as the user stays within a pre-determined distance from the beacon. A message 322 may be displayed accordingly on the user’s mobile device. The user can press button 324 and take a photo of himself (a ‘selfie’) to start authentication process as elaborated above. An authentication signal may be automatically generated thereafter and sent to an authentication system to authenticate the user, as already described. In an exemplary embodiment shown, the pre-determined distance can be 5 meters but any such distance can be preset, as can be readily understood.
[000114] Thereafter, as shown at FIG. 3C, if the user is authenticated he may be advised by means of an appropriate message on his mobile device, as shown at 342.He may also be guided to stay within a pre-determined distance from the beacon for his attendance to be properly marked, as shown at 342. A courtesy message may be displayed as shown at 344. The proposed system may thereafter generate presence signals at pre-determined intervals as elaborated above, and send those signals to a presence determination system for the user’s presence/attendance to be marked for classroom 3, as already described.
[000115] FIG. 4 illustrates a method of working of system proposed in accordance with an exemplary embodiment of the present disclosure.
23

[000116] In an aspect, present disclosure elaborates upon a computer implemented method to enable authentication and presence determination of a user. The method can include, at step 402, receiving, at a computer being carried by a user, at pre-determined intervals from a transmitter a plurality of signals each comprising at least a first unique identity (FUID) of the transmitter upon the computer being within a pre-determined distance from the transmitter; and step 404, receiving, at the computer from the user at least one biometric parameter of the user and conjoining the at least one biometric parameter, the FUID , a second unique identity (SUDD) of the computer, any or a combination of time of generation and time of receipt of first of the plurality of signals received by the computer, and a location parameter pertaining to the location to generate an authentication signal.
[000117] The method can include, at step 406, transmitting, from the computer the authentication signal to an authentication system for authentication of the user. [000118] The method can include, at step 408, conjoining, at the computer for each of the plurality of signals the SUDD, the FUID, any or a combination of corresponding times of generation and times of receipt of each of the plurality of signals, and the location parameter to generate presence signals, and at step 410 transmitting, from the computer the presence signals to a presence determination system upon the authentication to confirm presence of the user at the location at any or a combination of the times of generation and the times of receipt. [000119] In an aspect, the proposed method as elaborated above can be described in general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, etc., that perform particular functions or implement particular abstract data types. The method can also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[000120] The order in which the method is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method or alternate methods. Additionally, individual blocks may be deleted from the method without departing from the spirit and scope of the subject matter described herein.

Furthermore, the method can be implemented in any suitable hardware, software, firmware, or combination thereof. However, for ease of explanation, in the embodiments described above, the method may be considered to be implemented in the above described system. [000121] In an exemplary embodiment, transmitter used by the proposed system can be beacon. A beacon is a small Bluetooth radio transmitter that repeatedly transmits a single signal (thus termed as plurality of signals herein) that other devices can see. The signal is made up of a combination of letters and numbers transmitted on a regular interval (usually 1/10* of a second) that identify the beacon. This combination can be, for instance, a media access control address (MAC address) of the beacon.
[000122] A computing device (for instance a mobile phone /smartphone) can be configured
to receive the plurality of signals as long as the two devices (the beacon and the smartphone) are within a short pre-determined distance of each other.
[000123] The beacon can have a real time clock (RTC) and can have a global positioning system (GPS) in it. Data provided by these can be added to the signals being generated by the beacon. Hence the signals can carry a location parameter as well as a time stamp (indicating their time of generation. As can be readily understood, time of generation of the signal will vary for each of the plurality of signals.
[000124] In a school different classrooms can each be fitted with a beacon. Proposed system can be installed as an application (mobile app) on mobile devices (smartphones) of different teachers who may be required to carry their mobile phone with them for their attendance to be marked. Upon a teacher entering a class according to his/her time table, the teacher can access and start the mobile app. The app can automatically start receiving data from the beacon in that classroom. Using the camera on the smartphone, the teacher can take a 'selfie' when the proposed system /mobile app can automatically send the authentication signal ( as elaborated above ) to an authentication system that can authenticate the teacher by comparing the selfie to the photo of the teacher in the authentication system's database.
[000125] Upon authentication being accomplished, proposed system can send presence signals as elaborated above. The presence signals can be used by a presence determination system upon the authentication to confirm presence of the teacher in the classroom at times these presence sigals were generated. Cumulatively, the presence determination system can determine

when the teacher entered the classroom and when he/she left the classroom and, in this manner, determine attendance of the teacher as per his/her time table.
[000126] Various data and attendances as determined above can be used for analytics herein management of the school can check teacher wise, classroom wise, and subject wise data and used for better decision making. As can be readily understood, such monitoring of teachers as can be enabled by proposed system can ultimately lead to better quality of education as teachers will regularly devote time their timetables instead of sending 'proxies' to mark their attendance, or coming for a short while just to mark their attendance and leaving thereafter. [000127] In a similar manner, proposed system can be used for monitoring attendance of different staff in different industries and locations such as offices, hospitals, airports and even for outdoor locations such as parks, stadia etc.
[000128] Proposed system can be well used for dynamic face recognition wherein a user can send his/her photo (selfie) taken at a time and a location to the proposed system and the system can determine if the user is supposed to be at that location at that time and can initiate marking of attendance of the user accordingly, as elaborated above.
[000129] In this manner, proposed system can enable dynamic face recognition to authenticate a user and his/her presence at a location /premise. Some existing systems make use of video analytics /video FRS (face recognition system) for similar purposes. As can be readily understood, data generation and transmission in such systems impose a huge burden on the system with consequent impact on hardware and bandwidth requirements making purchase as well as operation of such systems expensive. Proposed system on the other hand uses one photo for the purpose and so has much less data requirements. Accordingly, proposed system offers an extremely low cost solution and extremely low data consumption as compared to video based FRSs.
[000130] As used herein, and unless the context dictates otherwise, the term "coupled to" is intended to include both direct coupling (in which two elements that are coupled to each other or in contact with each other) and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean "communicatively coupled with" over a network, where

two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.
[000131] Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C ... .and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[000132] While some embodiments of the present disclosure have been illustrated and described, those are completely exemplary in nature. The disclosure is not limited to the embodiments as elaborated herein only and it would be apparent to those skilled in the art that numerous modifications besides those already described are possible without departing from the inventive concepts herein. All such modifications, changes, variations, substitutions, and equivalents are completely within the scope of the present disclosure. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims.
ADVANTAGES OF THE INVENTION
[000133] The present disclosure provides for a system that enables reliable authentication
of a user at a location.
[000134] The present disclosure provides for a system that enables determination of time
period the user was present at the location.
[000135] The present disclosure provides for a system that has very low cost and low data
consumption in comparison to similar video-based face recognition systems.

WE CLAIMS

1) A system carried by a user to enable authentication and presence determination of said
user at a location, said system comprising one or more processors coupled with a
memory, the memory storing instructions executable by the one or more processors to:
receive at pre-determined intervals from a transmitter a plurality of signals
each comprising at least a first unique identity (FUID) of said transmitter upon
said system being within a pre-determined distance from said transmitter;
receive from said user at least one biometric parameter of said user and
conjoin said at least one biometric parameter, said FUID, a second unique identity
(SUID) of said system, any or a combination of time of generation and time of
receipt of first of said plurality of signals received by said system, and a location
parameter pertaining to said location to generate an authentication signal;
transmit said authentication signal to an authentication system for
authentication of said user;
conjoin for each of said plurality of signals said SUID, said FUID, any or
a combination of corresponding times of generation and times of receipt of each
of said plurality of signals, and said location parameter to generate presence
signals; and
transmit said presence signals to a presence determination system upon
said authentication to confirm presence of said user at said location at any or a
combination of said times of generation and said times of receipt.
2) The system of claim 1, wherein said location parameter is provided by any or both of said
transmitter and said system, or determined by said system using triangulation of signals
received from at least three of said transmitters.
3) The system of claim 1, wherein said at least one biometric parameter comprises any or a
combination of self-image of said user, one or more fingerprints of said user and iris
image of one or both eyes of said user.
4) The system of claim 1, wherein said system stores said authentication signal upon
disruption of communication between said system and said authentication system, and
28
sends said authentication signal to said authentication system upon restoration of said
communication.
5) The system of claim 1, wherein said system stores said presence signal upon disruption of
communication between said system and said presence determination system, and sends
said presence signal to said presence determination system upon restoration of said
communication and upon said authentication.
6) The system of claim 1, wherein said system automatically selects said transmitter from a
plurality of transmitters based upon said system being within a pre-determined distance
from said transmitter, or enables said user to manually select said transmitter.
7) The system of claim 1, wherein said times of generation are provided by said transmitter
and said times of receipt are provided by said system.
8) The system of claim1, wherein upon non-receipt of said at least one biometric parameter
within a pre-determined time, said system provides a log of actions made by said user on
a computing device configured with said system to said presence determination system
for further analysis thereupon.
9) The system of claim 1, wherein said system randomly performs authentication of said
transmitter by:
transmitting to said transmitter a second signal upon receipt of a first signal from
said transmitter, said second signal enabling said transmitter to generate and transmit to
said system a third signal carrying a code per a pre-determined sequence; and
transmitting said third signal to a central server to perform said authentication
based upon matching of said code with corresponding code as per said pre-determined
sequence stored at said central server.
10) The system of claim 1, wherein said system is configured in a mobile device associated
with said user, and wherein said SUID is associated with said mobile device.
11) The system of claim 10, wherein said SUID is any or a combination of IMEI of said
mobile device, SIM card inserted in said mobile device, and unique identity of a mobile
application pertaining to said system installed on said mobile device.
12) A computer implemented method to enable authentication and presence determination of
a user carrying said computer at a location, said method comprising steps of:
29
receiving, at said computer at pre-determined intervals from a transmitter
a plurality of signals each comprising at least a first unique identity (FUID) of
said transmitter upon said computer being within a pre-determined distance from
said transmitter;
receiving, at said computer from said user at least one biometric parameter
of said user and conjoining said at least one biometric parameter, said FUID, a
second unique identity (SUID) of said computer, any or a combination of time of
generation and time of receipt of first of said plurality of signals received by said
computer, and a location parameter pertaining to said location to generate an
authentication signal;
transmitting, from said computer said authentication signal to an
authentication system for authentication of said user;
conjoining, at said computer for each of said plurality of signals said
SUID, said FUID, any or a combination of corresponding times of generation and
times of receipt of each of said plurality of signals, and said location parameter to
generate presence signals; and
transmitting, from said computer said presence signals to a presence
determination system upon said authentication to confirm presence of said user at
said location at any or a combination of said times of generation and said times of
receipt.

Documents

Application Documents

# Name Date
1 201911018902-STATEMENT OF UNDERTAKING (FORM 3) [11-05-2019(online)].pdf 2019-05-11
2 201911018902-FORM FOR STARTUP [11-05-2019(online)].pdf 2019-05-11
3 201911018902-FORM FOR SMALL ENTITY(FORM-28) [11-05-2019(online)].pdf 2019-05-11
4 201911018902-FORM 1 [11-05-2019(online)].pdf 2019-05-11
5 201911018902-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-05-2019(online)].pdf 2019-05-11
6 201911018902-EVIDENCE FOR REGISTRATION UNDER SSI [11-05-2019(online)].pdf 2019-05-11
7 201911018902-DRAWINGS [11-05-2019(online)].pdf 2019-05-11
8 201911018902-DECLARATION OF INVENTORSHIP (FORM 5) [11-05-2019(online)].pdf 2019-05-11
9 201911018902-COMPLETE SPECIFICATION [11-05-2019(online)].pdf 2019-05-11
10 abstract.jpg 2019-06-20
11 201911018902-Proof of Right (MANDATORY) [02-08-2019(online)].pdf 2019-08-02
12 201911018902-FORM-26 [02-08-2019(online)].pdf 2019-08-02
13 201911018902-OTHERS-060819.pdf 2019-08-07
14 201911018902-Correspondence-060819.pdf 2019-08-07