WO2019138420A2 - Automatic water level control unit - Google Patents

Automatic water level control unit Download PDF

Info

Publication number
WO2019138420A2
WO2019138420A2 PCT/IN2018/050772 IN2018050772W WO2019138420A2 WO 2019138420 A2 WO2019138420 A2 WO 2019138420A2 IN 2018050772 W IN2018050772 W IN 2018050772W WO 2019138420 A2 WO2019138420 A2 WO 2019138420A2
Authority
WO
WIPO (PCT)
Prior art keywords
communication terminal
atleast
conversation
activity
location
Prior art date
Application number
PCT/IN2018/050772
Other languages
French (fr)
Other versions
WO2019138420A3 (en
Inventor
Pavan Kumar Gupta BOYINA
Original Assignee
Boyina Pavan Kumar Gupta
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Boyina Pavan Kumar Gupta filed Critical Boyina Pavan Kumar Gupta
Publication of WO2019138420A2 publication Critical patent/WO2019138420A2/en
Publication of WO2019138420A3 publication Critical patent/WO2019138420A3/en

Links

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/10Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • G08B13/1654Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems
    • G08B13/1672Actuation by interference with mechanical vibrations in air or other fluid using passive vibration detection systems using sonic detecting means, e.g. a microphone operating in the audio frequency range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines

Definitions

  • the present invention relates to the field of communication terminals, and in particular to the system and method for detecting and/or preventing the activation of the communication terminal features and for tracking the location of the communication terminals during the conversations.
  • the communication exchange involves in day-to-day life through communication terminals, there exists a need to impart a secured conversation.
  • Permission based conversations may include placing three way call, activating communication terminal features, involving third persons and the like by one of the communication terminals during the conversation without the permission of the other communication terminal.
  • Placing three way call include initiating the conference call, activating communication terminal features include activating the speaker, recorder, earphones and the like.
  • GPS Global Position System
  • communication terminals may use a navigation application to allow for identifying or locating the handheld device or to provide directions from current location to a desired destination.
  • the communication terminals are embodied with a location-determining circuit or system to periodically determine the location. Therefore, utilizing this technological advancement, the location of the communication terminal may be used to monitor the location of the persons or objects.
  • the GPS tracking can be employed in various environments such as business, security purpose and the like. One can monitor the location of employees, children, old people and the like, using this GPS technology that allows enhanced security. Even though different advanced technologies have developed, there is no such technology like this, which assists in GPS tracking of the communication terminals during the conversations that provide a more enhanced and accurate location tracking.
  • Existing detection systems do not provide a secured conversation between the communication terminals to maintain the confidential information secured during conversations. The detection systems do not identify the activation of features at the receiver communication terminal during the conversation. Further, the existing GPS tracking systems do not offer location tracking or continuous navigation of the receiver communication terminal during the conversations.
  • an activity detection system that provides a secured conversation between the communication terminals to maintain the confidential information secured during conversations.
  • a detection system that identifies the activation of features at the receiver communication terminal during the conversation through which the involvement of unauthorized persons can be avoided.
  • a geographic navigator that offers location tracking or continuous navigation of the receiver communication terminal during the conversation through which location of the person can be tracked in a more efficient way.
  • the primary objective of the present invention is to facilitate a secured conversation between the communication terminals to thereby avoid the intervention of unauthorized persons.
  • Another objective of the invention is to provide a security system that identifies at least one activity at the receiver communication terminal during the conversation.
  • Another objective of the invention is to provide a remedial action upon the identification of at least one activity at the receiver communication terminal.
  • Further objective of the invention is to provide an easy way to geographic navigation of the receiver communication terminal.
  • Further objective of the invention is to provide for the location tracking of the receiver communication terminal during the conversation.
  • the invention proposes a security system for communication terminals.
  • the following presents a simplified summary in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview. It is not intended to identify key/critical elements or to delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
  • a security system for the communication terminals comprises of a contact module, a call Log module, a messenger module, an activity detection module, a remedial action module, a geographic navigator module, an alert module and a history module.
  • the activity detection module is configured to detect atleast one activity committed at atleast one receiver communication terminal during the conversation.
  • the activity may include activation of certain features at said atleast one receiver communication terminal.
  • the features further consists of multi-party conference, recorder, loudspeaker, earphones, GPS location track and the like.
  • the remedial action module is configured to generate and implement atleast one remedial step with respect to said atleast one activity identified.
  • the remedial step may include providing atleast one activity notification or an alert whether or not to continue the conversation or an alert to disconnect the conversation between the communication terminals or in combination and the like.
  • the geographic navigator module is configured to track the location of said atleast one receiver communication terminal during the conversation.
  • the geographic navigator module may track the location or continuously navigate the location of atleast one receiver communication terminal based on certain confinements.
  • the confinements further include approval from said atleast one receiver communication terminal which inturn comprise of enabling preferred contacts to track the location anytime or enabling the contacts to track the location during the conversation upon request from the caller communication terminal.
  • the alert module is configured to provide a plurality of notifications in concern with either said atleast one activity identified or updates and the like.
  • the history module is configured to store and manage the history of prior activity detections and geographic navigations.
  • the activity detection module in combination with said remedial action module aids in acquiring secured conversation between the caller communication terminal and said atleast one receiver communication terminal.
  • the communication terminal may comprise a mobile phone, a laptop, a personal digital assistant, a tablet computer, a desktop computer and the like.
  • FIG. 1 shows a schematic block diagram 100 of a security system embodied within a communication terminal according to an embodiment of the invention.
  • FIG. 2 shows an exemplary system 200 for depicting a conversation between the communication terminals according to an embodiment of the invention.
  • FIG. 3 shows an exemplary method 300 for detecting at least one activity at the receiver communication terminal during the conversation.
  • FIG. 4 shows an exemplary method 400, for detecting the activity of multi-party conference at the receiver communication terminal during the conversation.
  • FIG. 5 shows an exemplary system 500 for a geographic navigation during the conversation according to an embodiment of the invention.
  • FIG. 6 shows an exemplary method 600 of tracking the location of the receiver communication terminal during the conversation.
  • FIG. 1 shows a schematic block diagram 100 of a security system embodied within a communication terminal.
  • the exemplary system has a communication terminal 101, a security system 102, a communication network 103 and a database 104.
  • the security system 102 is connected to the database 104 through the communication network 103.
  • the communication terminal 101 may comprise any device which is capable of sending and receiving voice signals to and from at least one other such communication terminal, such that the users of such communication terminals can have a conversation.
  • Examples of such communication terminals may include mobile or cellular phones, landline or wireline phones, laptops, personal digital assistants, tablet computers and the like.
  • the security system 102 further comprises a contact module 105, a call log module 106, a messenger module 107, an activity detection module 108, a remedial action module 109, a geographic navigator module 110, an alert module 111 and a history module 112.
  • the contact module 105 is configured to manage a plurality of communication terminal contacts where the contact information may include details such as contact number, e-mail, occupation and the like.
  • the contact module 105 allows for a conversation between the communication terminals.
  • the call log module 106 manages the history of different calls that include incoming calls, outgoing calls, time of call, duration of call and the like.
  • the messenger module 107 allows for text conversations between the communication terminals, allows to send or receive different notifications or alerts, files, videos, photos and the like.
  • the activity detection module 108 is configured to identify at least one activity committed at atleast one receiver communication terminal during the conversation. The activity comprises activation of different features at the receiver communication terminal.
  • the features may include a multi-party conference, a speaker, earphones, a recorder and the like which are present within the receiver communication terminal.
  • the remedial action module 109 involves remedial steps that are to be generated and implemented with respect to the activity identified at the receiver communication terminal.
  • the remedial steps may comprise of providing an activity notification or an alert whether or not to continue the conversation or an alert to disconnect the conversation between the communication terminals or in combination and the like.
  • the conversation between the communication terminals may indicate a call communication between the caller communication terminal and the receiver communication terminal.
  • the geographic navigator module 110 is configured to facilitate location details of atleast one communication terminal contacts during the conversation between the caller communication terminal and atleast one receiver communication terminal, based on certain confinements.
  • the confinements may comprise for allowing the navigation of atleast one receiver communication terminal during the conversation with permission acceptance of atleast one receiver communication terminal and the like.
  • the geographic navigator module 110 utilizes the global positioning system (GPS) technology, global system for mobile communications (GSM) or general packet radio service (GPRS) and/or related cell phone technology or any combination thereof, to provide a greater tracking range than the presently available tracking systems.
  • GPS global positioning system
  • GSM global system for mobile communications
  • GPRS general packet radio service
  • the alert module 111 is configured to provide a plurality of notifications in concern with either any activity identified or any updates and thereof that may include visual, audio and the like.
  • the history module 112 is configured for storing and managing the history of activity detections and geographic navigations during conversations where the data can be accessed in future. Previous activity detections and geographic navigations can be retrieved either calendar based or contact number based with precise details. Further, when a call arrives from a communication terminal which is previously identified with an activity detection, the history module 112 warns the user with a notification as it is an unsecured call. The notification may involve highlighting the warning message as soon as the call arrives.
  • FIG. 2 shows an exemplary system 200 depicting a conversation between the communication terminals.
  • the exemplary system has a caller communication terminal 201, a receiver communication terminal 202 and a communication link 203.
  • the caller communication terminal 201 is represented with the symbol C and the receiver communication terminal 202 is represented with the symbol R.
  • the conversation between the caller communication terminal 201 and the receiver communication terminal 202 is carried out through a specific communication link 203.
  • the caller communication terminal 201 is in activation along with the security system 204 during the conversation to identify at least one activity 205 committed at the receiver communication terminal 202.
  • the receiver communication terminal 202 is depicted with an activity 205 of loud-speaker activation during the conversation which is to be identified by the security system 204, present within the caller communication terminal 201.
  • FIG. 3 shows an exemplary method 300, an operation for detecting at least one activity during the conversation between the communication terminals.
  • the conversation is initiated between the caller communication terminal and the receiver communication terminal.
  • the security system is automatically activated at the caller communication terminal at step 302.
  • the loud-speaker is activated at the receiver communication terminal where the user might attempt to involve other unauthorized persons into the conversation without any authorization of the caller communication terminal.
  • activity detection module present within the security system detects the activity of the loud-speaker activation at the receiver communication terminal. As soon as the activity is detected by the activity detection module, a remedial step is generated and implemented by the remedial action module at step 305.
  • the remedial step may include either providing a warning notification to the caller communication terminal pertaining to the activity or providing an alert whether or not to continue the conversation after the activity is detected.
  • the conversation between the caller communication terminal and the receiver communication terminal can be disconnected, if the caller does not respond to the above mentioned notifications and the like. Therefore, the exemplary operation of detecting at least one activity demonstrates a secured conversation between the communication terminals.
  • the activity detection method may include continuous monitoring of the applications such as loud speaker and recorder during the conversation.
  • the security system may scan the usage of the loud speaker and the recorder at the receiver communication terminal and initiate a flag as a notification upon the detection.
  • FIG. 4 shows an exemplary method 400, an operation for detecting the activity of multi-party conference during the conversation at the receiver communication terminal.
  • the conversation is initiated between the caller communication terminal and the receiver communication terminal.
  • the security system is automatically activated at the caller communication terminal at step 402.
  • the multi-party conference call is activated at the receiver communication terminal where the user attempts to involve third person into the conversation without any authorization of the caller communication terminal.
  • the concerned conversation is continuously monitored in the database as well as in the call logs by applying an algorithm. The algorithm runs an array programming to justify whether the conversation involves any multi-party conference.
  • the activity detection module detects the activity of the multi-party conference call at the receiver communication terminal. As soon as the activity is detected, a remedial step is generated and implemented by the remedial action module at step 406.
  • FIG. 5 shows an exemplary system 500 of a geographic navigation during the conversation.
  • the exemplary system consists of a caller communication terminal 501, a receiver communication terminal 502, a communication link 503, a server 504, GPRS 505 and GPS 506.
  • the caller communication terminal 501 is provided with a capability of determining the location of the receiver communication terminal 502, using the geographic navigator module present within the security system.
  • the system also has the capability to navigate the receiver communication terminal 502 during the conversation by using the geographic navigator module.
  • the server 504 communicates with the GPRS 505 network which in turn receives and sends the GPS satellite signals 506.
  • the geographic navigator module receives and processes the GPS satellite signals 506 to determine the location of the receiver communication terminal 502 and also further to provide the track of the receiver communication terminal 502.
  • the GPS navigation of the receiver communication terminal 502 during the conversation can be accomplished, basing on certain confinements.
  • the confinements may include approval of the receiver communication terminal 502 to allow for the location tracking by specific caller communication terminal 501.
  • the approval may include enabling some of the contacts to track the location anytime or enabling the contact during the conversation itself upon the request from specific caller communication terminal 501.
  • FIG. 6 shows an exemplary method 600 for operation of tracking the location of the receiver communication terminal during the conversation.
  • the conversation is initiated between the caller communication terminal and the receiver communication terminal.
  • the security system is automatically activated at the caller communication terminal at step 602.
  • the geographic navigator module is enabled to track the location or to continuously navigate the location of the receiver communication terminal.
  • the geographic navigator module receives the GPS satellite signals from the GPRS network through the server.
  • the GPS satellite signals are further processed by the geographic navigator module to track the location.
  • the GPS satellite signals are processed based on the digital data of the longitude and latitude points of the communication terminal.
  • the processed signals are displayed which indicate the location of the receiver communication terminal.
  • the geographic navigator module 110 may operate in conjunction with the communication terminal GPS to track the location.
  • the alert module of the present security system may provide notifications to the communication terminal through the assistance of data connectivity during the conversation or after the conversation.
  • the communication terminal may receive the notifications either through the communication terminal networking service or through the data connectivity of the communication terminal. Further, the system facilitates to provide notifications with features such as an audio indication, a display indication, a vibration and the like.
  • the present invented security system provides a secured conversation between the communication terminals using the activity detection which facilitates in securing confidential information during the conversations.
  • the system also prevents the unsecured conversation by generating certain remedial steps. Therefore, the system eliminates unauthorized persons to engage in the conversations allowing the authorized person to place a call with confidence.
  • using the invented geographic navigator module one can monitor the location of either employees or children or old people or students in a precise way thereby facilitating security of various individuals and business sectors.

Abstract

The invention relates to a security system for detecting the activation of the communication terminal features and for tracking the location of the communication terminals during the conversations. The system is mainly configured to detect any activation of features at the receiver communication terminal during the conversation between the caller communication terminal and the receiver communication terminal and to implement certain remedial step with respect to at least one activity identified at the receiver communication terminal. Therefore, the system with the activity detection along with the remedial step aids in acquiring secured conversation between the caller communication terminal and the receiver communication terminal. The system is further configured to track the location of the receiver communication terminal during the conversation.

Description

AUTOMATIC WATER LEVEL CONTROL UNIT
DESCRIPTION:
Field of Invention:
[0001] The present invention relates to the field of communication terminals, and in particular to the system and method for detecting and/or preventing the activation of the communication terminal features and for tracking the location of the communication terminals during the conversations.
Background of the invention:
[0002] Telephone calls play a vital role in recent times, aiding various sectors that include individuals, business sectors etc. As the communication exchange involves in day-to-day life through communication terminals, there exists a need to impart a secured conversation. There are many techniques employed within the communication services to maintain a confidential and secured communication sessions.
[0003] Over the past several years, a great emphasis has been laid on increasing the security of telecommunications systems. Using different security systems, one can avoid unauthorized persons to intercept and access voice, data, facsimile, video or other information which are not intended for them. Individuals and different business sectors are well aware of the threats to their communications systems because of the potential breakdowns in security. Due to the increased use of cellular phones in which conversations are carried over the air, there exists an increased chance of unsecured conversations.
[0004] Permission based conversations may include placing three way call, activating communication terminal features, involving third persons and the like by one of the communication terminals during the conversation without the permission of the other communication terminal. Placing three way call include initiating the conference call, activating communication terminal features include activating the speaker, recorder, earphones and the like.
[0005] Many security and monitoring systems have evolved to mitigate conversations that comprise of implementing different authentication or approval techniques. Different authentication systems include voice, biometric, PIN identification and the like to have a secured call. The approval techniques may include permission based calls allowing the users for confirmation before placing a call.
[0006] Coming to the conference calls, an important feature is that one has to affirm who is on a conference call to ensure that the call is conducted efficiently and within its security boundaries. This results in exerting some restrictions on the participants even though variant security and monitoring systems have evolved. That is, despite the fact that some of the participants are authorized, most of the companies do not attempt their employees to participate in a conference call unless some of the security criteria are satisfied. Thus, during conversations either individuals or business sectors face situations where the participants might engage unauthorized participants either by initiating a multi-party call or by activating communication terminal features.
[0007] Other revolutionary improvements include tracking the location or position of the individuals using Global Position System (GPS) with relative accuracy. As approaches for GPS location tracking have increased, the cost of GPS-based devices has decreased. This resulted in incorporation of GPS devices into portable handheld devices or communication terminals. For instance, communication terminals may use a navigation application to allow for identifying or locating the handheld device or to provide directions from current location to a desired destination. To accomplish this, the communication terminals are embodied with a location-determining circuit or system to periodically determine the location. Therefore, utilizing this technological advancement, the location of the communication terminal may be used to monitor the location of the persons or objects.
[0008] The GPS tracking can be employed in various environments such as business, security purpose and the like. One can monitor the location of employees, children, old people and the like, using this GPS technology that allows enhanced security. Even though different advanced technologies have developed, there is no such technology like this, which assists in GPS tracking of the communication terminals during the conversations that provide a more enhanced and accurate location tracking. [0009] Existing detection systems do not provide a secured conversation between the communication terminals to maintain the confidential information secured during conversations. The detection systems do not identify the activation of features at the receiver communication terminal during the conversation. Further, the existing GPS tracking systems do not offer location tracking or continuous navigation of the receiver communication terminal during the conversations.
[0010] Hence, there is a need for an activity detection system that provides a secured conversation between the communication terminals to maintain the confidential information secured during conversations. There is a requirement of a detection system that identifies the activation of features at the receiver communication terminal during the conversation through which the involvement of unauthorized persons can be avoided. Further, there is a need for a geographic navigator that offers location tracking or continuous navigation of the receiver communication terminal during the conversation through which location of the person can be tracked in a more efficient way.
Objectives of the invention:
[0011] The primary objective of the present invention is to facilitate a secured conversation between the communication terminals to thereby avoid the intervention of unauthorized persons.
[0012] Another objective of the invention is to provide a security system that identifies at least one activity at the receiver communication terminal during the conversation.
[0013] Another objective of the invention is to provide a remedial action upon the identification of at least one activity at the receiver communication terminal.
[0014] Further objective of the invention is to provide an easy way to geographic navigation of the receiver communication terminal.
[0015] Further objective of the invention is to provide for the location tracking of the receiver communication terminal during the conversation.
Summary of the Invention:
[0016] The invention proposes a security system for communication terminals. The following presents a simplified summary in order to provide a basic understanding of some aspects of the claimed subject matter. This summary is not an extensive overview. It is not intended to identify key/critical elements or to delineate the scope of the claimed subject matter. Its sole purpose is to present some concepts in a simplified form as a prelude to the more detailed description that is presented later.
[0017] According to an aspect of the present invention, a security system for the communication terminals comprises of a contact module, a call Log module, a messenger module, an activity detection module, a remedial action module, a geographic navigator module, an alert module and a history module. The activity detection module is configured to detect atleast one activity committed at atleast one receiver communication terminal during the conversation. The activity may include activation of certain features at said atleast one receiver communication terminal. The features further consists of multi-party conference, recorder, loudspeaker, earphones, GPS location track and the like.
[0018] The remedial action module is configured to generate and implement atleast one remedial step with respect to said atleast one activity identified. The remedial step may include providing atleast one activity notification or an alert whether or not to continue the conversation or an alert to disconnect the conversation between the communication terminals or in combination and the like.
[0019] The geographic navigator module is configured to track the location of said atleast one receiver communication terminal during the conversation. The geographic navigator module may track the location or continuously navigate the location of atleast one receiver communication terminal based on certain confinements. The confinements further include approval from said atleast one receiver communication terminal which inturn comprise of enabling preferred contacts to track the location anytime or enabling the contacts to track the location during the conversation upon request from the caller communication terminal. [0020] The alert module is configured to provide a plurality of notifications in concern with either said atleast one activity identified or updates and the like. The history module is configured to store and manage the history of prior activity detections and geographic navigations. The activity detection module in combination with said remedial action module aids in acquiring secured conversation between the caller communication terminal and said atleast one receiver communication terminal. The communication terminal may comprise a mobile phone, a laptop, a personal digital assistant, a tablet computer, a desktop computer and the like.
Description of Drawings:
[0021] The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate an embodiment of the invention, and, together with the description, serve to explain the principles of the invention.
[0022] FIG. 1 shows a schematic block diagram 100 of a security system embodied within a communication terminal according to an embodiment of the invention.
[0023] FIG. 2 shows an exemplary system 200 for depicting a conversation between the communication terminals according to an embodiment of the invention.
[0024] FIG. 3 shows an exemplary method 300 for detecting at least one activity at the receiver communication terminal during the conversation.
[0025] FIG. 4 shows an exemplary method 400, for detecting the activity of multi-party conference at the receiver communication terminal during the conversation.
[0026] FIG. 5 shows an exemplary system 500 for a geographic navigation during the conversation according to an embodiment of the invention.
[0027] FIG. 6 shows an exemplary method 600 of tracking the location of the receiver communication terminal during the conversation. Detailed description of Drawings:
[0028] An exemplary embodiment of the present invention will be described in reference to the accompanying drawings. Wherever possible, same or similar reference numerals are used in the drawings and the description to refer to the same or like parts or steps.
[0029] FIG. 1 shows a schematic block diagram 100 of a security system embodied within a communication terminal. The exemplary system has a communication terminal 101, a security system 102, a communication network 103 and a database 104. The security system 102 is connected to the database 104 through the communication network 103.
[0030] As used herein, the communication terminal 101 may comprise any device which is capable of sending and receiving voice signals to and from at least one other such communication terminal, such that the users of such communication terminals can have a conversation. Examples of such communication terminals may include mobile or cellular phones, landline or wireline phones, laptops, personal digital assistants, tablet computers and the like.
[0031] The security system 102 further comprises a contact module 105, a call log module 106, a messenger module 107, an activity detection module 108, a remedial action module 109, a geographic navigator module 110, an alert module 111 and a history module 112.
[0032] The contact module 105 is configured to manage a plurality of communication terminal contacts where the contact information may include details such as contact number, e-mail, occupation and the like. The contact module 105 allows for a conversation between the communication terminals. The call log module 106 manages the history of different calls that include incoming calls, outgoing calls, time of call, duration of call and the like. The messenger module 107 allows for text conversations between the communication terminals, allows to send or receive different notifications or alerts, files, videos, photos and the like. [0033] The activity detection module 108 is configured to identify at least one activity committed at atleast one receiver communication terminal during the conversation. The activity comprises activation of different features at the receiver communication terminal. The features may include a multi-party conference, a speaker, earphones, a recorder and the like which are present within the receiver communication terminal. The remedial action module 109 involves remedial steps that are to be generated and implemented with respect to the activity identified at the receiver communication terminal. The remedial steps may comprise of providing an activity notification or an alert whether or not to continue the conversation or an alert to disconnect the conversation between the communication terminals or in combination and the like.
[0034] In the complete description, the conversation between the communication terminals may indicate a call communication between the caller communication terminal and the receiver communication terminal.
[0035] The geographic navigator module 110 is configured to facilitate location details of atleast one communication terminal contacts during the conversation between the caller communication terminal and atleast one receiver communication terminal, based on certain confinements. The confinements may comprise for allowing the navigation of atleast one receiver communication terminal during the conversation with permission acceptance of atleast one receiver communication terminal and the like. The geographic navigator module 110 utilizes the global positioning system (GPS) technology, global system for mobile communications (GSM) or general packet radio service (GPRS) and/or related cell phone technology or any combination thereof, to provide a greater tracking range than the presently available tracking systems.
[0036] The alert module 111 is configured to provide a plurality of notifications in concern with either any activity identified or any updates and thereof that may include visual, audio and the like. The history module 112 is configured for storing and managing the history of activity detections and geographic navigations during conversations where the data can be accessed in future. Previous activity detections and geographic navigations can be retrieved either calendar based or contact number based with precise details. Further, when a call arrives from a communication terminal which is previously identified with an activity detection, the history module 112 warns the user with a notification as it is an unsecured call. The notification may involve highlighting the warning message as soon as the call arrives.
[00B7] FIG. 2 shows an exemplary system 200 depicting a conversation between the communication terminals. The exemplary system has a caller communication terminal 201, a receiver communication terminal 202 and a communication link 203. The caller communication terminal 201 is represented with the symbol C and the receiver communication terminal 202 is represented with the symbol R.
[0038] The conversation between the caller communication terminal 201 and the receiver communication terminal 202 is carried out through a specific communication link 203. The caller communication terminal 201 is in activation along with the security system 204 during the conversation to identify at least one activity 205 committed at the receiver communication terminal 202. The receiver communication terminal 202 is depicted with an activity 205 of loud-speaker activation during the conversation which is to be identified by the security system 204, present within the caller communication terminal 201.
[0039] FIG. 3 shows an exemplary method 300, an operation for detecting at least one activity during the conversation between the communication terminals. At step 301, the conversation is initiated between the caller communication terminal and the receiver communication terminal. Upon initiation of the conversation, the security system is automatically activated at the caller communication terminal at step 302. At step 303, the loud-speaker is activated at the receiver communication terminal where the user might attempt to involve other unauthorized persons into the conversation without any authorization of the caller communication terminal. At step 304, activity detection module present within the security system detects the activity of the loud-speaker activation at the receiver communication terminal. As soon as the activity is detected by the activity detection module, a remedial step is generated and implemented by the remedial action module at step 305. The remedial step may include either providing a warning notification to the caller communication terminal pertaining to the activity or providing an alert whether or not to continue the conversation after the activity is detected. The conversation between the caller communication terminal and the receiver communication terminal can be disconnected, if the caller does not respond to the above mentioned notifications and the like. Therefore, the exemplary operation of detecting at least one activity demonstrates a secured conversation between the communication terminals.
[0040] In detail as an example, the activity detection method may include continuous monitoring of the applications such as loud speaker and recorder during the conversation. The security system may scan the usage of the loud speaker and the recorder at the receiver communication terminal and initiate a flag as a notification upon the detection.
[0041] FIG. 4 shows an exemplary method 400, an operation for detecting the activity of multi-party conference during the conversation at the receiver communication terminal. At step 401, the conversation is initiated between the caller communication terminal and the receiver communication terminal. Upon initiation of the conversation, the security system is automatically activated at the caller communication terminal at step 402. At step 403, the multi-party conference call is activated at the receiver communication terminal where the user attempts to involve third person into the conversation without any authorization of the caller communication terminal. At step 404, the concerned conversation is continuously monitored in the database as well as in the call logs by applying an algorithm. The algorithm runs an array programming to justify whether the conversation involves any multi-party conference. At step 405, the activity detection module detects the activity of the multi-party conference call at the receiver communication terminal. As soon as the activity is detected, a remedial step is generated and implemented by the remedial action module at step 406.
[0042] FIG. 5 shows an exemplary system 500 of a geographic navigation during the conversation. The exemplary system consists of a caller communication terminal 501, a receiver communication terminal 502, a communication link 503, a server 504, GPRS 505 and GPS 506. During the conversation, the caller communication terminal 501 is provided with a capability of determining the location of the receiver communication terminal 502, using the geographic navigator module present within the security system. The system also has the capability to navigate the receiver communication terminal 502 during the conversation by using the geographic navigator module. The server 504 communicates with the GPRS 505 network which in turn receives and sends the GPS satellite signals 506. The geographic navigator module receives and processes the GPS satellite signals 506 to determine the location of the receiver communication terminal 502 and also further to provide the track of the receiver communication terminal 502.
[0043] The GPS navigation of the receiver communication terminal 502 during the conversation can be accomplished, basing on certain confinements. The confinements may include approval of the receiver communication terminal 502 to allow for the location tracking by specific caller communication terminal 501. The approval may include enabling some of the contacts to track the location anytime or enabling the contact during the conversation itself upon the request from specific caller communication terminal 501.
[0044] FIG. 6 shows an exemplary method 600 for operation of tracking the location of the receiver communication terminal during the conversation. At step 601, the conversation is initiated between the caller communication terminal and the receiver communication terminal. Upon the initiation of the conversation, the security system is automatically activated at the caller communication terminal at step 602. At step 603, the geographic navigator module is enabled to track the location or to continuously navigate the location of the receiver communication terminal. At step 604, the geographic navigator module receives the GPS satellite signals from the GPRS network through the server. At step 605, the GPS satellite signals are further processed by the geographic navigator module to track the location. The GPS satellite signals are processed based on the digital data of the longitude and latitude points of the communication terminal. Thus at step 606, the processed signals are displayed which indicate the location of the receiver communication terminal. The geographic navigator module 110 may operate in conjunction with the communication terminal GPS to track the location.
[0045] The alert module of the present security system may provide notifications to the communication terminal through the assistance of data connectivity during the conversation or after the conversation. The communication terminal may receive the notifications either through the communication terminal networking service or through the data connectivity of the communication terminal. Further, the system facilitates to provide notifications with features such as an audio indication, a display indication, a vibration and the like.
[0046] Thus, the present invented security system provides a secured conversation between the communication terminals using the activity detection which facilitates in securing confidential information during the conversations. The system also prevents the unsecured conversation by generating certain remedial steps. Therefore, the system eliminates unauthorized persons to engage in the conversations allowing the authorized person to place a call with confidence. Further, using the invented geographic navigator module, one can monitor the location of either employees or children or old people or students in a precise way thereby facilitating security of various individuals and business sectors.
[0047] It will readily be apparent that numerous modifications and alterations can be made to the processes described in the foregoing examples without departing from the principles underlying the invention, and all such modifications and alterations are intended to be embraced by this application.

Claims

CLAIMS I Claim:
1. A security system for communication terminals comprising:
an activity detection module configured to detect atleast one activity at atleast one receiver communication terminal during conversation;
a remedial action module to generate and implement atleast one remedial step with respect to said atleast one activity identified;
a geographic navigator module configured to track location of said atleast one receiver communication terminal during conversation;
an alert module to provide plurality of notifications in concern with either said atleast one activity identified or updates and the like;
a history module to store and manage history of prior activity detections and geographic navigations; and
wherein said activity detection module in combination with said remedial action module aids in acquiring secured conversation between caller communication terminal and said atleast one receiver communication terminal.
2. The security system for communication terminals as recited in claim 1, wherein said atleast one activity may comprise activation of certain features like activation of multi party conference, recorder, loudspeaker, earphones, GPS location track and the like at said atleast one receiver communication terminal.
S. The security system for communication terminals as recited in claim 1, wherein said atleast one remedial step may comprise providing atleast one activity notification or an alert whether or not to continue the conversation or an alert to disconnect the conversation between the communication terminals or in combination and the like.
4. The security system for communication terminals as recited in claim 1, wherein said geographic navigator module may track location or continuously navigate location of atleast one receiver communication terminal based on certain confinements.
5. The security system for communication terminals as recited in claim 1, wherein said confinements may comprise approval from said atleast one receiver communication terminal to allow for location tracking by the caller communication terminal.
6. The security system for communication terminals as recited in claim 1, wherein said approval may comprise enabling preferred contacts to track location anytime or enabling contacts to track location during the conversation upon request from the caller communication terminal.
7. The security system for communication terminals as recited in claim 1, wherein said communication terminal may comprise a mobile phone, a laptop, a personal digital assistant, a tablet computer, a desktop computer and the like.
8. A method for detecting at least one activity at receiver communication terminal comprising:
initiating a conversation between a caller communication terminal and said atleast one receiver communication terminal;
activating a security system automatically at the caller communication terminal;
initiating atleast one activity at said atleast one receiver communication terminal without any authorization of the caller communication terminal;
detecting said atleast one activity using activity detection module;
generating a remedial step by remedial action module for secured conversation.
9. A method for tracking location during conversation comprising:
initiating a conversation between a caller communication terminal and atleast one receiver communication terminal;
activating a security system automatically at the caller communication terminal;
enabling a geographic navigator module to track location of said atleast one receiver communication terminal;
receiving GPS satellite signals from GPRS network through server;
processing the received GPS satellite signals to track the location; displaying processed GPS satellite signals to indicate the location of said atleast one receiver communication terminal.
PCT/IN2018/050772 2018-01-10 2018-11-21 Automatic water level control unit WO2019138420A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN201841001150 2018-01-10
IN201841001150 2018-01-10

Publications (2)

Publication Number Publication Date
WO2019138420A2 true WO2019138420A2 (en) 2019-07-18
WO2019138420A3 WO2019138420A3 (en) 2019-09-12

Family

ID=67218952

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2018/050772 WO2019138420A2 (en) 2018-01-10 2018-11-21 Automatic water level control unit

Country Status (1)

Country Link
WO (1) WO2019138420A2 (en)

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4463189B2 (en) * 2005-11-22 2010-05-12 Nec東芝スペースシステム株式会社 Mobile device with search function
US20140310772A1 (en) * 2013-04-15 2014-10-16 Sky Socket, Llc Location-based Functionality Restrictions

Also Published As

Publication number Publication date
WO2019138420A3 (en) 2019-09-12

Similar Documents

Publication Publication Date Title
US10278028B2 (en) System and method for monitoring locations of mobile devices
US10681552B2 (en) Method for mitigating the unauthorized use of a device
US9881152B2 (en) System for monitoring the unauthorized use of a device
US8932368B2 (en) Method for monitoring the unauthorized use of a device
US8719909B2 (en) System for monitoring the unauthorized use of a device
US9860721B2 (en) Intelligent emergency signal transmission system using mobile phone and method thereof
US8248237B2 (en) System for mitigating the unauthorized use of a device
US20140308915A1 (en) Notification and Tracking System for Mobile Devices
US20090249443A1 (en) Method for monitoring the unauthorized use of a device
US20130137376A1 (en) Systems and methods for recovering low power devices
US20090253408A1 (en) Method for mitigating the unauthorized use of a device
US20080318592A1 (en) Delivering telephony communications to devices proximate to a recipient after automatically determining the recipient's location
US20090253406A1 (en) System for mitigating the unauthorized use of a device
US20070036279A1 (en) Personal notification and broadcasting
US20080159496A1 (en) Method and System for Detecting a Transfer of an End Point Device
US20120178476A1 (en) Determining the last location of lost and stolen portable electronic devices when wireless communications access to the lost or stolen devices is lost or intermittent
US9342977B2 (en) Method and apparatus for mobile device security
US10798250B2 (en) Management server, communication system, notification method and program
US8750821B2 (en) Method and apparatus for reporting emergency in call state in portable wireless terminal
US9967725B2 (en) Call 911 the app
WO2019138420A2 (en) Automatic water level control unit
WO2019106688A1 (en) Security system for communication terminals
US20240163648A1 (en) Voice surveillance system using enhanced metadata and geotagging capabilities
GB2585184A (en) Real-time voice communications system with user/counterparty verification
Dahri et al. Smart Activities Monitoring System (SAMS) for security applications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18900048

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18900048

Country of ref document: EP

Kind code of ref document: A2