AU2021100782A4 - An Automatic Geofence based Authentication to a User - Google Patents

An Automatic Geofence based Authentication to a User Download PDF

Info

Publication number
AU2021100782A4
AU2021100782A4 AU2021100782A AU2021100782A AU2021100782A4 AU 2021100782 A4 AU2021100782 A4 AU 2021100782A4 AU 2021100782 A AU2021100782 A AU 2021100782A AU 2021100782 A AU2021100782 A AU 2021100782A AU 2021100782 A4 AU2021100782 A4 AU 2021100782A4
Authority
AU
Australia
Prior art keywords
user
module
location
data
unique human
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
AU2021100782A
Inventor
Manjula R. Bharamagoudra
Venkateswara Raju K.
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to AU2021100782A priority Critical patent/AU2021100782A4/en
Application granted granted Critical
Publication of AU2021100782A4 publication Critical patent/AU2021100782A4/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control

Abstract

A system for granting access to a user is disclosed. The system includes a data mapper module configured to receive a unique human identity from a user, to map the unique human identity to a plurality of details associated with the user, to store the mapped details in a server; a location module configured to extract location of the user; an access module configured to receive a request for one or more activities from the user, to receive the unique human identity from the user, to receive the location of the user to grant access to the user and a synchronization module configured to sync data representative of the one or more activities of the user with an enterprise resource planning module, to analyze the data of the user and to generate at least one report based on the data of the user. Authentication methods (password, PIN, Finger Print) often do not scale well to the context of mobile devices in terms of security and usability. However, the adoption of software-based authenticator on a broad range of smartphones enables the use of two-step authentication as an additional authentication factor. 17 300 310 Receive a unique human identity from a user Map unique human identity to a plurality of details associated with 320 the user 330 Store the mapped details in a server. 340 Extract the location of the user. + -350 Receive a request for one or more activities from the user. 360 Receive the unique human identity from the user. 370 Receive the location of the user. 380 Grant access to the user based on the unique human identity and the location of the user 390 Sync data between the server and an enterprise resource planning module 400 Analyze the data of the user 410 Generate at least one report based on the data of the user FIG. 3

Description

310 Receive a unique human identity from a user
Map unique human identity to a plurality of details associated with 320 the user 330 Store the mapped details in a server. 340 Extract the location of the user. + -350 Receive a request for one or more activities from the user. 360 Receive the unique human identity from the user. 370 Receive the location of the user. 380 Grant access to the user based on the unique human identity and the location of the user 390 Sync data between the server and an enterprise resource planning module 400 Analyze the data of the user
410 Generate at least one report based on the data of the user
FIG. 3
An Automatic Geofence based Authentication to a User
BACKGROUND
[0001] Embodiments of a present disclosure relate to a tracking system and more particularly to, a system and a method for granting access to a user.
[0002] In many organizations, there is no reliable way to authenticate and track a user, wherein the user may be a student, an employee, and a faculty. The unreliable ways affect quality, productivity, the efficiency of an organization. Conventionally, the organizations provide an access card or a user number to the user to be manually punched into a terminal provided in the organization. Further, the delivery of the access cards belonging to personal identity causes operational difficulties for the organization when there is a plurality of locations the organization is based in.
[0003] Providing the access cards to multiple people at multiple locations causes a plurality of problems to the organization, such as logistic expenditure and card management. There might be a scenario where an access card may get lost during the process of providing the access cards, causing additional issues. In another scenario, the access card provided to a first user may be misused, wherein the user may hand over his access card to a second user to extract access in a restricted area or to register working hours of the first user.
[0004] Further, the entering and exiting of a user is usually manually recorded or by the use of terminals where the access card is supposed to be swiped on entry and/or exit, or biometric terminals where the user needs to provide either a fingerprint or an iris scan as an input in order to receive an access or while exiting the organization at the end of a working shift.
[0005] Hence, there is a need for an improved system and a method for granting access to a user in order to address the aforementioned issues.
BRIEF DESCRIPTION
[0006] In accordance with an embodiment of the present disclosure, a system for granting access to a user is disclosed. The system includes a data mapper module configured to receive a unique human identity from a user. The data mapper module is also configured to map the unique human identity to a plurality of details associated with the user. The data mapper module is also configured to store the mapped details in a server. The system also includes a location module communicatively coupled to the data mapper module. The location module is configured to extract location of the user. The system also includes an access module communicatively coupled to the location module. The access module is configured to receive a request for one or more activities from the user. The access module is also configured to receive the unique human identity from the user. The access module is also configured to receive the location of the user. The access module is also configured to grant access to the user based on the unique human identity and the location of the user. The system also includes a synchronization module communicatively coupled to the access module. The synchronization module is configured to sync data representative of the one or more activities of the user with an enterprise resource planning module. The synchronization module is also configured to analyze the data of the user. The synchronization module is also configured to generate at least one report based on the data of the user.
[0007] In accordance with another embodiment of the present disclosure a method for granting access to a user is disclosed. The method includes receiving, by a data mapper module, a unique human identity from a user. The method also includes mapping, by the data mapper module, the unique human identity to a plurality of details associated with the user. The method also includes storing, by the data mapper module, the mapped details in a server. The method also includes extracting, by a location module, the location of the user. The method also includes receiving, by an access module, a request for one or more activities from the user. The method also includes receiving, by the access module, the unique human identity from the user. The method also includes receiving, by the access module, the location of the user. The method also includes granting, by the access module, access to the user based on the unique human identity and the location of the user. The method also includes syncing, by a synchronization module, data representative of the one or more activities of the user with an enterprise resource planning module. The method also includes syncing, by a synchronization module, data between the server and an enterprise resource planning module. The method also includes analyzing, by the synchronization module, the data of the user. The method also includes generating, by the synchronization module, at least one report based on the data of the user.
[0008] To further clarify the advantages and features of the present invention, a more particular description of the invention will follow by reference to specific embodiments thereof, which are illustrated in the appended figures. It is to be appreciated that these figures depict only typical embodiments of the invention and are therefore not to be considered limiting in scope. The invention will be described and explained with additional specificity and detail with the appended figures.
BRIEF DESCRIPTION OF THE DRAWINGS
The disclosure will be described and explained with additional specificity and detail with the accompanying figures in which:
[0009] FIG. 1 is a block diagram of a system for granting access to a user in accordance with an embodiment of the present disclosure;
[0010] FIG. 2 is a schematic representation of exemplary embodiment of the system for granting access to a user of FIG. 1 in accordance with an embodiment of the present disclosure; and
[0011] FIG. 3 is a flow chart representing the steps involved in a method for granting access to a user of FIG. 1 in accordance with an embodiment of the present disclosure.
[0012] Further, those skilled in the art will appreciate that elements in the figures are illustrated for simplicity and may not have necessarily been drawn to scale. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the figures by conventional symbols, and the figures may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the figures with details that will be readily apparent to those skilled in the art having the benefit of the description herein.
DETAILED DESCRIPTION
[0013] For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the figures and specific language will be used to describe them. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended. Such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as would normally occur to those skilled in the art are to be construed as being within the scope of the present invention.
[0014] The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such a process or method. Similarly, one or more devices or sub systems or elements or structures or components preceded by "comprises... a" does not, without more constraints, preclude the existence of other devices, sub-systems, elements, structures, components, additional devices, additional sub-systems, additional elements, additional structures or additional components. Appearances of the phrase "in an embodiment", "in another embodiment" and similar language throughout this specification may, but not necessarily do, all refer to the same embodiment.
[0015] Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by those skilled in the art to which this invention belongs. The system, methods, and examples provided herein are only illustrative and not intended to be limiting.
[0016] Embodiments of the present disclosure will be described below in detail with reference to the accompanying figures.
[0017] In the following specification and the claims, reference will be made to a number of terms, which shall be defined to have the following meanings. The singular forms "a", "an", and "the" include plural references unless the context clearly dictates otherwise.
[0018] Embodiments of the present disclosure relate to a system for granting access to a user. The system includes a data mapper module configured to receive a unique human identity from a user. The data mapper module is also configured to map the unique human identity to a plurality of details associated with the user. The data mapper module is also configured to store the mapped details in a server. The system also includes a location module communicatively coupled to the data mapper module. The location module is configured to extract location of the user. The system also includes an access module communicatively coupled to the location module. The access module is configured to receive a request for one or more activities from the user. The access module is also configured to receive the unique human identity from the user. The access module is also configured to receive the location of the user. The access module is also configured to grant access to the user based on the unique human identity and the location of the user. The system also includes a synchronization module communicatively coupled to the access module. The synchronization module is configured to sync data representative of the one or more activities of the user with an enterprise resource planning module. The synchronization module is also configured to analyze the data of the user. The synchronization module is also configured to generate at least one report based on the data of the user.
[0019] FIG. 1 is a block diagram of a system (100) for granting access to a user in accordance with an embodiment of the present disclosure. The system (100) includes a data mapper module (110) configured to receive a unique human identity from a user. In one embodiment, the unique human identity during registration may include at least one of a fingerprint, a retinal scan and an iris scan. The data mapper module (110) is also configured to map the unique human identity to a plurality of details associated with the user. In some embodiment, the plurality of details of the user may include a name, a phone number, an email-id, clearance level, and projects being handled. The data mapper module (110) is also configured to store the mapped details in a server. In some embodiment, the server may include a cloud server. In such embodiment, the cloud server may be remotely located and may be accessed remotely from a cloud service provider.
[0020] The system (100) also includes a location module (120) communicatively coupled to the data mapper module (110). The location module (120) is configured to extract location of the user. In an embodiment of the present disclosure, the location module (120) is configured in a handheld device associated with the user, where the location module (120) extracts location of the user. In another embodiment, the location module (120) may also store the extracted location of the user in the cloud server. In such embodiments, the extracted location of the user may include geographic location of the user. The location module (120) may extract and track the geographic location of the user through systems such as, but not limited to, global positioning system (GPS), GLONASS (Globalnaya Navigatsionnaya Sputnikovaya Sistema), Global Satellite Navigation System (GNSS), and GPS Aided Geo Augmented Navigation (GAGAN) system of the handheld device associated with the user.
[0021] The system (100) also includes an access module (130) operatively coupled to the location module (120). The access module (130) is configured to receive a request for one or more activities from the user. In one embodiment, the one or more activities of the user may include a request for entering a premise or building or floor or room, a request for entering a conference and a request for exiting the premise or the building or the floor or the room or the conference. In such embodiment, the one or more premises may include a workplace, an academic institution, a factory, a hospital or a meeting room. The access module (130) is also configured to receive the location of the user. The user is enabled to send the request, along with the unique human identity of the user, for the entry or exit through the hand-held device. In an embodiment, at the time of sending the request, the location module (120) extracts the geographical location of the user and therefore the request includes unique human identity of the user and real time geographical location of the user. The access module (130) is configured to authenticate the received request for one or more activities from the user in order to grant access by matching the unique human identity included in the request with the stored mapped details of the user The access module checks and compares the unique human identity included in the request with the stored unique human identity in the cloud server and grants permission if both match... In some embodiment, the access may be granted to the user automatically based on received unique human identity and the location of the user. In another embodiment, the access to the user may also be granted by receiving a permission from an administrator communicated through a communication network. In an embodiment, the user may access the system by entering a received unique alphanumeric code in the handheld device of the user. In an alternative embodiment, upon authentication of the request the sever itself sends instruction for opening of door of the premise, house, room, thereby making the whole process fully automated. In this case, the door is communicatively linked to the server and configured executed the instruction received from the server. In one embodiment, the access module (130) may also store received one or more information from the user such as the one or more activities, the unique human identity and the location for granting access in the cloud server.
[0022] The system (100) also includes a synchronization module (140) communicatively coupled to the access module (130). The synchronization module (140) is configured to sync data representative of the one or more activities of the user with an enterprise resource planning (ERP) module. The data representative of the one or more activities of the user stored on the cloud server may be synchronized with the ERP module through a communication network. In such embodiment, the communication network may include a wired network such as local area network (LAN). In another embodiment, the communication network (120) may include a wireless network such as 2G, 3G, 4G, LTE, high speed downlink packet access (HSDPA), wireless fidelity (WiFi), Bluetooth, Zigbee, Low Power wide area network (WAN) or the like. The synchronization module (140) is also configured to analyze the data of the user. The synchronization module (140) is also configured to generate at least one report based on the data representative of the one or more activities of the user. In one embodiment, the at least one report may be generatedin order to alert the user or the administrator or manager. In an embodiment, the user may be notified of the alerts based on context. In such embodiment, the context may include an alert for a seminar or an alert for meetings.
[0023] In a specific embodiment, the system (100) may include an enterprise resource planning (ERP) module configured to integrate one or more processes into a single system. In some embodiment, the one or more processes may include a finance, a manufacturing, a supply chain, services or a procurement process. In such embodiment, the ERP module provides visibility, analytics and efficiency across one or more aspects of a business process.
[0024] FIG. 2 is a schematic representation of an embodiment of the system for granting access to a user of FIG. 1 The system (200) for recognizing a user based on a unique human identity and tracking the geographical location of the user is disclosed. The user in order to get an access in a premise including, but limited to, a workplace or an educational institution which requires the user to register with the unique human identity such as fingerprint, iris scan or a retinal scan from a handheld device (210) associated with the user such as a mobile phone, a tablet or a personal digital assistant (PDA). At the time of registration, the user also needs to enter the plurality of details such as a name, a phone number and email-id clearance level, and projects being handled. The data mapper module (220) which is hosted in a remote server such as a cloud server (250) of the system receives the unique human identity and the plurality of details entered by the user from the handheld device (210) and maps the unique human identity and the plurality of details entered by the user and subsequently saves mapped data in a JavaScript object notation (JSON) format in the server (250). The handheld device (210) includes a location module (230) which may include a global positioning system (GPS), to extract and track location of the user.
[0025] The access module (240) located in the cloud server (250) authenticates a received request for the one or more activities from the user by matching the unique human identity and the plurality of details with the mapped details of the user stored in the cloud server (250) after registration process. If the unique human identity provided by the user in the request is matched with the mapped details stored in the cloud server (250). The request received from the user in the in the JavaScript object notation (JSON) format. Upon confirmation of matching of the mapped details, information associated with the request is transmitted to an electronic device (270) associated with an Administrator, where the administrator may grant access to the user through the communication network (260). In the cloud server (250), one or more data received from the user including the one or more list of activities of the user, tracking details, administrator's permission, duration of the stay of the user in the workplace is filtered, processed and stored. The filtered, processed and stored data in the cloud server (250) related to one or more activities of the user is further synchronized with an enterprise resource planning (ERP) module (280) through a communication network (260). Data synchronization between the cloud server (250) and the ERP module (280) involves synchronization using representational state transfer application programming interface (REST API) with the data in the JSON format. The REST API is a set of functions or procedure which allows creation of an application for accessing one or more features or data of the ERP module (280) and the cloud server (250). The synced data is then analyzed and utilized for generating reports based on obtained synced data. The reports are generated based on a context and alerts are sent by sending push notifications or alert messages to the electronic device (270) associated with the administrator.
[0026] FIG. 3 is a flow chart representing the steps involved in a method (300) for granting access to a user of FIG. 1 in accordance with an embodiment of the present disclosure. The method (300) includes receiving, by a data mapper module, a unique human identity from a user in step 310. In an embodiment, the unique human identity received from the user during registration may include at least one of a fingerprints, a retinal scan and an iris scan.
[0027] The method (300) also includes mapping, by the data mapper module, the unique human identity to a plurality of details associated with the user in step 320. In an embodiment, mapping the unique human identity to the plurality of details associated with the user may include mapping the unique human identity by a data mapper module to the plurality of details such as a name, a phone number and an email-id of the user in a cloud server.
[0028] The method (300) also includes storing, by the data mapper module, the mapped details in a server in step 330. In one embodiment, storing the mapped details in a server may include storing the mapped details in the cloud server. In such embodiment, storing the mapped details in a remotely located server may be accessed remotely from a cloud service provider.
[0029] The method (300) also includes extracting, by a location module, the location of the user in step 340. In one embodiment, extracting the location of the user may include extracting the geographic location of the user. In an embodiment, the geo-graphic location of the user may be extracted and tracked by using one or more handheld devices enabled with a (global positioning system) GPS system, GLONASS (GlobalnayaNavigatsionnaya Sputnikovaya Sistema), Global Satellite Navigation System (GNSS), and GPS Aided Geo Augmented Navigation (GAGAN) system.
[0030] The method (300) also includes receiving, by an access module, a request for one or more activities from the user in step 350. In an embodiment, the request for the one or more activities from the user may include receiving the request for the one or more activities of the user such as request for entering a building, a request for entering a conference, a floor, a room, or a meeting and a request for exiting the building or the conference, the floor, the room or the meeting.
[0031] The method (300) also includes receiving, by the access module, the unique human identity from the user in step 360. In an embodiment, the unique human identity from the user such as a fingerprint, a retinal scan and an iris scan entered by the user during registration may be received for authenticating the received request for one or more activities and permitting access for entering one or more premises or accessing the requested one or more activities. In such embodiment, the one or more premises may include a workplace, an academic institution, a factory, a hospital or a meeting room.
[0032] The method (300) also includes receiving, by the access module, the location of the user in step 370. In an embodiment, receiving the location of the user after registration and accessing request for the one or more activities or features may include receiving location of a single geographic location with a single building, a single geographic location with multiple buildings, multiple geographic location with a single building or multiple geographic location with multiple buildings.
[0033] The method (300) also includes granting, by the access module, access to the user based on the unique human identity and the location of the user in step 380. In an embodiment, granting the access to the user based on the unique human identity and the location of the user may include granting the access to the user by an administrator upon verifying the unique human identity of the user with respect to mapped details of the user fetched from the server.
[0034] The method (300) also includes syncing, by a synchronization module, data between the server and an enterprise resource planning module in step 390. In an embodiment, syncing data between the server and an enterprise resource planning (ERP) module may include synchronizing by using a function or a method. In such embodiment, the syncing the data between the server and the ERP module may include synchronizing by using an application programming interface (API) with a JavaScript object notation (JSON) format of the data. In some embodiment, the JSON object is a text format which is light-weight and utilized in data-interchange between a human and a machine. In such embodiment, the JSON object is a collection of name or value pairs which is any computer languageindependent.
[0035] The method (300) also includes analyzing, by the synchronization module, the data of the user in step 400. In one embodiment, analyzing the data of the user may include analyzing the data based on one or more data analyzing techniques such as regression or integrating data to a new or an existing ERP module for better analysis.
[0036] The method (300) also includes generating, by the synchronization module, at least one report based on the data of the user in step 410. In an embodiment, generating the at least one report based on the data of the user may include generating the at least one report in order to notify the user. Generating the at least one report for notifying the user may include notifying the user with the alerts based on one or more contexts. In such embodiment, generating the at least one report for notifying alerts to the user may include notifying the alerts based on the one or more contexts such as an alert for a virtual seminar and an alert for meetings.
[0037] Various embodiments of the present disclosure provide a system for a user recognition and tracking the geographic location in order to grant access for an entry or exit of the user in one or more premises such as a workplace, an academic institution, a hospital or a factory.
[0038] Moreover, the present disclosed system provides a reliable and a cost-effective solution to authenticate any user, track the location of the user while performing a permitted activity and improves efficiency without involving swiping of cards or setting up of biometric devices/terminals in front of an entry or an exit terminal of any premise for access. Present invention does not require such infrastructure and thereby maintenance of the same, which reduces cost of operations.
[0039] Furthermore, the present disclosed system also stores and authenticate permission for the access of the premises or one or more activities to the user by accessing the details of the user from a cloud server and reduces delay in data synchronization with an ERP module.
[0040] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the disclosure and are not intended to be restrictive thereof.
[0041] While specific language has been used to describe the invention, any limitations arising on account of the same are not intended. As would be apparent to a person skilled in the art, various working modifications may be made to the method in order to implement the inventive concept as taught herein.
[0042] The figures and the foregoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, order of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts need to be necessarily performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples.

Claims (8)

WE CLAIM
1. A system for granting access to a user comprising:
a data mapper module configured to:
receive a unique human identity from a user;
map the unique human identity to a plurality of details associated with the user;
store the mapped details in a server;
a location module configured to extract location of the user;
an access module configured to:
receive a request for one or more activities from the user;
receive the unique human identity from the user;
receive the location of the user;
grant access to the user based on the unique human identity and the location of the user;
a synchronization module configured to:
sync data representative of the one or more activities of the user with an enterprise resource planning module;
analyze the data of the user; and
generate at least one report based on the data of the user.
2. The system as claimed in claim 1, wherein the unique human identity is at least one of a fingerprint, a retinal scan and an iris scan.
3. The system as claimed in claim 1, wherein the plurality of details of the user comprises a name, a phone number and an email id.
4. The system as claimed in claim 1, wherein the one or more activities of the user comprises a request for entering a building, a request for entering a virtual conference and a request for exiting the building or the virtual conference.
5. The system as claimed in claim 1, wherein the user is notified of alerts based on context, wherein the context comprises an alert for a virtual seminar and an alert for meetings.
6. A method for granting access to a user comprising;
receiving, by a data mapper module, a unique human identity from a user;
mapping, by the data mapper module, the unique human identity to a plurality of details associated with the user;
storing, by the data mapper module, the mapped details in a server;
extracting, by a location module, the location of the user;
receiving, by an access module, a request for one or more activities from the user;
receiving, by the access module, the unique human identity from the user;
receiving, by the access module, the location of the user;
granting, by the access module, access to the user based on the unique human identity and the location of the user;
syncing, by a synchronization module, the data representative of the one or more activities of the user between the server and an enterprise resource planning module;
analyzing, by the synchronization module, the data of the user; and
generating, by the synchronization module, at least one report based on the
data of the user.
7. The system as claimed in claim 6, wherein the unique human identity is at least one of a fingerprint, a retinal scan and an iris scan.
8. The system as claimed in claim 6, wherein the user is notified of alerts based on context, wherein the context comprises an alert for a virtual seminar and an alert for meetings.
AU2021100782A 2021-02-09 2021-02-09 An Automatic Geofence based Authentication to a User Active AU2021100782A4 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU2021100782A AU2021100782A4 (en) 2021-02-09 2021-02-09 An Automatic Geofence based Authentication to a User

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
AU2021100782A AU2021100782A4 (en) 2021-02-09 2021-02-09 An Automatic Geofence based Authentication to a User

Publications (1)

Publication Number Publication Date
AU2021100782A4 true AU2021100782A4 (en) 2021-04-22

Family

ID=75502429

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2021100782A Active AU2021100782A4 (en) 2021-02-09 2021-02-09 An Automatic Geofence based Authentication to a User

Country Status (1)

Country Link
AU (1) AU2021100782A4 (en)

Similar Documents

Publication Publication Date Title
US9070162B2 (en) Time tracking device and method
US20180182179A1 (en) Comprehensive system and method for real-time monitoring and management of security patrolling operations
US9998922B2 (en) Instant mobile device based capture and credentials issuance system
CN107341873B (en) High-safety open laboratory entrance guard management system and method based on mobile equipment
US10657499B1 (en) Time tracking device and method
WO2019213152A1 (en) Verification system
US20180075229A1 (en) Electronic Barcode Badge for Employee Access
KR102249057B1 (en) Attendance management system using gps information
CN105184883A (en) Intelligent attendance bracelets and attendance checking method based on user ID and fingerprint recognition
US9710980B1 (en) Biometric attendance tracking system and method using mobile devices
EP3018606A1 (en) Systems and methods for enhanced document recognition and security
KR20150133055A (en) An electronic attendance method with a wireless access point
US20220374902A1 (en) Providing irrevocable evidence of physical presence using proximity technology and a distributed ledger
CN105225045A (en) A kind of movable attendance checking system based on user ID and fingerprint recognition and Work attendance method
US11368814B2 (en) Evacuation tracking
US20230308881A1 (en) System and method for encounter identity verification
CN110648413A (en) Intelligent check-in method, system, equipment and storage medium of block chain
KR20130142646A (en) System for managing group using qr code and method therefor
US20180130025A1 (en) Process and system for time management for employees
EP3550488A1 (en) System and method for credentialing access to restricted rooms
KR102294476B1 (en) Work relay service system and method based on location
AU2021100782A4 (en) An Automatic Geofence based Authentication to a User
KR20190080100A (en) Method and computer program for providing consulting service of entrance examination
CN112350991A (en) Login method and device of front-end system
US20210374216A1 (en) System and method for identity creation and assertion

Legal Events

Date Code Title Description
FGI Letters patent sealed or granted (innovation patent)