DATA MANAGEMENT
FIELD OF THE INVENTION
The present invention relates to a data management system, a method of handling data and a computer program product.
BACKGROUND OF THE INVENTION
There are known data management systems that are particularly useful for monitoring visitors to a company site. There is generally provided some sort of user interface on a computer which is designed to request information required to identify the user and monitor the user whilst on site. For example, the user interface may be set up to request the user's name and the name of the person the user is visiting. The time of arrival and, subsequently, the time of departure from the site is also monitored.
The user interface is connected to a database which stores the input information. Thus should there be a need to ascertain how many visitors are on the site and who they are with, the database can be accessed to obtain this information. There is commonly provided some sort of processor and server for controlling operation of the database. One reason why such a system is useful is that in the event of a fire or other emergency, the number and identity of visitors can be quickly determined so that all visitors can be accounted for.
It is usual for the above-described system to print out some sort of badge or label using the input information. The label is designed to be worn by the visitor while they are on the site. Such a system improves security of the site since company employees can challenge anyone who is unknown to them and who does not have a label.
One problem with the above-described system is that the data is only accessible from the on-site database. Thus if the database is damaged in a fire or other disaster or is otherwise inaccessible the data is not retrievable. In this situation it is no longer possible to accurately account for all the visitors and if any are lost or trapped emergency services can not be accurately informed as to exactly who should be searched for.
Another problem with the system is that if the owner of the system wishes to run a similar system on another site, a whole system including the user interface and database must be installed on the other site. This is expensive for a company which has several sites.
Furthermore, if the system is to be sold to another company, the entire system including a suitable processor/server must be installed, and, since the system is then out of the owner's control, an after-sales support service will likely be required. Such installation is expensive and the owner may not have the resources to provide an after-sales service. A system which overcomes some of the above-mentioned problems is run by
Advantor. Details of their "iVisitor" system can be found at the website address www.infrasafe.com. This system provides an on-line visitor management service which enables customers to monitor visitors at their site. Only minimal software needs to be installed at the customer's site since data management is carried out by the system provider. The system enables customers to keep an accurate record of visitors to their site.
Although the above-mentioned system confers monthly registration fees on customers, there is not provided any way of generating bills for customers nor of taking account of usage of the system when charging.lt would be desirable to provide a system and a method which enables these features.
SUMMARY OF THE INVENTION
According to an aspect of the present invention there is provided a data management system comprising: a database; a user interface located remote from the database, arranged to receive user-input data as a series of items and transfer the items to the database for storage; connection means over which user-input data can be transferred from the user interface to the database; and a charging module arranged to generate an invoice identifying a charge for storage of user-input data in the database including a portion based on the usage of the database.
According to another aspect of the present invention there is provided a method of handling data comprising the steps of: receiving user-input data as a series of items at a first location; transferring the items for storage at a second location remote from the first location; generating an invoice identifying a charge for storage of user-input data at the second location, said charge including a portion based on the usage of a storage facility at the second location.
The invention also provides a computer program product comprising program code means implementing the aforesaid method when loaded into a computer.
The invention will now be described, by way of example only, with reference to the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS Figure 1 shows a system; Figure 2 shows a screen of a user-interface;
Figure 3 shows a human-readable view of a database; and
Figure 4 is a schematic block diagram of a system in accordance with another embodiment of the invention. In the figures like reference numerals indicate like parts.
DETAILED DESCRIPTION
Referring to figures 1 and 2, a user interface of an embodiment of the invention, indicated generally by reference numeral 1, is shown. The interface 1 is located in a user company site and comprises a screen 2, a keyboard 4, a printer 5 and a processor 6 providing control of and connection between the screen 2, the keyboard 4 and the printer 5. The processor is only a small processor for controlling operation of the user interface 1 since the substantive data handling is carried out off-site, as will be explained below.
The interface I is connected to a server 8 over the internet. In other embodiments the interface I may be connected to the server 8 by any known means, e.g., via a telephone connection, a dedicated wire, cable, or a optical cable, or the connection can be wireless. The server 8 comprises a processor 10 operable to run a database 12 and to communicate with the interface 1. The server 8 further comprises a charging module 30 also operable under the control of the processor 10. Communication between the, server 8 and the interface 1 is achieved specifically by communication between the processor 10 and the processor 6, but this connection is shown schematically in figure 2. The server 8 is further shown to be connected to a call centre 14 to provide telephone setup and support to the company in whose site the interface 1 is located. The server is located on the site of an owner company, which is different from the user company on whose site the interface 1 is located. The call centre can either be located within the owner company site or at a different location, e.g., at a different address.
In use, pressing of keys on the keyboard 4 and use of the buttons on the associated mouse inputs data into the user interface 1. Input data is then transferred to the server 8 for storage and subsequent retrieval. These mechanisms will now be explained in more detail.
The first procedure for the user company on whose site the interface 1 is connected is to switch on the interface 1 and set it in communication with the server 8. This must be done every time the interface 1 is switched on or started up. The interface 1 is set up such that when it is switched on, it asks for a user identity and password to be entered. An employee of the user company enters this information and the processor 6 transfers it over a secure internet connection to the server 8. The processor 10 verifies the authenticity of the user name and password and the routing of the connection, and, if authentic and authorized, enables the connection between the user interface 1 and the server 8 for use as described below.
Having successfully enabled the connection, the processor 6 displays a view on the screen 2 as shown in figure 2. It can be seen in figure 2 that the interface 1 thus invites a user either to "check in" or "check out", by respective icons 14 and 16. The check in is for when a visitor arrives on the site and the check out is for when a visitor leaves the site. The display 2 also shows other desirable information such as the header 18, which indicates information such as the date and time, the name of the company on whose site the interface I is located and other information for welcoming visitors.
In order to check in, a visitor selects the icon 14. The interface 1 then invites the visitor to enter various data, such as the visitor's name, the company which the visitor is from, and the employee of the user company that is being visited. Visitors may optionally be asked to enter other data such as their car registration and if they are part of a group of visitors, or other relevant information. The visitor can either be asked to enter this data sequentially or a series of "blanks" to be filled in can be displayed on the screen 2. The date and time at which the data is entered and hence the time at which the visitor arrived on the site is monitored automatically, and is available for display on the header 18. This is achieved by a clock system in the processor 6.
Data entered by a visitor and the time and date information is transferred by the processor 6 of the user interface 1 to the server 8, over the connection means, as shown schematically in figure 1. The data is stored by the processor 10 in the database 12 as a series
of items. Each item contains the input information on a visitor and the associated time and date information. These items are stored in an administration area of the database 12.
The processor 10 also allocates a user ID and a label number to each visitor, and this information is stored together with the other data for each visitor. The other action of the processor 6 of the interface I each time data of a visitor is entered, is to cause printing of some or all of the data at the printer 5. The printer 5 is configured to print information in the format of a label or badge that can be worn by the visitor. The label can either be stuck directly onto the visitor's clothes or stuck in a removable fashion on a badge such as a plastic badge. Certain styles of badge do not require the label to have an adhesive backing but instead provide a slot into which the printed label can be inserted.
The label can show some or all of the information entered at the interface 1. For example, it may show just the label number, visitor name and the name of the employee being visited. The label could include both the user ID and the label number allocated by processor 10 which provides assurance the visitor is logged into the system. The label could of course show all the entered data if desired.
Once a visitor is provided with a label, employees of the user company can easily tell that that unfamiliar person has been registered at the interface 1, and know to challenge any unfamiliar people without labels. Furthermore, an electronic record of all visitors on site has been created. Thus in the event of a fire or other emergency, or for any other reason, the list of visitors can be accessed from the database 12 so that all visitors can be properly accounted for. For example, a list may be created for any a visitor who does not exit in a pre-determined time, such as the end of the day. Another is having user-interfaces at a variety of locations within a location, e.g., at the front gate, at the laboratory, at shipping. This is achieved by appropriate use of the keyboard 4 and mouse to call up the administration screen shown in figure 3. This screen has a header 20 that indicates that the screen is for administrative use rather than for registering visitors. Below the header 20 is shown a list 22 of registered visitors.
In each item of the list is shown a user ID, a label number, the nature of the visitor (e.g. visitor or contractor), whether the visitor is with a group, the visitor name, the visitor's origin (e.g. company name, personal visitor), their car registration, the name of the employee
being visited, and the time in. The information could of course be shown in a different order and/or format as desired. For example, some of the information may be in a machine-readable format.
The screen of figure 3 may show other items such as search options. Examples of these are shown at the left hand side of the screen in the region labeled 24. For example, there is shown an option to retrieve the visitor data from a previous day, and the option to search for a vehicle registration to ascertain which visitor it belongs to. If desired, the interface I can be connected to other systems within the user company and these could be accessible from options in the screen of figure 3. For example, the Interface can be connected with other interfaces within the same location, e.g., having user-interfaces at a variety of locations such as at the visitor gate, at a laboratory, at shipping, and the like.
If the nature of the emergency means that the user interface I is unavailable for use, the data shown in figure 3 is stored in the database 12 in such a manner that it can nevertheless be retrieved from elsewhere. In particular, it is possible to retrieve the data from off-site over the internet. This possibility is illustrated in figure 3, which shows that the screen has been arrived at over the internet (see the bar 26 at the top of the screen 2). One possibility is for the data to be retrieved by the owner company in response to a request put into the call centre 14 by telephone by an employee of the user company. Such a call could be made at a safe distance from the site in which the interface 1 is connected, and an operator at the call centre 14 would then access the data over the connection shown in figure 2 between the call centre 14 and the server 8. In this way, all visitors to the site can be accounted for.
Alternatively and/or additionally, the stored information can be accessed from another terminal remote from the server 8 using the appropriate user ID and password, if the request originates from a terminal which is using the usual routing server 8. Thus since data on visitors to the site is held off-site, the data is not lost in the event of an emergency on the site.
Referring back to figure 1, when a visitor leaves the site, the visitor uses the check out procedure by selecting the icon 16. For the check out procedure, the visitor is requested to enter one piece of data such as their name or their label number, and thus the processor 6 automatically logs the time at which the visitor left the site. If the label includes machine- readable information, e.g., the label includes data that is readable by a card scan device, then
an attached card scan device may be adapted to enter a piece of data from the label. The processor 6 further transfers this information to the processor 10 of the server 8, which stores a suitable indication, most conveniently the time at which the visitor logged out. In this embodiment the data for logged out visitors is removed from the administration area of the database 12 and stored in a different part of the database 12 as an information log. The information regarding logged-out visitors is also therefore removed from the administration screen 3.
Thus if the information shown in figure 3 is requested after a visitor has logged out, this visitor does not appear in the list of on-site visitors. However, since information on logged-out visitors is stored in a different part of the database 12, this information can be retrieved if it is desired to obtain a historical record of visitors. In this case, the time out would be shown, as can be seen in the example of figure 3. Current and historical information can be displayed together, as is the case in figure 3. The user company on whose site the interface 1 is located and the owner company can agree for how long visitor data will be stored. Another feature of the system is that the processor 6 of the interface I is further arranged to transmit messages out of the interface 1, as shown by the arrow 28. In particular, the processor 6 can transmit messages to other locations within the user company, for example over a company intranet. One particularly useful feature is that each time a visitor logs in, an e-mail message is automatically sent to the company employee being visited. Thus the employee is notified that his or her visitor has arrived and can be collected. This is more efficient than, for example, a receptionist making a special telephone call to the employee. Some or all of the information input into the interface 1 can be included in the message.
The system is particularly advantageous in that it is configured for the owner company to charge the user company. In this embodiment the processor 10 contains a charging module 30, which calculates a charge based on a set-up fee, a maintenance fee and a usage fee, the usage fee being based on the amount of use of the system by the user company. The set-up fee is a oneoff amount that covers the cost of installing the system at the user company and explaining to them its operation and the procedure for contacting the call centre 14. The maintenance fee is a charge levied periodically, for example monthly or quarterly, which covers maintenance of the system and use of disc space for storage of data by the user company. The usage fee is calculated by levying a charge for each visitor logged in via the
user company. For example, there may be an initial fee for setting up the database for a particular customer, a quarterly fee for running/managing the database, and then a "per- visitor" fee charged each time a visitor logs into the system.
An automatic generation of a monthly or quarterly bill is achieved as follows.
1. When a user company is registered with the system, the charging module 30 stores the company's details including invoicing address and other details.
2. The charging module 30 stores a note that a set-up fee is to be levied.
3. The charging module 30 monitors the time for which the user company has been registered and uses this time to calculate a maintenance fee.
4. At periodic intervals e.g. quarterly, the charging module 30 accesses the user company's details from the database 12 together with the stored information on the number of visitors that have logged in since the last invoice was generated. This information is combined with the calculated maintenance fee. If a first invoice is being generated, the set-up fee is added and then removed from the user company's record in the charging module 30.
5. The information collected in 4. is used to automatically generate and send out an invoice to the user company. The monitoring process is then repeated.
Other charges can be levied as and when desired, for example charges based on the length of time that data is stored or the overall amount of data of logged out users stored in the database 12. The charge can be based on as many or as few parameters as desired. The charging module monitors each user company separately and generates invoices using the above process for each company registered.
Another advantage of the system for the owner company is that the main operation of the system is carried out by the server 8 which belongs to the owner company and is located on the owner company's site. This is convenient for maintenance and updating purposes. Furthermore, there is no need to provide extensive training to the user company using the interface 1, nor to provide post-sales support other than a help line for problems with the user interface and emergencies. Such problems are minimized by the of
It can be understood that relatively little effort is required to get the system up and running at the user company using the interface 1. This can be achieved simply by setting up a
secure internet connection which allows access to the customer dedicated "front-end" website portal.
The database can serve a plurality of user interfaces at a plurality of remote locations. It is possible for the server 8 to serve multiple sites of multiple companies. A server can service a plurality of customers. In each case the system is set up as explained in the previous paragraph, and each company is given a user name and password. Data is then stored in a compartmentalized fashion on a company-by-company basis, so that visitor data for each company is separately retrievable.
It is also possible for the server 8 to serve multiple sites of a single company.JThe system can also be set up within a company to operate using the company intranet rather than the internet. This is particularly advantageous for a company which has a number of sites, since it is useful to monitor visitors to each site separately.
The screen 2 can in practice comprise multiple screens, for example one screen for use by visitors and another screen for administrative use by an employee of the user company. The message sent to the employee being visited could be another type of message in addition to or instead of an e-mail. For example, a text message could be sent to a mobile communications device used by the employee. One example of such a message is an Short Message Service (SMS) text message to a mobile telephone.
If convenient, the keyboard 4 and associated mouse could be replaced by another input means such as a touch screen. The printer 5 does not have to form part of the user interface I but can merely be connected to the interface 1.
Figure 4 is a schematic block diagram of an interface of the system which incorporates some additional components. A group module GP allows a group of visitors to be entered as a group, instead of adding each visitor separately. On activation of the group module, a single entry procedure can be implemented for the group at the keyboard 4.
A camera 7 is connected to the processor 6 and can be used to take a photograph of the visitor so that this can be integrated in the data held about the visitor.
A card scan device 9 is connected to the processor 6 and is arranged to receive a card
11 and to scan the visitor's details off the card to supply them to the database. In Figure 4, an administrator interface module "Am" allows the receptionist or other employee to enter part of
the input data of the visitor using the card scan device 9 by the administrator interface, while a visitor interface module VIM allows the visitor to enter additional input data himself.
Particularly beneficial options include a feature where expected visitors or groups of visitors can be entered into the system, so that their information is ready immediately when they arrive, and the printing up of a list at the end of each day to identify people who are still in the building for security purposes.
The user interface can be personalized.
The applicant draws attention to the fact that the present invention may include any feature or combination of features disclosed herein either implicitly or explicitly or any generalization thereof, without limitation to the scope of any of the claims.