WO2013065069A1 - System and method for collecting and integrating data from hotels, lodges, cyber cafes and the like centers with police control room - Google Patents

System and method for collecting and integrating data from hotels, lodges, cyber cafes and the like centers with police control room Download PDF

Info

Publication number
WO2013065069A1
WO2013065069A1 PCT/IN2012/000685 IN2012000685W WO2013065069A1 WO 2013065069 A1 WO2013065069 A1 WO 2013065069A1 IN 2012000685 W IN2012000685 W IN 2012000685W WO 2013065069 A1 WO2013065069 A1 WO 2013065069A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
information
agency
facility
investigative
Prior art date
Application number
PCT/IN2012/000685
Other languages
French (fr)
Inventor
Ramakrishna DEVINENI
Original Assignee
Devineni Ramakrishna
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Devineni Ramakrishna filed Critical Devineni Ramakrishna
Publication of WO2013065069A1 publication Critical patent/WO2013065069A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Definitions

  • the Present Invention relates generally to the information system and method for collecting information, more particularly acquire information from Hotels, Lodges, Cyber cafes and the like centers, providing the access of such information to police control room; and also assisting the police in analysis of the information for investigative purposes.
  • the police would stop the illegal activities of the Terrorists or Anti-social elements if they have prior information about these people; their movements and activities as they get into the city.
  • the investigation Agencies would often does not have ready means by which a visitor may be entered in the city/town/state. If such a system should happen to be in use, the police department or the like agency may arrest the Anti-social elements even before they commit the offense.
  • the Investigating agency does have access or ability to monitor the phone calls, messages and instructions passed to these Anti-social elements by their masters. Moreover, there has been little or wrong information regarding them at the Hotels/Lodges/Cyber cafes and the like center when they utilized the services.
  • the police Department will have limited access of information about them. It would be helpful to the police department if these hotels/lodges/cyber cafes collect information and integrate the same with the police department.
  • the data such as gang database, Photographs, a fingerprint database, Eye retina database, other biometric database, video footings database and/or any other information that is collected from the facility service provider.
  • the system is designed to collect information from the individuals who use public facilities such as Hotels/ Lodges/ Cyber cafes etc..
  • the system allows collecting the user information, identity; purposes of using facility, specific biometric where required along with the user photographs and allow updating the system by the facility managers (Managers of the Hotels/lodges/Cyber cafes).
  • the Facility Managers are additionally provided an option of alerting on the doubtful individuals.
  • the System is designed in such a way that the information submitted will be updated in the database at police control room in real time and also a message will be sent to the concerned area officer on suspicious alert by the facility manager.
  • the database is only accessed by the police department and stringent firewalls are kept for the confidentiality of the information.
  • the system allows the investigating agency to review and fetch information as per their needs.
  • the System involves four basic steps: 1) Collecting information 2) Updating information with specific instructions 3) Validating the information and 4) Access of information to the investigating agency in form of reports as they required.
  • the System allows the investigating agency to go through the specific information such as individual photographs, identification details and other specific information of facility user real time.
  • the database thus collected can be stored with the police department forever and can be used for future analysis of data and can also act as evidence in judicial proceedings. Most often the database collected by the Investigative agency would have been destroyed and would have created confusion during trail of the accused. However with the current system once a record created; removal of the same is quite difficult task and can be termed as next to impossible.
  • the database access is restricted to the personnel in investigating agency to the need bases that is to say a investigating agency of particular territory can view data related to his territory only and in case of access of data at different territory, the same need to be access through authorized.
  • the system has creates unique user id and passwords for the access of the database with such restrictions placed to each of the personnel at Investigating agency.
  • the System is designed in such a way that the investigative agency can request report with various queries such as a report of total number of users of the facility, gender wise users of the facility, age wise users of the facility, origin of the users and such other queries.
  • the System is designed in such a way that the investigative agency can search the database with specific details of a person and trace his/her whereabouts.
  • the system allows the investigative agency to keying the details of the person they are looking for and obtain the results.
  • the system also allow the investigating agency to conduct image search or biometric search and obtain the specific results in case the anti-social elements provides wrong details while using the facility.
  • the system is designed in such a way that the investigative agency keying the details of the identified anti-social elements/ escaped or absconding accused details so that the movement the facility manager keying the details of such user will be reported to the concerned investigative agency thereby making it easy for investigative agency to arrest such identified anti-social elements/ escaped or absconding accused within no time.
  • the system is designed in such a way that the investigative agency getting alerts of movements of various anti-social elements/ escaped or absconding accused; these alerts are designed in such a way that both personnel of investigative agency i.e., the person handling the case and the person who is in charge of local jurisdiction would get information of such movements.
  • the System thus allows monitoring the facility center remotely and reduce conducting raids in the facility centers which otherwise will be done quite often by the investigative agency; thus saving costs, time for investigative agency and more specifically avoids disturbing the facility employees and innocent users of the facility.
  • the investigative agency since remotely monitoring; will now enquire only suspected users of the facility which otherwise would be done every one earlier.
  • the system generate alert reports such as over staying of a person in particular facility; frequent visits of the user of the facility and such other alert information as per the requirement of the investigative agency for their analysis and zeroing on suspected criminal activity.
  • the system allows for the expression of doubtfulness by facility manager; which expression alert will be sent to respective personnel of investigative agency through automatic emails, voice calls and SMS (Short Message Services) for registered email id and mobile phone of investigative agency and the same will be highlighted by RED for viewer of the reports by various investigative agency personnel.
  • SMS Short Message Services
  • the System also acts as an inventory for the facility Manager.
  • the System further allow the facility manager to provide live chart of available rooms or services at real-time and online booking facility to the facility users.
  • the System creates the customer database for the facility managers; also provides for the accounting of the bills generated; payment made, outstanding payments etc. Description of drawings:
  • the system provides a number of facility center units coupled with a variety of user terminal equipment configurations to collects information through 101, Processes and validates through 102 and transfer the information through network to central sever 103 so as to enable the investigating team to view the information provided in required forms.
  • User terminal equipments utilized according to preferred embodiments of the present invention include personal computers, personal digital assistants, pagers, telephones (Wire line and wireless), fax machines and other similar equipment coupled with cable, fiber optic, etcetera and/o indirect links, such as network links, private branch exchanges links, etcetera.
  • the user of the system at facility provider 201 using the user terminal equipments 202 and 204 enters the information of facility user 203 which will be transferred to the web server 205 and accessed at 206 central control room of the investigating agency.
  • the system structure, the facility units along with user terminal equipment 301 are connected central control room of investigative agencies 302 and provide access to limited information the local investigating team 303.

Abstract

System and methods for providing the information on a network wide basis, with the network or Internet to the investigative agencies such as police and other investigative personal with the information of the visitors for the city/town or state along with alerts on suspicion by the facilities providers such as hotels/Lodges/ Cyber Cafes etc., along with validations of the information collected and secured cum user specific access to the investigating team.

Description

SYSTEM AND METHOD FOR COLLECTING AND INTEGRATING DATA FROM HOTELS, LODGES, CYBER CAFES AND THE LIKE CENTERS WITH POLICE CONTROL ROOM
Technical Field of Invention:
The Present Invention relates generally to the information system and method for collecting information, more particularly acquire information from Hotels, Lodges, Cyber cafes and the like centers, providing the access of such information to police control room; and also assisting the police in analysis of the information for investigative purposes.
Background of the Invention:
Increased activity of terrorists and anti-social elements is worrying governments and investigative agencies; most times the police find it difficult in zeroing the culprits since they don't have information about them. Most of these terrorists or Anti-Social Elements are outsiders not belonging to that particular city/town/state. They visit the city for fulfilling their targets of creating terror or the specific anti-social activity they intended to do. They often engage Hotel rooms/ Lodges for their temporary staying in the city/town/state. It is evident from past few cases that they use Cyber cafes and Lodges for the accomplishment of their illegal activities.
The investigation of these cases is failing most of the times; due to lack of proper information about the people who used the cyber cafe or who used the lodge or hotel service. Most times they give false identity and addresses for stay at hotels and lodges and using the Cyber Cafe services.
It would also difficult for the prevention of the activity without the proper information to the Police. The police would stop the illegal activities of the Terrorists or Anti-social elements if they have prior information about these people; their movements and activities as they get into the city.
It is for these objects the present invention i.e., a System and Method of collecting information and dissemination of the same to Police control room continuously and maintaining a database of such information is disclosed. Brief Summary of the Invention:
It is one of the objects of the invention to provide system and methods for providing the information on a network wide basis, with the network or Internet to the investigative agencies such as police and other investigative personal with the information of the visitors for the city/town or state.
The investigation Agencies would often does not have ready means by which a visitor may be entered in the city/town/state. If such a system should happen to be in use, the police department or the like agency may arrest the Anti-social elements even before they commit the offense. The Investigating agency does have access or ability to monitor the phone calls, messages and instructions passed to these Anti-social elements by their masters. Moreover, there has been little or wrong information regarding them at the Hotels/Lodges/Cyber Cafes and the like center when they utilized the services.
The Police Department will have limited access of information about them. It would be helpful to the police department if these hotels/lodges/cyber cafes collect information and integrate the same with the police department. The data such as gang database, Photographs, a fingerprint database, Eye retina database, other biometric database, video footings database and/or any other information that is collected from the facility service provider.
Detailed description of the Invention:
The system is designed to collect information from the individuals who use public facilities such as Hotels/ Lodges/ Cyber Cafes etc.. The system allows collecting the user information, identity; purposes of using facility, specific biometric where required along with the user photographs and allow updating the system by the facility managers (Managers of the Hotels/lodges/Cyber cafes). The Facility Managers are additionally provided an option of alerting on the doubtful individuals.
The System is designed in such a way that the information submitted will be updated in the database at police control room in real time and also a message will be sent to the concerned area officer on suspicious alert by the facility manager.
The database is only accessed by the police department and stringent firewalls are kept for the confidentiality of the information.
The system allows the investigating agency to review and fetch information as per their needs. Example: — he database-oLvisitor ; ta the city during' a particular period; Information of all outsiders currently staying at a particular lodge/Hotel etc. The System involves four basic steps: 1) Collecting information 2) Updating information with specific instructions 3) Validating the information and 4) Access of information to the investigating agency in form of reports as they required.
The System allows the investigating agency to go through the specific information such as individual photographs, identification details and other specific information of facility user real time.
The database thus collected can be stored with the Police department forever and can be used for future analysis of data and can also act as evidence in judicial proceedings. Most often the database collected by the Investigative agency would have been destroyed and would have created confusion during trail of the accused. However with the current system once a record created; removal of the same is quite difficult task and can be termed as next to impossible.
The database access is restricted to the personnel in investigating agency to the need bases that is to say a investigating agency of particular territory can view data related to his territory only and in case of access of data at different territory, the same need to be access through authorized. The system has creates unique user id and passwords for the access of the database with such restrictions placed to each of the personnel at Investigating agency.
The System is designed in such a way that the investigative agency can request report with various queries such as a report of total number of users of the facility, gender wise users of the facility, age wise users of the facility, origin of the users and such other queries.
The System is designed in such a way that the investigative agency can search the database with specific details of a person and trace his/her whereabouts. The system allows the investigative agency to keying the details of the person they are looking for and obtain the results. The system also allow the investigating agency to conduct image search or biometric search and obtain the specific results in case the anti-social elements provides wrong details while using the facility.
The system is designed in such a way that the investigative agency keying the details of the identified anti-social elements/ escaped or absconding accused details so that the movement the facility manager keying the details of such user will be reported to the concerned investigative agency thereby making it easy for investigative agency to arrest such identified anti-social elements/ escaped or absconding accused within no time. The system is designed in such a way that the investigative agency getting alerts of movements of various anti-social elements/ escaped or absconding accused; these alerts are designed in such a way that both personnel of investigative agency i.e., the person handling the case and the person who is in charge of local jurisdiction would get information of such movements.
The System thus allows monitoring the facility center remotely and reduce conducting raids in the facility centers which otherwise will be done quite often by the investigative agency; thus saving costs, time for investigative agency and more specifically avoids disturbing the facility employees and innocent users of the facility. The investigative agency since remotely monitoring; will now enquire only suspected users of the facility which otherwise would be done every one earlier.
The system generate alert reports such as over staying of a person in particular facility; frequent visits of the user of the facility and such other alert information as per the requirement of the investigative agency for their analysis and zeroing on suspected criminal activity.
The use of the System considerably reduces the criminal activities at large. It also helps the investigate agency to curb and control the brothel activity.
In cases of suicides or death etc at the facility it will be easy for identification and communication of the details to the facility user family members since the details would have been already recorded. It was difficult and taken longer time and spending of money in identification and communication earlier.
The system allows for the expression of doubtfulness by facility manager; which expression alert will be sent to respective personnel of investigative agency through automatic emails, voice calls and SMS (Short Message Services) for registered email id and mobile phone of investigative agency and the same will be highlighted by RED for viewer of the reports by various investigative agency personnel.
The System also acts as an inventory for the facility Manager. The System further allow the facility manager to provide live chart of available rooms or services at real-time and online booking facility to the facility users.
The System creates the customer database for the facility managers; also provides for the accounting of the bills generated; payment made, outstanding payments etc. Description of drawings:
As shown in Fig.l, the system provides a number of facility center units coupled with a variety of user terminal equipment configurations to collects information through 101, Processes and validates through 102 and transfer the information through network to central sever 103 so as to enable the investigating team to view the information provided in required forms. User terminal equipments utilized according to preferred embodiments of the present invention include personal computers, personal digital assistants, pagers, telephones (Wire line and wireless), fax machines and other similar equipment coupled with cable, fiber optic, etcetera and/o indirect links, such as network links, private branch exchanges links, etcetera.
As shown in Fig.2, the work flow structure, the user of the system at facility provider 201 using the user terminal equipments 202 and 204 enters the information of facility user 203 which will be transferred to the web server 205 and accessed at 206 central control room of the investigating agency.
As shown in Fig.3, the system structure, the facility units along with user terminal equipment 301 are connected central control room of investigative agencies 302 and provide access to limited information the local investigating team 303.
The foregoing embodiments are for illustrative purposes and are not intended to be limiting, persons skilled in the art capable of appreciating other embodiments from the scope and spirit of the foregoing teachings.

Claims

Claims:
1. A method, comprising: acquiring facility user data by using a system designed for keying identification details of the user of the facility along with their biometric details; analyzing and verifying the data provided; and providing access to investigative agency of such data and reports.
2. The method of claim 1, wherein the analyzing and adjusting steps are performed by a central station server of the investigative agency.
3. The method of claim 1, further comprising: storing the acquired surveillance data in a storage and archive retrieval system; and providing access control for data collection, data management, and data search functions.
4. A System comprising: personal computers, personal digital assistants, pagers, telephones (Wire line and wireless), fax machines and other similar equipment coupled with cable, fiber optic, etcetera and/o indirect links, such as network links, private branch exchanges links, etcetera for keying identification details of the user of the facility along with their biometric details; analyzing and verifying the data provided; and providing access to investigative agency of such data and reports.
5. A system as claimed in claim 4; further comprising: security controls both computer programs and hardware equipments for protection of the data.
6. A system as claimed in claim 4; further comprising: access validations for accessing information keyed by the investigating agency.
PCT/IN2012/000685 2011-11-01 2012-10-15 System and method for collecting and integrating data from hotels, lodges, cyber cafes and the like centers with police control room WO2013065069A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
IN3732/CHE/2011 2011-11-01
IN3732CH2011 2011-11-01

Publications (1)

Publication Number Publication Date
WO2013065069A1 true WO2013065069A1 (en) 2013-05-10

Family

ID=48191477

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IN2012/000685 WO2013065069A1 (en) 2011-11-01 2012-10-15 System and method for collecting and integrating data from hotels, lodges, cyber cafes and the like centers with police control room

Country Status (1)

Country Link
WO (1) WO2013065069A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005033831A2 (en) * 2003-06-17 2005-04-14 United Security Applications Id, Inc. Electronic security system for monitoring and recording activity and data relating to persons
CN101673544A (en) * 2009-10-10 2010-03-17 上海电虹软件有限公司 Cross monitoring method and system based on voiceprint recognition and location tracking

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005033831A2 (en) * 2003-06-17 2005-04-14 United Security Applications Id, Inc. Electronic security system for monitoring and recording activity and data relating to persons
CN101673544A (en) * 2009-10-10 2010-03-17 上海电虹软件有限公司 Cross monitoring method and system based on voiceprint recognition and location tracking

Similar Documents

Publication Publication Date Title
US10740861B1 (en) Systems and methods for acquiring, accessing, and analyzing investigative information
US10178537B2 (en) Emergency messaging system and method of responding to an emergency
US7805457B1 (en) System and method for identifying members of a gang or security threat group
US20020069084A1 (en) Method and system for countering terrorism and monitoring visitors from abroad
US20070036395A1 (en) Reverse identity profiling system with alert function
US7245223B2 (en) Anti terrorist and homeland security public safety warning system
US7379879B1 (en) Incident reporting system and method
CN111612113A (en) Epidemic prevention control method, device, system, storage medium and processor
US20140361899A1 (en) Released offender geospatial location information trend analysis
CN110009784A (en) Monitoring joint defence method and apparatus and system and storage medium based on artificial intelligence
Nieto et al. Public and private applications of video surveillance and biometric technologies
CN111554019B (en) Electronic discrepancy system capable of tracking and recording based on big data and verification method thereof
CN108777703A (en) A kind of abnormal behaviour processing method and system based on block chain
JP5813829B1 (en) Crime prevention system
CN110096606B (en) Foreign roll personnel management method and device and electronic equipment
Cooper No fixed abode: The continuum of policing and incarcerating the homeless
JP6776700B2 (en) Disaster information management system and disaster information management method
US10394900B1 (en) Community-based investigative tools
CN110415137A (en) A kind of management and running information based on mobile Internet is quickly transmitted and sharing method
US7173532B2 (en) Intelligent controlled entry-exit system
US11216900B1 (en) Investigation systems and methods employing positioning information from non-resident devices used for communications with controlled-environment facility residents
Henderson Real-time and historic location surveillance after United States v. Jones: An administrable, mildly mosaic approach
Faull How to map violence without police data
WO2013065069A1 (en) System and method for collecting and integrating data from hotels, lodges, cyber cafes and the like centers with police control room
Knox Extended commentary: The capitol insurrection, emergency management and mutual aid agreements: What questions need to be answered?

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12844937

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12844937

Country of ref document: EP

Kind code of ref document: A1