WO2016163952A1 - System and methods for managing work orders at a site location - Google Patents

System and methods for managing work orders at a site location Download PDF

Info

Publication number
WO2016163952A1
WO2016163952A1 PCT/SG2016/050142 SG2016050142W WO2016163952A1 WO 2016163952 A1 WO2016163952 A1 WO 2016163952A1 SG 2016050142 W SG2016050142 W SG 2016050142W WO 2016163952 A1 WO2016163952 A1 WO 2016163952A1
Authority
WO
WIPO (PCT)
Prior art keywords
computing device
tasks
site location
data
user
Prior art date
Application number
PCT/SG2016/050142
Other languages
French (fr)
Inventor
Kin Lam PHOONG
Yu Hong @Seow Kin Hwa XIAO
Chee Yang LOO
Diffy S. ROMANO
Yong Jia WONG
Thu Kyaw AUNG
Original Assignee
Combuilder Fmit Pte Ltd
Combuilder Pte Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Combuilder Fmit Pte Ltd, Combuilder Pte Ltd filed Critical Combuilder Fmit Pte Ltd
Publication of WO2016163952A1 publication Critical patent/WO2016163952A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0631Resource planning, allocation, distributing or scheduling for enterprises or organisations
    • G06Q10/06311Scheduling, planning or task assignment for a person or group

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure generally relates to a system and methods for managing work orders at a site location. In an aspect of the present disclosure, there is provided a system for managing work orders at a site location. The system comprises: a remote computing system for communicating a work order comprising a set of tasks associated therewith to be executed at the site location; and a computing device located away from and communicable with the remote computing system, the computing device configured for accessing the work order. The computing device is configured to generate at least one of: geolocation data of the computing device; and machine data obtained from a machine-readable object disposed at the site location, in response to the computing device detecting a first user action thereon. A location of the computing device is determined based on the at least one of the geolocation data and the machine data. The set of tasks associated with the work order is accessible on the computing device in response to the location of the computing device being determined to be the site location.

Description

SYSTEM AND METHODS FOR MANAGING WORK ORDERS AT A SITE
LOCATION
Technical Field
The present disclosure generally relates to a system and methods for managing work orders at a site location. More particularly, the present disclosure describes various embodiments of a system and methods for managing work orders that are assigned to one or a plurality of site locations.
Background
Large organizations that are in charge of or manage multiple sites or site locations, such as residential areas, typically outsource or farm out some jobs or tasks, e.g. routine maintenance, day-to-day jobs, or other ad-hoc duties, to external firms. These external firms have better expertise in performing such jobs that are assigned as work orders by the organizations.
In some countries such as Singapore, residential areas are clustered into several constituencies. Each constituency represents a number of residential blocks and flats that are located within a predefined boundary. Every constituency is managed by organizations known as town councils. Each town council is in charge of maintaining the common areas of residential flats and estates within the town council's respective constituency. Such common areas include the common corridors, void decks, lifts, water tanks, external lighting and the open spaces surrounding the estates.
Town councils function as a manager or facilitator of maintaining the common areas of residential areas. In order to do the maintenance, or reparation if necessary, of the common areas, town councils normally engage external or independent contractors to perform the maintenance and/or reparation work and tasks. For example, if ground lobbies of a particular residential block are scheduled for weekly cleaning, the respective town council would hire or engage a contractor to do the job. The contractor would thus be required to go to the particular residential block and clean the ground lobbies according to the schedule set by the town council.
Contractors are required to perform a set of tasks for each particular job or work. For example, if the job or work is to clean the ground lobbies, the set of tasks may include doing a general cleaning of the void deck, scrubbing the void deck with machine equipment, repairing unworkable lightings, etc. Contractors are expected to know their duties and to perform them accordingly when they are at the site location. However, there may be some contractors, especially those that are newly established or engaged by the town councils, which are not aware of the entire set of tasks that needs to be performed for a particular job or work order. Town councils do not always communicate the required set of tasks to contractors, and have a certain level of expectations that the contractors will still complete their jobs dutifully. In worse cases, some unscrupulous contractors may even report the work has been performed and completed, when in fact the contractors did not, or even did not go to the site location for doing the work.
In order to for the town councils to ensure the contractors have done their work, town councils may send property officers to inspect the site location. However, this can only be done after the town councils are made aware that the contractors have completed the job, if at all. There remains a need for town councils to be aware that the contractors are actually at the site location during the scheduled time for doing a particular job or work order. Therefore, in order to address at least one of the aforementioned problems and/or disadvantages, there is a need to provide a system and methods for managing work orders at a site location, in which there are improved features that are beneficial to organizations and the firms that are engaged by them. Summary
According to a first aspect of the present disclosure, there is provided a system for managing work orders at a site location. The system comprises: a remote computing system for communicating a work order comprising a set of tasks associated therewith to be executed at the site location; and a computing device located away from and communicable with the remote computing system, the computing device configured for accessing the work order. The computing device is configured to generate at least one of: geolocation data of the computing device; and machine data obtained from a machine-readable object disposed at the site location, in response to the computing device detecting a first user action thereon. A location of the computing device is determined based on the at least one of the geolocation data and the machine data. The set of tasks associated with the work order is accessible on the computing device in response to the location of the computing device being determined to be the site location.
According to a second aspect of the present disclosure, there is provided a method for managing work orders at a site location by a user. The method comprises: receiving a work order on a computing device from a remote computing system, the computing device located away from the remote computing system, the computing device operable by the user; accessing the work order using the computing device, the work order comprising a set of tasks to be performed at the site location, the set of tasks being in an inaccessible state; detecting a first user action on the computing device; and triggering an unlocking process in response to detecting the first user action. The unlocking process comprises at least one of: generating geolocation data by the computing device; and generating machine data by the computing device from a machine-readable object disposed at the site location. The method further comprises: determining a location of the computing device based on the at least one of the geolocation data and the machine data; and transitioning the set of tasks from the inaccessible state to an accessible state if the location of the computing device is determined to be the site location, such that the accessible state allows the user to perform the set of tasks. According to a third aspect of the present disclosure, there is provided a method for managing work orders at a site location by a user. The method comprises: receiving a work order on a computing device from a remote computing system, the computing device located away from the remote computing system, the computing device operable by the user; accessing the work order using the computing device, the work order comprising a set of performed tasks to be inspected at the site location, the set of performed tasks being in an inaccessible state; detecting a first user action on the computing device; and triggering an unlocking process in response to detecting the first user action. The unlocking process comprising at least one of: generating geolocation data by the computing device; and generating machine data by the computing device from a machine-readable object disposed at the site location. The method further comprises determining a location of the computing device based on the at least one of the geolocation data and the machine data; and transitioning the set of performed tasks from the inaccessible state to an accessible state if the location of the computing device is determined to be the site location, such that the accessible state allows the user to inspect the set of performed tasks.
According to a fourth aspect of the present disclosure, there is provided a method for managing work orders at a site location by a user. The method comprises receiving a work order on a computing device from a remote computing system with the computing device located away from the remote computing system and the computing device operable by the user, accessing the work order using the computing device where the work order comprising a set of tasks to be performed at the site location and being indicative of the site location and the set of tasks being in an inaccessible state, and detecting a first user action on the computing device. The method further comprises triggering an unlocking process in response to detecting the first user action where the unlocking process comprising receiving acknowledgement of the work order by the user, and transitioning the set of tasks from the inaccessible state to an accessible state in response to acknowledgement of the work order being received from the user, such that the accessible state allows the user to perform the set of tasks.
An advantage of the system and methods of the present disclosure is that they provide a verification of the location of the computing device. The location of the computing device is checked based on at least one of geolocation data and machine data. Only if the computing device is at the correct site location, then the set of tasks becomes accessible. This ensures that the user of the computing device has to be at the correct site location before he can proceed with the necessary tasks. This helps to avoid unwanted situations whereby users report tasks as being completed when they were not present at the site location in the first place. It also prevents the users from going to the wrong site location as each set of tasks is associated with a site location. This in turn prevents unnecessary errors such as arriving at the wrong location and performing unnecessary tasks. The set of tasks, when unlocked at the correct site location, further provides guidance to the users when they do their jobs.
A system and methods for managing work orders at a site location according to the present disclosure is thus disclosed hereinabove. Various features, aspects, and advantages of the present disclosure will become more apparent from the following detailed description of the embodiments of the present disclosure, by way of non- limiting examples only, along with the accompanying drawings in which like numerals represent like components.
Brief Description of the Drawings
FIG. 1 is a schematic layout of a system according to an embodiment of the present disclosure.
FIG. 2 is a flowchart of a method according to an embodiment of the present disclosure.
FIG. 3 is a flowchart of an unlocking process according to an embodiment of the present disclosure.
FIG. 4 is a flowchart of a method according to an embodiment of the present disclosure. FIG. 5A and FIG. 5B show various screen captures of a computing device according to an embodiment of the present disclosure. FIG. 6 shows a screen capture of a computing device according to an embodiment of the present disclosure.
FIG. 7 shows a screen capture of a computing device according to an embodiment of the present disclosure.
FIG. 8 shows a screen capture of a computing device according to an embodiment of the present disclosure. FIG. 9 shows a screen capture of a computing device according to an embodiment of the present disclosure.
FIG. 10A, FIG. 10B, and FIG. 10C show various screen captures of a computing device according to an embodiment of the present disclosure.
FIG. 1 1 A, FIG. 1 1 B, and FIG. 1 1 C show various screen captures of a computing device according to an embodiment of the present disclosure.
FIG. 12A, FIG. 12B, and FIG. 12C show various screen captures of a computing device according to an embodiment of the present disclosure.
Detailed Description
For purposes of brevity and clarity, descriptions of embodiments of the present disclosure are limited hereinafter to a system and methods for managing work orders at a site location, in accordance with the drawings in FIG. 1 to FIG. 12C. While aspects of the present disclosure will be described in conjunction with the embodiments provided herein, it will be understood that they are not intended to limit the present disclosure to these embodiments. On the contrary, the present disclosure is intended to cover alternatives, modifications and equivalents, which may be included within the spirit and scope of the present disclosure as defined by the appended claims. Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. However, it will be recognized by an individual having ordinary skill in the art, i.e. a skilled person, that the present disclosure may be practiced without these specific details. In other instances, well-known systems, methods, procedures, and components have not been described in detail as not to unnecessarily obscure aspects of the embodiments of the present disclosure.
In embodiments of the present disclosure, a system 100 for managing work orders at a site location is described hereinafter. FIG. 1 shows a schematic layout of the system 100. Broadly, the system 100 includes an organization 1 10 for managing the work orders. The organization may outsource or farm out various works, jobs, and/or tasks to a first user 120 for performing them at various site locations. The first user 120 is or is part of a firm that is independent and separate from the organization 1 10.
In some non-limiting exemplary embodiments of the present disclosure, the organization 1 10 is a town council 1 10 and the first user 120 refers to contractors 120. According to the definition above, the town council 1 10 manages residential areas in its constituency. The town council 1 10 may hire or engage or assign the contractors 120 to perform various maintenance and/or reparation tasks at the residential areas, such as cleaning of void decks, repairing of spoilt lightings or elevators, clearing of rubbish bins, etc. These contractors 120 are typically independent companies that are specialized in performing such maintenance jobs, while the town councils 1 10 are the commissioners of these contractors 120.
Each town council 1 10 has a computing system 130, or a remote computing system 130 when seen from the contractor's perspective, to facilitate the town council's 1 10 management of the contractors 120 and their jobs. The town council 1 10 is located proximate to the residential areas within its constituency, and the computing system 130 is disposed within the town council 1 10.
As the town council 1 10 needs to manage multiple residential areas within its constituency, the town council 1 10 establishes a schedule or routine for jobs or work orders that need to be done at the residential areas. For example, a specific residential block is scheduled for weekly cleaning every Monday. This specific residential block is thus designated as a site location 140. Other residential blocks and areas scheduled for other maintenance routines are correspondingly designated as other site locations 140, such that the town council 1 10 manages work orders for a plurality of site locations 140. This routine maintenance of the site location 140 may be assigned to the contractors 120, so that the contractors 120 will go to the site location 140 and perform the required tasks according to schedule. The computing system 130 assigns or communicates jobs or work orders to the contractors 120 based on a schedule or routine established by the town council 1 10. In some embodiments, the town council 1 10 assigns the work orders to a first user office 160 or a main contractor 160 via the first communication link 150 as shown in FIG. 1 . The main contractor 160 will then outsource various specific tasks required of the work orders to other contractors 120. In other embodiments, the town council 1 10 may directly liaise with the contractors 120 via a second communication link 170. Thus, the town council 1 10 will be able to bypass the main contractor 160 and can assign work orders directly to the contractors 120 via the second communication link 170.
Based on the routine schedule established by the town council 1 10, if a particular residential block has an impending job to be performed, the town council 1 10 generates a work order using the remote computing system 130. The work order is subsequently transmitted or communicated to the main contractor 160 via the first communication link 150, or directly to the contractors 120 via the second communication link 170. If the work order is received by the main contractor 160, it is the duty of the main contractor 160 to reassign the work order to the other contractors 120, in accordance with its contractual obligations to the town council 1 10. The reassignment of work orders from the main contractor 160 to the contractors 120 is done via a third communication link 180. Like the town council 1 10, the main contractor 160 has a computing system or a local computing system 190 for managing and assigning the work orders to the contractors 120. In order to receive, access, and manage the work orders, the contractors 120 have a computing device 200, such as a mobile phone or smartphone. The computing device 200 is configured to receive work orders from the town council 1 10 and/or the main contractor 160. More specifically, the computing device 200 can receive and access the work orders from the remote computing system 130 of the town council 1 10 via the second communication link 170, and/or the computing device 200 can receive and access the work orders from the local computing system 190 of the main contractor 160 via the third communication link 180. The computing device 200 runs a software application to manage the work orders. The software application may be executable on various operating platforms of mobile phones, such as iOS, Android, and Windows. Thus, with the computing device 200, the contractors 120 can more efficiently receive work orders and the computing device 200 also provides a convenient communication means for the contractors 120, especially in situations when the contractors 120 need to communicate with other parties, as described afterwards.
Once the contractors 120 receive the work order for the site location 140, the contractors 120 will proceed to the site location 140 at the scheduled date and time. A supervisor of the contractors 120 holds the computing device 200 and assigns the appropriate duties to his workers at the site location 140, based on the work order accessible on the computing device 200. At the site location 140, the contractors 120, specifically the supervisor, need to use the computing device 200 to access a set of tasks associated with the work order. The contractors 120 are only aware that there is work order for a specific residential area, but are unable to access the set of tasks associated with the work order. Experienced contractors may still be able to perform the associated tasks because they are familiar with what needs to be done, especially if they have done it several times before. Other contractors may be less familiar, especially if it is a new or unique work order, and may require guidance on the tasks that need to be done. Thus, the set of tasks associated with the work order provides the contractors 120 with some guidance on the specific jobs to be done for the work order. For example, in a general work order of cleaning the lobby of a residential block, the set of tasks may include sweeping the void deck, washing the void deck, cleaning the elevators, clearing of rubbish bins, etc. The providence of the set of tasks to the contractors 120 advantageously gives the contractors 120 a clearer picture and guided steps to perform the work order effectively and efficiently.
However, the set of tasks is not accessible on the computing device 200 unless the computing device 200 is at the site location 140. If the computing device 200 is at the site location 140, this would mean the contractors 120 are at the site location 140 and are ready to execute the work order. The set of tasks would become accessible on the computing device 200 if it is established that the computing device 200 is at the site location 140, thereby allowing the contractors 120 to perform the set of tasks accordingly. If the computing device 200 is not at the site location 140 or is at a different site location 140, the set of tasks remains inaccessible.
The computing device 200 is configured to generate geolocation data thereof. The geolocation data provides an indication as to whether the computing device 200 is at the site location 140. Thus, if the geolocation data of the computing device 200 corresponds to the geolocation data 210 of the site location 140, then there is verification that the computing device 200 is at the correct site location 140. The geolocation data of the computing device 200 may be generated by means of a geolocation module or a GPS module embedded therein. Other means or manners to generate or obtain the geolocation data include using A-GPS (service provider triangulation or network triangulation), Bluetooth (using low energy beacons), Wi-Fi (using locator nodes from signal repeaters), or NFC. A person having ordinary skill in the art would readily understand the different methods of obtaining geolocation data. Additionally or alternatively, there is a machine-readable object 220 disposed at the site location 140. The machine-readable object 220 can be read or scanned by the computing device 200, and upon doing so, the computing device 200 generates machine data therein. The machine-readable object 220 may be a type of optical barcode or an optical machine-readable representation of data, such as the ubiquitous UPC barcode. Another example of optical barcodes for the machine- readable object 220 is the matrix barcode or QR code. Other than optical barcodes, the machine-readable object 220 can be radio frequency identification (RFID) tags. An RFID tag can be electronically embedded or stored with information pertaining to the site location 140. The RFID tag can act as a passive transponder that would allow its information to be read by an external transceiver when the transceiver is close to the RFID tag. Other types of machine-readable objects 220 that employ wireless transmission include NFC tags, as readily known by a person having ordinary skill in the art.
The machine-readable object 220 may be disposed as a conspicuous location such that the contractors 120 can easily locate it, or at a more inconspicuous location so that residents passing by the area do not question about it. The machine-readable object 220 may also be housed in a lockable cabinet to prevent residents from mishandling it. In the example of an optical barcode as the machine-readable object 220, the computing device 200 comprises an imaging module, such as a camera, for scanning the optical barcode. By scanning the optical barcode 220, the computing device 200 generates machine data or optical barcode data that is representative of the optical barcode. In the example of an RFID tag as the machine-readable object 220, the computing device 200 comprises a transceiver to send a signal to the RFID tag and read its response, thereby generating machine data or RFID data that is representative of the RFID tag. Thus, the location of the computing device 200 can be determined based on at least one of the geolocation data and the machine data. The determination of the location of the computing device 200 is determined by verifying against reference data, the reference data being associated with the site location 140. The reference data would thus be the geolocation data of the site location 140, and the machine data (e.g. optical barcode data or RFID data) associated with the machine-readable object 220 disposed at the site location 140. The reference data may be embedded or stored with the work order, such that when the computing device 200 receives the work order, the verification against the reference data can be performed directly within the computing device 200. If the generated geolocation data corresponds with the geolocation data of the correct site location 140 that is stored in the work order, and/or if the generated machine data corresponds with the machine-readable object 220 of the site location 140, then there is verification that the computing device 200 is at the correct site location 140. Therefore, the verification of at least one of the geolocation data and the machine data against the reference data may be performed by the computing device 200 itself. In this case, the reference data is pre-downloaded or already present in the memory or storage of the computing device 200, possibly by way of receiving the work orders. However, in some alternative embodiments, the geolocation data and the machine data obtained or generated by the computing device may be transmitted from the computing device 200 to the remote computing system 130, so that the remote computing system 130 can perform the verification against the reference data. In this case, the reference data associated with the work order is stored in the remote computing system 130 for performing verification process.
If the computing device 200 is determined to be at the correct site location 140, then the set of tasks becomes accessible on the computing device 200. If both the geolocation data and the machine data are incorrect or do not correspond to the correct site location 140, then the computing device 200 is at the wrong site location 140. As such, the computing device 200 would not be able to access the set of tasks. Advantageously, the verification (or partial verification) of the location of the computing device 200 to access the set of tasks ensures that more detailed instructions (in the set of tasks) of the work order are communicated to the contractors 120 only when the contractors 120 are at the correct site location 140 based on the routine schedule established by the town council 1 10.
However, in some cases when attempting to determine the location of the computing device 200 using both the generated geolocation data and the machine data, one of the geolocation data and machine data may not be available for verification. The computing device 200 is configured to take into account such possibilities, and allow the set of tasks to become accessible even if only one of the geolocation data and machine data is available and verified against the reference data.
One example of such cases would be the machine data is verified against the reference data but the geolocation data is not. This could be due to the geolocation data not corresponding to reference geolocation data 210 of the site location 140, or due to a lack of a stable signal to generate the geolocation data. The contractors 120 can make note of this on the computing device 200, such as entering or keying into an event log in the software application running on the computing device 200. The computing device 200 can push the process of generating the geolocation data to the background or as a background process, and allow the computing device 200 to temporarily bypass the requirement of the geolocation data. This would in turn allow the set of tasks to become accessible, as the machine data has been verified, so that the contractors 120 can still proceed with the work order. In the process of the contractors 120 performing the work order, the computing device 200 will continue to attempt to verify the geolocation data in the background. For example, as the work is in progress and the contractors 120 are moving around, it may reach a point where the computing device 200 can obtain a good and stable signal to generate the geolocation data. The computing device 200 will attempt the verification against the reference geolocation data 210 of the site location 140 once the stable signal becomes available. If after a predetermined period of time the geolocation data still cannot be verified, i.e. after the service has timed-out, this information would be sent to the town council 1 10 for records purposes, and the town council 1 10 can take further measures to resolve this issue. The contractors 120 can still proceed with the work order because the set of tasks has already been made accessible due to the partial verification from the machine data.
In another example, the geolocation data is verified against the reference data but the machine data is not. This could be due to the generated machine data not corresponding to machine-readable object 220 of the correct site location 140, or due to a defective machine-readable object 220 disposed at the site location 140. The computing device 200 may prompt or notify the user that the geolocation data has been verified, but the machine data could not be verified. The computing device 200 may further prompt the user to select whether to bypass the process of verifying the machine data. If the user selects the bypass, the set of tasks would still become accessible on the computing device 200 as the geolocation data has been verified. Additionally, the computing device 200 logs this bypass in a report that is sent to the town council 1 10. The report contains the reasons of selecting the bypass and possibly an explanation as to why the machine data cannot be generated, such as due to a defective machine-readable object 220. This report may be like an incident report as described below, or a separate notification that alerts the town council 1 10 of the problems in getting the machine data verified. For example, if the machine- readable object 220 is defective, the town council 1 10 will become aware of this after receiving the report, and can take measures to repair or replace the machine- readable object 220. The contractors 120 can still proceed with the work order because the set of tasks has already been made accessible due to the partial verification from the geolocation data. In embodiments of the present disclosure, the system 100 broadly includes a second user 230 who will be tasked by the organization 1 10 to do work at the site location 140. The second user 230 may be external parties engaged by the organization 1 10, or may be an employee of the organization 1 10. In some non-limiting exemplary embodiments of the present disclosure, the second user 230 is a town council officer or a property officer 230 who will be tasked to inspect the work done at the site location 140. The property officer 230 is a person assigned by the town council 1 10 and is independent of the contractors 120 and/or main contractor 160. The property officer 230 uses a computing device 240 that is substantially similar to the computing device 200 used by the contractors.
The computing device 240 allows the property officer 230 to receive, access, and manage the work orders of inspecting the work done by the contractors 120. The computing device 240 is configured to receive work orders or inspection orders from the town council 1 10. More specifically, the computing device 240 can receive and access the inspection orders from the remote computing system 130 of the town council 1 10 via the fourth communication link 250. The computing device 240 runs a software application to manage the work orders. The software application may be executable on various operating platforms of mobile phones, such as iOS, Android, and Windows. Thus, with the computing device 240, the property officer 230 can more efficiently receive inspection orders from the town council 1 10. The computing device 240 also provides a convenient communication means between the property officer 230 and the town council 1 10. After the contractors 120 have completed their work order at the site location 140, the completion is reported back to the town council 1 10. The completion is reported back by communicating an action data from the computing device 200 to the remote computing system 130. The town council 1 10 then instructs the property officer 230, preferably with the computing device 240, to go to the site location 140 and inspect the work done by the contractors 120. In the instruction order or inspection order of the property officer 230, there is also a set of tasks associated therewith. In some situations, the property officer 230, upon arriving at the site location 140, is not aware of the duties or tasks that were performed by the contractors 120. Thus, the set of tasks in the inspection order for the property officer 230 provides guidance as to what to check and look out for during the inspection process. This advantageously gives the property officer 230 a clearer picture and guided steps to perform the inspection order effectively and efficiently.
However, like the contractor's computing device 200, the set of tasks in the property officer's computing device 240 is not accessible unless the computing device 240 is at the site location 140. If the computing device 240 is at the site location 140, this would mean the property officer 230 is at the site location 140 and are ready to execute the inspection order. The set of tasks would become accessible on the computing device 240 if it is established that the computing device 240 is at the site location 140, thereby allowing the property officer 230 to perform the set of inspection tasks accordingly. If the computing device 240 is not at the site location 140 or is at a different site location 140, the set of tasks remains inaccessible.
It would be readily understood by a person having ordinary skill in the art that the accessing of the set of tasks using the property officer's computing device 240 is similar or analogous to the aforementioned description in relation to the contractor's computing device 200. More particularly, the property officer's computing device 240 also utilizes geolocation data and machine data to verify the location of the computing device 240. The determination of the location of the computing device 240 can be based on verification of both the geolocation data and machine data, or partial verification of only one of them, as described above in regards to the contractor's computing device 200.
Thus, the location of the computing device 240 can be determined based on at least one of the geolocation data and the machine data. If the computing device 240 is determined to be at the correct site location 140, then the set of inspection tasks becomes accessible on the computing device 240. If both the geolocation data and the machine data are incorrect or do not correspond to the correct site location 140, then the computing device 240 is at the wrong site location 140. As such, the computing device 240 would not be able to access the set of inspection tasks. Advantageously, the verification (or partial verification) of the location of the computing device 240 to access the set of inspection tasks ensures that the property officer 230 is in fact at the site location 140 to perform the inspection process, and also provides him with clearer guidance on what to inspect. Preferably, the set of inspection tasks for the property officer 230 mirrors the set of tasks in the work order for the contractors 120, i.e. the set of performed tasks of the contractors 120.
After the set of performed tasks is inspected by the property officer 230, an action data is communicated from the computing device 240 to the remote computing system 130, thereby notifying the town council 1 10 of the completion of the inspection of the tasks done by the contractors 120. The inspection done by the property officer 230 on the set of performed tasks of the contractors 120 allows the town council 1 10 to exert greater control over the quality of the work performance of the contractors 120.
Moreover, the property officer 230 only goes to inspect the tasks only after the contractors 120 have completed the work. The completion of the work is made known to the town council 1 10 which then informs the property officer 230 of the same. This prevents the property officer 230 from making unnecessary trips to the site location 140 if the work has not started or is still incomplete. This can occur because the property officer 230 and the contractors 120 work in different organizations, and the communication between them may be lacking somewhat. These unnecessary trips (to inspect site locations 140 with incomplete work done) waste the property officer's 230 time and reduce productivity. It is thus more advantageous to inspect only site locations 140 where there are confirmations of completion of the tasks by the contractors 120. The computing device 200 or 240 in the system 100 may further be configured to communicate an incident report to the remote computing system 130, the incident report being associated with at least one of the set of tasks and the site location 140. The incident report may contain reports / notifications / alerts regarding defects / problems / issues observed at the site location 140, or that are related to the set of tasks. The reporting of defects back to the remote computing system 130 and the town council 1 10 allows the town council 1 10 to readily make itself known to problems occurring at its residential areas, and to tackle unprofessional contractors who are not doing a proper job in maintaining the residential areas. The computing device 200 or 240 may also be configured to communicate messages, exchange data and activity and project status with each other, and/or with the remote computing system 130. The presence of such an exchange environment allows for communication between the various parties using the respective computing devices (200 and 240) and system (130). For example, the contractors 120 or the supervisor thereof can use the first computing device 200 to communicate with the property officer 230 who is using the second computing device 240. Such communication could help the contractors 120 resolve issues that may occur when they are performing the work orders at the site location 140, and also to gather information from the property officer 230 as to what to look out for when working the tasks. The exchange environment may also be used to communicate with the town council 1 10, such as to report that the contractor's 120 tasks are completed, or to report that the property officer's 230 inspection job is done.
In a further elaboration, the first communication link 150, second communication link 170, the third communication link 180, and the fourth communication link 250 are generally based on data communications known to the skilled person. For example, these data communications may include wired connections such as LAN and DSL, and/or may include wireless connections include such as Wi-Fi, GPRS, 3G, 4G, and LTE. The communication links may also be indirectly linked to an internet cloud such that all communication occurring through the communication links are centralized and saved at a common space. Additionally, although some exemplary computing configurations have been described herein, particularly in regards to the remote computing system 130 and the computing device 200, which follows a server-client relationship, these examples are not meant to be limiting on the types of possible computing configurations. Other computing configurations beyond the mentioned server-client relationship are also possible in other embodiments of the present disclosure. Such computing configurations include node-to-node type configuration, node-to-node type configuration together with a coordinating server, and node-to-client type configuration, and client-to-client type configuration. The various types of computing configurations applicable in the embodiments of the present disclosure would be readily apparent and understood by a person having ordinary skill in the art.
In embodiments of the present disclosure, there is provided a method 300 for using the system 100. Broadly, there is a method 300 for managing work orders at a site location 140 by the organization 1 10 operating the remote computing system 130, and the first user 120 operating the computing device 200.
In some non-limiting embodiments, the organization 1 10 is the town council 1 10 and the first user 120 refers to the contractors 120. As such, there is a method 300 for managing work orders at a site location 140 by contractors 120 operating the computing device 200. Referring to FIG. 2, the method 300 comprises a step 310 of receiving a work order or an instruction order on the computing device 200. The work order or instruction order originates from the remote computing system 130 of the town council 1 10, which is located away from the computing device 200. The method 300 further comprises a step 320 of accessing the work order or instruction order using the computing device 200. The work order comprises a set of tasks that is assigned to the contractors 120 to perform at the site location 140. However, the set of tasks is in an inaccessible state or is inaccessible on the computing device 200, unless the computing device 200 has been verified to be at the correct site location 140.
The method 300 further comprises a step 330 of detecting a first user action on the computing device 200. The first user action is performed by the supervisor of the contractors 120, i.e. the person holding the computing device 200. The first user action may be the tapping of a button on the screen of the computing device 200, providing an input thereto, or performing a gesture on the computing device 200. Upon the computing device 200 detecting the first user action, the method 300 triggers an unlocking process 400 in a step 340. Referring to FIG. 3, the unlocking process 400 is a series of steps for determining the location of the computing device 200 and to verify whether the computing device 200 is at the correct site location 140.
The unlocking process 400 comprises a step 410 of generating geolocation data by the computing device 200. The computing device 200 is configured to generate geolocation data thereof. The geolocation data provides an indication as to whether the computing device 200 is at the site location 140. Thus, if the geolocation data of the computing device 200 corresponds to the geolocation data 210 of the site location 140, then there is verification that the computing device 200 is at the correct site location 140.
Additionally or alternatively, the unlocking process 400 comprises a step 420 of generating machine data obtained, with the use of the computing device 200, from a machine-readable object 220 disposed at the site location 140. As already elaborated above, the machine-readable object 220 can be a UPC barcode, QR code, RFID tag, or NFC tag, etc. The computing device 200 reads or scans the machine-readable object 220 to generate machine data.
The method 300 further comprises a step 350 of determining a location of the computing device 200 based on the at least one of the geolocation data and the machine data generated by the computing device 200. If the geolocation data and the machine data are verified to be that of the correct site location 140, then the computing device 200 is determined to be at the correct site location 140. In a step 360 of the method 300, the set of tasks associated with the work order then transitions from the inaccessible state to an accessible state if the location of the computing device 200 is determined to be the site location.
If both the geolocation data and/or machine data of the computing device 200 do not correspond to the correct site location 140, then the location of the computing device 200 is not determined to be the correct site location 140. As such, the set of tasks is maintained in the inaccessible state in a step 370 of the method 300. However, as described above, if either of the geolocation data or the machine data is not verified, the set of tasks can still transition from the inaccessible state to the accessible state.
For example, if the geolocation data is not verified, the computing device 200 may be able to push the process of generating the geolocation data to the background in a step 375 of the method 300. Partial verification of only the machine data in a step 380 of the method 300 allows the computing device 200 to temporarily bypass the geolocation verification requirement and allow the contractors 120 to continue with the work. The computing device 200 continues to process the generation of the geolocation data until it succeeds, or until the process times-out. A person having ordinary skill in the art would be able to understand the application of the aforementioned description in this regard.
For example, if the machine data is not verified, the user can select on the computing device 200 to bypass the process of verifying the machine data in a step 385 of the method 300. This will be logged on the computing device 200 and a report or alert will be sent to the town council 1 10. Partial verification of only the geolocation data in the step 380 allows the computing device 200 to temporarily bypass the machine data verification requirement and allow the contractors 120 to continue with the work. A person having ordinary skill in the art would be able to understand the application of the aforementioned description in this regard. After the contractors 120 have completed the set of tasks at the site location 140, a second user action is performed on the computing device 200. The second user action may be tapping a button or performing a gesture on the computing device 200. The detection of the second user action on the computing device 200 generates an action data which is transmitted from the computing device 200 to the remote computing system 130. This in turn notifies the town council 1 10 that the set of tasks at the site location 140 has been completed.
The method 300 may further comprise a step 390 for communicating messages between the computing device 200 and at least one of the remote computing system 130 and a second computing device such as the property officer's computing device 240. The step 390 relates to an exchange environment that can be activated in the computing device 200, as described hereafter. FIG. 4 shows a flowchart of a method according to embodiments of the present disclosure. Broadly, a second user 230 is required by the organization 1 10 to perform other jobs at the site location 140, such as to inspect the work performed by the first user 120 at the site location 140. In some non-limiting embodiments of implementing the system 100, the organization 1 10 is the town council 1 10 and the second user 230 is the property officer 230. The property officer 230 is required by the town council 1 10 to inspect the job done by the contractors 120 at the site location 140, often after the contractors 120 have finished their work and reported back to the town council 1 10. There is thus provided a method 500 for managing work orders at a site location 140 by a property officer 230 operating the computing device 240. Referring to FIG. 4, the method 500 comprises a step 510 of receiving a work order or an instruction order or an inspection order on the computing device 240. The work order originates from the remote computing system 130 of the town council 1 10, which is located away from the computing device 240. The method 500 further comprises a step 520 of accessing the work order using the computing device 240. The work order comprises a set of tasks that is assigned to the property officer 230 to perform at the site location 140. Specifically, the property officer 230 is required to inspect the tasks that were done or performed by the contractors 120 at the site location 140. Thus, the set of tasks specifically relates to a set of performed tasks that needs to be inspected by the property officer 230, wherein the set of performed tasks substantially corresponds to the tasks or jobs done by the contractors 120 at the site location 140. However, the set of performed tasks is in an inaccessible state or is inaccessible on the computing device 240, unless the computing device 240 has been verified to be at the correct site location 140.
The method 500 further comprises a step 530 of detecting a first user action on the computing device 240. The first user action is performed by the property officer 230 who is holding the computing device 240. The first user action may be the tapping of a button on the screen of the computing device 240, providing an input thereto, or performing a gesture on the computing device 240. Upon the computing device 240 detecting the first user action, the method 500 triggers an unlocking process 400 in a step 540.
Referring to FIG. 3, the unlocking process 400 is a series of steps for determining the location of the computing device 240 and to verify whether the computing device 240 is at the correct site location 140. The unlocking process 400 for the property officer's computing device 240 is similar or analogous to that for the contractor's computing device 200 elaborated above, as readily understood by a person having ordinary skill in the art.
The method 500 further comprises a step 550 of determining a location of the computing device 240 based on the at least one of the geolocation data and the machine data generated by the computing device 240. The determination of the location of the computing device 240 may be performed by either the computing device 240 itself, or by the remote computing system 130 after the geolocation data and/or machine data has been transmitted thereto.
If the geolocation data and the machine data are verified to be that of the correct site location 140, then the computing device 240 is determined to be at the correct site location 140. In a step 560 of the method 500, the set of performed tasks associated with the work order then transitions from the inaccessible state to an accessible state if the location of the computing device 240 is determined to be the site location.
If the location of the computing device 240 is not determined to be the correct site location 140, i.e. both the geolocation data and machine data of the computing device 240 do not correspond to the correct site location 140, then the set of performed tasks is maintained in the inaccessible state in a step 570 of the method 500. However, as described above, if either of the geolocation data or the machine data is not verified, the set of tasks can still transition from the inaccessible state to the accessible state.
For example, if the geolocation data is not verified, the computing device 240 may be able to push the process of generating the geolocation data to the background in a step 575 of the method 500. Partial verification of only the machine data in a step 580 of the method 500 allows the computing device 200 to temporarily bypass the geolocation verification requirement and allow the property officer 230 to continue with the inspection work. A person having ordinary skill in the art would be able to understand the application of the aforementioned description in this regard. For example, if the machine data is not verified, the property officer 230 can select on the computing device 240 to bypass the process of verifying the machine data in a step 585 of the method 500. This will be logged on the computing device 240 and a report or alert will be sent to the town council 1 10. Partial verification of only the geolocation data in the step 580 allows the computing device 240 to temporarily bypass the machine data verification requirement and allow the property officer 230 to continue with the inspection work. A person having ordinary skill in the art would be able to understand the application of the aforementioned description in this regard.
After the property officer 230 has inspected the set of performed tasks at the site location 140, a second user action is performed on the computing device 240. The second user action may be tapping a button or performing a gesture on the computing device 240. The detection of the second user action on the computing device 240 generates an action data which is transmitted from the computing device 240 to the remote computing system 130. This in turn notifies the town council 1 10 that the set of performed tasks at the site location 140 has undergone inspection.
The method 500 may further comprise a step 590 for communicating messages between the computing device 240 and at least one of the remote computing system 130 and a second computing device such as the contractor's computing device 200. The step 590 relates to an exchange environment that can be activated in the computing device 240, as described hereafter. FIG. 5A to FIG. 12C show various screen captures of the computing devices 200 and 240 during execution of the methods 300 and 500, respectively.
FIG. 5A and FIG. 5B show a screen 600 on the computing device 200. The screen 600 shows the routine schedule that is assigned by the town council 1 10 to the contractors 120. The screen 600 further shows the various work orders 602 that are scheduled for each date 604. The list of work orders 602 can be switched between the dates 604 by sliding the scroll bar 606. Each of the work orders 602 represent a residential block, that is under the care of the town council 1 10, and has a set of tasks associated therewith. All of the work orders 602 assigned to the contractors 120 may be displayed on the screen 600, categorized according to contractor groups 608. For example, residential blocks located in close proximity to one another are categorized under a first contractor group 608a, which would be managed by a first supervisor of the contractors 120. Other residential blocks located further away are categorized under a second contractor group 608b, which would be managed by a second supervisor of the contractors 120. This allows the same contractor company to supervise and manage different work orders 602 at different residential areas, all of which are under the care of the town council 1 10.
To proceed with a specific work order 602a, the contractors 120 have to arrive at the correct site location 140 where the work order 602a is to be performed. As shown in FIG. 6, upon arrival at the site location 140, the supervisor of the contractors 120 taps on the specific work order 602a on the computing device 200 in order to trigger the unlocking process 400 as described above. The generation of the geolocation data of the computing device 200 is similar to that as discussed above. A screen 610 may be displayed to show that the computing device 200 is generating the geolocation data, as shown in FIG. 7. Alternatively or additionally, machine data from a machine-readable object 220 disposed at the site location 140 may be generated to verify the location of the computing device 200, as described above in the methods 300 and 500. In the example shown in FIG. 6, the machine-readable object 220 is an optical barcode (QR code) 220 that can be read or scanned by a camera on the computing device 200. The user of the computing device 200 taps on the scan function 612 shown in FIG. 6, and proceeds to point the camera of the computing device 200 towards the QR code 220 disposed at the site location 140. Upon detection of the optical barcode 220 as shown in the screen 620 of FIG. 8, the computing device 200 analyzes it and generates the machine data.
However, if the contractors 120 or their supervisor finds that the machine-readable object 220 (e.g. optical barcodes or RFID tags) is missing or defective or otherwise unavailable at the site location 140, this is reported back to the town council 1 10 by tapping on the alert icon 614 shown in FIG. 6. This then allows the supervisor to report that the affected residential block as a missing or defective machine-readable object 220. A screen 630 in FIG. 9 shows that the machine-readable object 220 is a QR code and is being reported as missing / defective. Upon being notified of the missing machine-readable object 220, the town council 1 10 can engage or hire other firms to repair or replace the machine-readable object 220 at the residential block. The communication between the contractors 120 and the town council 1 10 using the computing device 200 allows for more efficient and quick resolution of problems and issues.
Based on at least one of the geolocation data and the machine data, the computing device 200 is able to verify whether it is at the correct site location 140. The work order 602a is specific to residential block or site location 140 and thus has specific geolocation data and machine data associated therewith. If both the geolocation data and the machine data generated by the computing device 200 matches, then the computing device 200 is at the correct site location 140. Alternatively, the geolocation data and machine data may be transmitted from the computing device 200 to the remote computing system 130 of the town council 1 10 for determining the location of the computing device 200.
As described above, if only one of the geolocation data and the machine data can be verified, i.e. partial verification, the computing device 200 may still be able to access the set of tasks associated with the work order 602a. Upon verification or partial verification of the location of the computing device 200, the set of tasks associated with the work order 602a becomes accessible on the computing device 200. Without accessing the set of tasks on the computing device 200, the contractors 120 cannot report to the town council 1 10 that the work order has been executed. Thus, the accessibility of the set of tasks allows the town council 1 10 to ensure that the contractors 120 dutifully execute the work order at the correct site location 140.
FIG. 10A to FIG. 10C are images of a screen 640 which display a set of tasks 642 associated with the work order 602a. The set of tasks 642 may include items such as cleaning the void deck (642a) and scrubbing the common corridors (642b). If the contractors 120 have completed at least one task 642, such as cleaning the void deck (642a), the supervisor may tap on the computing device 200 and check the respective boxes 644. For example, if the contractors 120 have finished cleaning the void deck, the supervisor checks the box 644a, as shown in FIG. 10B. If the contractors 120 have completed all of the tasks 642, the supervisor may check the "check all" box 646, shown in FIG. 10C, as a shortcut to check all the boxes 644. The supervisor may also tap on the "save" button 648a to temporary save the statuses of the set of tasks 642, or tap on the "finish" button 648b after the set of tasks 642 for this site location 140 has been completed. By tapping the "finish" button 648b, the computing device 200 transmits this information to the remote computing system 130, thereby quickly notifying the town council 1 10 that the work order 602a for this site location 140 has been completed. The town council 1 10 may subsequently send a property officer 230 to the site location 140 to inspect the work done by the contractors 120. The property officer 230 uses the computing device 240 to perform this inspection job and generate a service report for the town council 1 10. The property officer 230 is sent only after the town council 1 10 receives confirmation that the contractors 120 have completed their work order 602a at the site location 140. This is to prevent the property officer 230 from making unnecessary trips to the site location 140 if the work has not started or is still incomplete, thereby saving time and improving productivity.
FIG. 1 1 A is an image of a screen 650 showing a service report 652 to be submitted to the town council 1 10 for records maintenance. The service report 652 may include a plurality of work orders or instruction orders or inspection orders 654, which represent residential blocks or site locations 140 where the property officer 230 is required to inspect. For example, the work order 654a relates to a specific residential block or site location 140, and shows a list of task categories 656 that the contractors 120 were supposed to have completed. However, further details on the specific tasks in each category 656 are inaccessible unless the property officer 230 and the computing device 240 are verified to be at the correct site location 140. The unlocking process 400 is triggered when the property officer 230 taps on the unlock button 658. Determination and verification of the location of the computing device 240 also uses the geolocation data and machine data. It would be readily understood by the skilled person that the aforementioned location determination process for the computing device 200 applies analogously to the computing device 240.
As described above, if only one of the geolocation data and the machine data can be verified, i.e. partial verification, the computing device 240 may still be able to access the set of tasks associated with the work order 654a. Upon verification or partial verification of the location of the computing device 240, the set of tasks associated with the work order 654a become accessible on the computing device 240. The accessibility of the set of tasks allows the property officer 230 to know what are the tasks or jobs that the contractors have performed, such that the property officer 230 can do the inspection accordingly and report back to the town council 1 10. FIG. 1 1 B is an images of a screen 660 which display a set of tasks 662 associated with the work order 654a. The set of tasks 662 substantially mirrors the set of tasks 642 for the contractors 120, so that the property officer 230 knows exactly what tasks the contractors 120 have done and what to inspect. The set of tasks 662, i.e. the set of tasks performed by the contractors 120, may include items such as washing the void deck (662a) and the common corridors (662b). The property officer would be required to inspect the void deck and the common corridors to verify whether the contractors 120 have indeed washed said areas, and whether the jobs are properly done.
If the property officer 230 has inspected at least one task 662, such as the void deck (662a) or common corridors (662b), the property officer 230 may tap on the computing device 240 and check the respective boxes 664. For example, if the property officer 230 has finished inspecting the void deck, the property officer 230 checks the box 664a, as shown in FIG. 1 1 B. If the property officer 230 has completed and inspected all of the tasks 662, the property officer 230 may check the "check all" box 666 near the top portion of the screen 660 as a shortcut to check all the boxes 664. The property officer 230 may also tap on the "save" button 668a to temporary save the statuses of inspection of the set of performed tasks 662, or tap on the "finish" button 668b after the set of performed tasks 662 for this site location 140 has been completed and inspected. By tapping the "finish" button 668b, the computing device 240 transmits this information to the remote computing system 130, thereby quickly notifying the town council 1 10 that the work order or inspection order 654a for this site location 140 has been completed.
In some situations, the property officer 230, or even the contractors 120, may observe some defects or problems at the site location 140. For example, the property officer 230 may find that rubbish bins are not properly cleared, which may possibly be due to the fault of the contractors 120 for not properly doing their job, or also possibly due to residents throwing rubbish after the contractors 120 have left. Such defects are thus associated with at least one of the set of performed tasks 662 and the site location 140. The defects observed by the property officer 230 at the site location 140 can be reported back as an incident report or defect report to the town council 1 10, specifically through transmission from the computing device 240 to the remote computing system 130. FIG. 1 1 C is an image of a screen 670 showing an incident report or defect report 672 that can be sent to the town council 1 10. Referring to FIG. 1 1 B, each item in the set of performed tasks (for inspection) 662 has a corresponding "defect report" button 674. For example, if the property officer 230 observes that the void deck (corresponding to task 662a) has a defect or problem or issue, the property officer 230 can tap the corresponding "defect report" button 674a. Upon tapping the "defect report" button 674a, the screen 660 in FIG. 1 1 B transitions to the screen 670 in FIG. 1 1 C, allowing the property officer 230 to furnish details regarding the defect.
On the screen 670 in FIG. 1 1 C, the defect report 672 shows details as to which residential block or site location the defect was observed, based on the geolocation data and/or machine data of the computing device 240. The property officer 230 may choose to furnish photographic evidence of the defect, by capturing a photograph using the photo button 676a. Photographic evidence may also be furnished by using the library button 676b to retrieve an already-captured photograph from the computing device's 240 storage or memory. The screen 670 shows some examples of photographic evidence of defects at a site location 140, such as rubbish bins being left uncleared (photo 678a) or presence of vandalism or graffiti on the walls of the void deck (photo 678b). Other forms of evidence can also be captured and furnished, such as videographic evidence from videos or films captured using the computing device 240.
With reference to FIG. 5A and FIG. 5B, each of the computing devices 200 and 240 includes an exchange environment function or messaging channel accessible with the exchange function embodied by chat button 616. FIG. 12A to FIG. 12C show various screen captures of the exchange environment 700.
As discussed earlier, one contractor firm 160 may be engaged by the town council 1 10 to perform work orders 602 at various site locations 140. The contractor firm 160 may assign different contractor groups 608 to the different site locations 140, each contractor group 608 for one site location 140. Each contractor group 608 has a supervisor who is in charge of using the computing device 200. In some cases, one supervisor may want to communicate with or update the supervisor(s) of the other contractor groups 608, or with other personnel from the contractor firm 160. The exchange environment 700 is integrated with the job tracking functionality of the work orders (602 and 654) in the computing devices (200 and 240), providing a single platform for managing work orders. FIG. 12A is an image of a screen 710 of the exchange environment 700 on the computing device 200. A supervisor of a contractor group 608 can use his computing device 200 to communicate with other supervisors from other contractor groups 608 by selecting the relevant checkboxes 702. For example, if the supervisor wants to communicate with only one other supervisor, he selects the checkbox 702a of that other supervisor. This allows the supervisor to selectively choose who the recipients of his messages are. FIG. 12B is an image of a screen 720 of the exchange environment 700 showing the transmission of messages among the contractor groups 608. The supervisor may also choose to broadcast his message to all the contractor groups 608 in a public communication exchange 704, instead of selecting individual recipients. This is as shown in a screen 730 in FIG. 12C. Other than text messages, the exchange environment 700 also allows for the sharing of computer media, such as photos, images, audios, and videos.
An advantage of the exchange environment 700 in the computing devices 200 and 240 is that the users of the computing devices 200 and 240 can transmit messages and seek answers to questions that the users may have. For example, of a supervisor of the contractors 120 using the computing device 200 is unsure of what to do, possibly due to unforeseen circumstances at the site location 140, the supervisor can message other supervisors or the main contractor office 160 via the exchange environment 700. The contractors 120 may also communicate directly with the property officers 230 to ensure that the tasks can be performed to a reasonable standard and to reduce hassles during the subsequent inspection process. Such communication could help the contractors 120 resolve issues that may occur when they are performing the work orders at the site location 140, and also to gather information from the property officer 230 as to what to look out for when working the tasks. The computing devices 200 and 240 can also communicate messages with the remote computing system 130 of the town council 1 10 using the exchange environment 700. This can be to report that the contractor's 120 tasks are completed, or to report that the property officer's 230 inspection job is done. The exchange environment 700 thus allows for real-time communication among the contractors 120, property officer 230, and the town council 1 10. The use of the computing devices 200 and 240 further simplifies the interaction between the various parties and can lead to improved efficiency when executing the work orders. For example, once the contractors 120 have completed a work order at a site location 140, the completion is quickly communicated to the town council 1 10 and eventually to the property officer 230, who can then be quickly despatched to inspect the site location 140. The overall time taken from working the tasks and inspecting the tasks is substantially reduced. This advantageously also allows for the contractors 120 to move on to other residential areas or site locations 140 to perform other work orders. In short, there can be more work orders completed within a shorter period of time, thereby improving the efficiency of the management of residential areas under the constituency of the town council 1 10.
In the foregoing detailed description, embodiments of the present disclosure in relation to a system and methods for managing work orders at a site location are described with reference to the figures. Description of the various embodiments in the detailed description is not intended to callout specific or particular representations of the present disclosure, but merely to illustrate non-limiting examples of the present disclosure. For example, the system and methods described in the present disclosure may also be used between or among large organizations, between or among departments within the same organization, as well as between or among users within the same department of the same organization. The present disclosure serves to address at least some of the mentioned problems and issues. Although only some embodiments of the present invention are disclosed herein, it will be apparent to a person having ordinary skill in the art in view of this disclosure that numerous changes and/or modifications can be made to the disclosed embodiments without departing from the scope of the present invention. The scope of the disclosure as well as the scope of the following claims is not limited to embodiments described herein.

Claims

Claims
1 . A system for managing work orders at a site location, the system comprising:
a remote computing system for communicating a work order comprising a set of tasks associated therewith to be executed at the site location; and
a computing device located away from and communicable with the remote computing system, the computing device configured for accessing the work order,
wherein the computing device is configured to generate at least one of: geolocation data of the computing device; and machine data obtained from a machine-readable object disposed at the site location,
in response to the computing device detecting a first user action thereon,
wherein a location of the computing device is determined based on the at least one of the geolocation data and the machine data; and
wherein the set of tasks associated with the work order is accessible on the computing device in response to the location of the computing device being determined to be the site location.
2. The system as in claim 1 , wherein the location of the computing device is determined by verifying at least one of the geolocation data and the machine data against reference data, the reference data being associated with the site location.
3. The system as in claim 2, wherein the verification against the reference data is processed by the computing device.
4. The system as in claim 2, wherein the verification against the reference data is processed by the remote computing system in response to transmission of the at least one of the geolocation data and the machine data from the computing device to the remote computing system.
5. The system as in claim 1 , comprising a first of the computing device operable by a first user, and a second of the computing device operable by a second user.
6. The system as in claim 5, wherein the first computing device communicates a first action data in response to the set of tasks being performed by the first user.
7. The system as in claim 6, wherein the second computing device communicates a second action data in response to the performed set of tasks being inspected by the second user.
8. The system as in claim 6, wherein the first action data is communicable from the first computing device to the remote computing system.
9. The system as in claim 7, wherein the second action data is communicable from the second computing device to the remote computing system.
10. The system as in claim 1 , wherein the computing device is configured to communicate an incident report to the remote computing system, the incident report being associated with at least one of the set of tasks and the site location.
1 1 . The system as in claim 1 , wherein the computing device is configured to communicate messages with the remote computing system.
12. The system as in claim 5, wherein the first and second computing devices are configured to allow communication of messages between the first and second users.
13. The system as in claim 1 , wherein the set of tasks associated with the work order is inaccessible if the location of the computing device is not determined to be the site location based on both the geolocation data and the machine data.
14. A method for managing work orders at a site location by a user, the method comprising:
receiving a work order on a computing device from a remote computing system, the computing device located away from the remote computing system, the computing device operable by the user;
accessing the work order using the computing device, the work order comprising a set of tasks to be performed at the site location, the set of tasks being in an inaccessible state;
detecting a first user action on the computing device;
triggering an unlocking process in response to detecting the first user action, the unlocking process comprising at least one of:
generating geolocation data by the computing device; and generating machine data by the computing device from a machine-readable object disposed at the site location,
determining a location of the computing device based on the at least one of the geolocation data and the machine data; and
transitioning the set of tasks from the inaccessible state to an accessible state if the location of the computing device is determined to be the site location, such that the accessible state allows the user to perform the set of tasks.
15. The method as in claim 14, further comprising maintaining the set of tasks in the inaccessible state if the location of the computing device is not determined to be the site location based on both the geolocation data and the machine data.
16. The method as in claim 14, further comprising transmitting at least one of the geolocation data and the machine data from the computing device to the remote computing system for determining the location of the computing device.
17. The method as in claim 14, further comprising detecting a second user action by the user on the computing device after the set of tasks has been performed by the user.
18. The method as in claim 17, further comprising communicating an action data from the computing device in response to the computing device detecting the second user action.
19. The method as in claim 14, further comprising communicating messages between the computing device and at least one of the remote computing system and a second computing device.
20. The method as in claim 19, wherein the second computing device is operable by a second user.
21 . A method for managing work orders at a site location by a user, the method comprising:
receiving an inspection work order on a computing device from a remote computing system, the computing device located away from the remote computing system, the computing device operable by the user;
accessing the inspection work order using the computing device, the inspection work order comprising a set of performed tasks to be inspected at the site location, the set of performed tasks being in an inaccessible state; detecting a first user action on the computing device;
triggering an unlocking process in response to detecting the first user action, the unlocking process comprising at least one of:
generating geolocation data by the computing device; and generating machine data by the computing device from a machine-readable object disposed at the site location,
determining a location of the computing device based on the at least one of the geolocation data and the machine data; and
transitioning the set of performed tasks from the inaccessible state to an accessible state if the location of the computing device is determined to be the site location, such that the accessible state allows the user to inspect the set of performed tasks.
22. The method as in claim 21 , further comprising maintaining the set of tasks in the inaccessible state if the location of the computing device is not determined to be the site location based on both the geolocation data and the machine data.
23. The method as in claim 21 , further comprising detecting a second user action by the user on the computing device after the set of performed tasks has been inspected by the user.
24. The method as in claim 23, further comprising communicating an action data from the computing device in response to the computing device detecting the second user action.
25. The method as in claim 21 , further comprising generating an incident report on the computing device, the incident report being associated with at least one of the set of performed tasks and the site location, the incident report being communicable to the remote computing system.
26. A method for managing work orders at a site location by a user, the method comprising:
receiving a work order on a computing device from a remote computing system, the computing device located away from the remote computing system, the computing device operable by the user;
accessing the work order using the computing device, the work order comprising a set of tasks to be performed at the site location and being indicative of the site location, the set of tasks being in an inaccessible state; detecting a first user action on the computing device;
triggering an unlocking process in response to detecting the first user action, the unlocking process comprising receiving acknowledgement of the work order by the user; and
transitioning the set of tasks from the inaccessible state to an accessible state in response to acknowledgement of the work order being received from the user, such that the accessible state allows the user to perform the set of tasks.
PCT/SG2016/050142 2015-04-07 2016-03-28 System and methods for managing work orders at a site location WO2016163952A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SG10201502717W 2015-04-07
SG10201502717WA SG10201502717WA (en) 2015-04-07 2015-04-07 System and methods for managing work orders at a site location

Publications (1)

Publication Number Publication Date
WO2016163952A1 true WO2016163952A1 (en) 2016-10-13

Family

ID=57072066

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SG2016/050142 WO2016163952A1 (en) 2015-04-07 2016-03-28 System and methods for managing work orders at a site location

Country Status (2)

Country Link
SG (1) SG10201502717WA (en)
WO (1) WO2016163952A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018132878A1 (en) * 2017-01-23 2018-07-26 iCHASE Safety Solution Pty Ltd Issue tracking and rectification system and method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050893A (en) * 2001-08-03 2003-02-21 Matsushita Electric Works Ltd Building construction process management system, building construction process management method, computer program for building construction process management and server device for building construction process management
JP2006260233A (en) * 2005-03-17 2006-09-28 Nippon Yunishisu Kk Work management support method
JP2007080010A (en) * 2005-09-15 2007-03-29 Ics:Kk On-site communication/support system
JP2010040038A (en) * 2008-07-11 2010-02-18 Daimei Kk Worker management support system
JP2011053806A (en) * 2009-08-31 2011-03-17 Fujifilm Corp Management device, construction work management system, construction work management method, and construction work management program

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050893A (en) * 2001-08-03 2003-02-21 Matsushita Electric Works Ltd Building construction process management system, building construction process management method, computer program for building construction process management and server device for building construction process management
JP2006260233A (en) * 2005-03-17 2006-09-28 Nippon Yunishisu Kk Work management support method
JP2007080010A (en) * 2005-09-15 2007-03-29 Ics:Kk On-site communication/support system
JP2010040038A (en) * 2008-07-11 2010-02-18 Daimei Kk Worker management support system
JP2011053806A (en) * 2009-08-31 2011-03-17 Fujifilm Corp Management device, construction work management system, construction work management method, and construction work management program

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018132878A1 (en) * 2017-01-23 2018-07-26 iCHASE Safety Solution Pty Ltd Issue tracking and rectification system and method
GB2573946A (en) * 2017-01-23 2019-11-20 iCHASE Safety Solution Pty Ltd Issue tracking and rectification system and method
GB2605334A (en) * 2017-01-23 2022-09-28 iCHASE Safety Solution Pty Ltd Issue tracking and rectification system and method

Also Published As

Publication number Publication date
SG10201502717WA (en) 2016-11-29

Similar Documents

Publication Publication Date Title
US10026302B1 (en) Mobile alarm device
US7634598B2 (en) Dynamic total asset management system (TAMS) and method for managing building facility services
US10990927B2 (en) Systems and methods for managing mobile workers
US20170032302A1 (en) Smart construction or operations site method and apparatus
US20090089140A1 (en) Support management method, support management system and information processing device
US20060229928A1 (en) System and method of tracking objects being serviced
WO2013144787A1 (en) Work and quality management system, device and method
KR101422352B1 (en) System and method for manageing defect of construction site
US20070145113A1 (en) Barcode based time and location tracking method and system
US20140151446A1 (en) System and Method for Asset Management
US10002335B2 (en) Dynamic workflow for remote devices
US20200044887A1 (en) Platform for the integration of operational bim, operational intelligence, and user journeys for the simplified and unified management of smart cities
JP2007145500A (en) Maintenance-inspection control system
US20230421997A1 (en) Evacuation tracking
US20160104107A1 (en) Systems and methods for dynamic managment of object transmission
CN104200304A (en) Public security inspection task achieving method and system
US20200160464A1 (en) System for collaborative infrastructure management and incident response
Zekavat et al. Holonic construction management: Unified framework for ICT-supported process control
CN112288903A (en) Card punching system, method and equipment
KR20220133620A (en) Construction site safty control system using video analysis technology
US20160110834A1 (en) Emergency Response Management System and Method
WO2016163952A1 (en) System and methods for managing work orders at a site location
TWI804694B (en) Method, mobile terminal, and storage medium for checking fixed asset
JP2012208568A (en) Unnecessary object processing system
WO2016104307A1 (en) Facility management system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16776995

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16776995

Country of ref document: EP

Kind code of ref document: A1