WO2022167691A1 - Digital doorbell system and method - Google Patents

Digital doorbell system and method Download PDF

Info

Publication number
WO2022167691A1
WO2022167691A1 PCT/EP2022/053034 EP2022053034W WO2022167691A1 WO 2022167691 A1 WO2022167691 A1 WO 2022167691A1 EP 2022053034 W EP2022053034 W EP 2022053034W WO 2022167691 A1 WO2022167691 A1 WO 2022167691A1
Authority
WO
WIPO (PCT)
Prior art keywords
computing device
server
user
unique identifier
entranceway
Prior art date
Application number
PCT/EP2022/053034
Other languages
French (fr)
Inventor
William MAPSTONE
Daniel HOUSTON
John Giacomo BREWITT
Original Assignee
QBELL Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by QBELL Limited filed Critical QBELL Limited
Publication of WO2022167691A1 publication Critical patent/WO2022167691A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M11/00Telephonic communication systems specially adapted for combination with other electrical systems
    • H04M11/02Telephonic communication systems specially adapted for combination with other electrical systems with bell or annunciator systems
    • H04M11/025Door telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2823Reporting information sensed by appliance or service execution status of appliance services in a home automation network
    • H04L12/2825Reporting to a device located outside the home and the home network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/06009Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking
    • G06K19/06037Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code with optically detectable marking multi-dimensional coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast
    • H04N7/183Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast for receiving images from a single remote source
    • H04N7/186Video door telephones

Definitions

  • the present disclosure relates to the field of doorbells, in particular, a digital doorbell system and methods.
  • Properties e.g.: dwellings; work spaces
  • an entranceway e.g.: a door; gate
  • a visitor to the property may need to obtain the attention of an occupant of the property.
  • One means by which a visitor can obtain the attention of an occupant is to knock on the entranceway (e.g. using a fist or a knocker attached to the door) to produce a sound. If the occupant hears the sound produced by the knock, they may travel to the entranceway to interact with the visitor. However, if the occupant is not in the immediate vicinity of the entranceway, or there are noises inside the property (e.g. music being played etc.), then the occupant may not hear the knock and therefore, the visitor is unable to obtain the attention of the occupant.
  • Traditional doorbell systems comprise two parts of hardware: a transmitter part, usually disposed at an entranceway; and, a receiver part, usually disposed within a property.
  • the transmitter part is actuated by the visitor which transmits a signal to the receiver.
  • the receiver Upon receipt of the signal from the transmitter by the receiver, the receiver produces an audible tone.
  • the occupant hears the audible tone produced by the receiver, they may travel to the entranceway to interact with the visitor. However, if the occupant is not in the vicinity of the receiver, or again if there are noises inside the property (e.g. music being played etc.), then the occupant may not hear the audible tone, and therefore, the visitor is unable to obtain the attention of the occupant.
  • the occupant may not hear the audible tone, and therefore, the visitor is unable to obtain the attention of the occupant.
  • the advantage a traditional doorbell system has over knocking on the entranceway is that an occupant may position the receiver close to a part of the property they spend a lot of their time in and therefore, are more likely to be near the receiver and hear the audible tone.
  • knocking and a traditional doorbell system may fail to notify a resident of a visitor in the event that the resident is absent from the property e.g. the visitor using these systems may fail to obtain the attention of the resident when the resident is remote from the property.
  • Video doorbell systems comprise the following hardware parts: a camera and microphone disposed at an entranceway; and, a receiver configured to display images captured by the camera and to play audio captured by the microphone.
  • the receiver is fixed within the property and therefore a disadvantage with these apparatus is that they may fail to notify a resident of a visitor in the event that the resident is absent from the property e.g. the visitor using these systems may fail to obtain the attention of the resident when the resident is remote from the property.
  • the receiver may be a smartphone which the resident may keep about their person.
  • a disadvantage with these systems is that the hardware at the entranceway (e.g. camera and microphone) may be expensive compared to other doorbell systems (e.g. traditional doorbell systems or knocking). The hardware at the entranceway can become damaged or stolen and then required replacing, further adding to the expense of such systems.
  • COD cash-on-delivery
  • COD is where a customer orders an item to be delivered to their address. Upon delivery of a parcel containing the item by a delivery person, the customer is required to pay for the item before receiving and opening the parcel. The payment is given to the delivery person (e.g. using physical currency), who upon receipt of the payment hands the parcel to the customer.
  • a disadvantage of COD is that it is open to abuse by scammers.
  • scammers may pose as legitimate delivery drivers and deliver a parcel to a customer who is expecting an item to be delivered from a legitimate business.
  • the customer assumes that the parcel contains the item which they are expecting and pay the scammer posing as a delivery driver the sum of money required for the item they are expecting.
  • the scammer posing as a delivery driver leaves the customer before they realise that the contents of the parcel are not that which they were expecting.
  • scammers may pose as legitimate businesses and receive an order for an item from a customer who indicates that they will pay COD. The scammers may then post an item of lower quality (or a completely different item altogether) to the customer.
  • the customer assumes that the parcel contains the item which they ordered from the scammers posing as a legitimate business. Therefore, the customer may assume that the item in the parcel is that which they ordered and will pay the delivery driver for the parcel.
  • the deliver driver may be a legitimate deliver driver who is couriering unbeknownst to them, a fraudulent parcel.
  • An aspect of the disclosure provides a digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein the second computing device is configured to: receive a unique identifier disposed at the entranceway, wherein the unique identifier is unique to the first user; and, send the unique identifier to a server; wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.
  • a first user and second user are able to use the digital doorbell system to communicate without the need of either the first user or the second user to disclose their personal details, such as: mobile phone number; email address.
  • the digitial doorbell system can be implemented at an entranceway without the need for dedicated doorbell hardware parts such as a transmitter and a receiver. Rather, the system allows a first user to implement a doorbell system at an entranceway by merely: disposing a unique identifier at the entranceway; and, operating a first computing device which executes the computer program, such as a smartphone. Additionally, the first user may also need to request access to the service (e.g. by paying a subscription fee).
  • the unique identifier can be delivered to the first user by physical mail (e.g. by letter), purchased in a store, or the first user may be able to print the unique identifier using a printer (e.g. such as a domestic printer).
  • a printer e.g. such as a domestic printer
  • the unique identifier may not require a power supply (e.g. batteries; mains power).
  • a power supply e.g. batteries; mains power.
  • the first user does not need to replace the batteries when they become flat.
  • the power supply comprises mains power
  • the first user does not require an electrician to safely fit the doorbell system.
  • the system may permit a first user to be notified of a second user at the entranceway via the first computing device.
  • the first user may receive notifications of a second user at the entranceway whereever the user may be.
  • the first user may receive notifications in situtations wherein they would miss notifications of traditional notifications such as a knock or a doorbell ringing.
  • a knock or doorbell tone are not heard by a first user or in situations when the first user is absent from the property.
  • the first user may be notified of a second user at the entranceway wherever the first user may be e.g. in the event that the first user is absent from the property the first user may receive a notification via the first computing device.
  • aspects of the disclosure described herein may increase the rate of successful deliveries e.g. because the first user may be more likely to be close to or operating the first computing device and therefore, may be more likely to be alerted by the system of a delivery worker at the entranceway.
  • the first user may select a time period when they do not receive notifications from the computer program. For example, the user may select the time period during which they typically sleep e.g. 2300hrs to 0700hrs.
  • the first user may select a preset response which is sent (e.g. from the server) to a second user in the event that a second user sends one or more messages from the second computing device (e.g. to the server).
  • the entranceway may selectively provide access to a selected portion of a property.
  • the entranceway may be switched between: a closed configuration which prevents entrance to the selected portion of the property via the entranceway; and, an open configuration which permits entrance to the selected portion of the property via the entranceway.
  • the entranceway may comprise an exterior door of a dwelling (e.g. a house or apartment) or an exterior door of a commercial property (e.g. an office) and the selected portion of the property may comprise the interior of the dwelling or commercial property.
  • a dwelling e.g. a house or apartment
  • a commercial property e.g. an office
  • the selected portion of the property may be a private part of a property or a shared part of a property.
  • a private part may be a part of a property which is owned or rented by a given person (or family).
  • a shared part may be a part of a property which is communal such as a shared entranceway which leads to a plurality of dwellings wherein each dwelling is owned or rented by a given person (or family).
  • Examples of shared parts of properties may be hallways and stairways (and elevators) in a block of flats.
  • the entranceway may comprise a gate of a property (e.g. such as an industrial property e.g. a delivery depot) and the selected portion of the property may comprise the entirety of the property.
  • a property e.g. such as an industrial property e.g. a delivery depot
  • a closed configuration of the exterior door may comprise any of : the exterior door is closed (e.g. the exterior door blocks all of the doorway); and, a locking mechanism of the exterior door is locked (e.g. the locking mechanism is in a configuration wherein actuation of the door is not permitted).
  • An open configuration of the exterior door may comprise any of : the exterior door is open (e.g. the exterior door does not block all of the doorway); and, a locking mechanism of the exterior door is unlocked (e.g. the locking mechanism is in a configuration wherein actuation of the door is permitted).
  • the entranceway may comprise a gate door at the border of a property and the selected portion of the property comprises the entire property.
  • Disposing a unique identifier at an entranceway may comprise: placing the unique identifier on the entranceway (e.g. on a door or on a gate of a property); or, placing the unique identifier on a wall adjacent the entranceway.
  • the unique identifier may be configured to direct the a computing device to a web page.
  • the unique identifier may be configured to direct a web browser of a computing device to a web page.
  • the unique identifier may represent or be associated with a specific URL unique to the unique identifier.
  • the unique identifier may be machine readable by a computing device e.g. a camera of the computing device may be configured to obtain an image of the unique identifier and a computer program executed on the computing device may be configured to obtain a URL represented by the unique identifier.
  • the unique identifier may be a quick response, QR, code.
  • QR codes are readily inputted into computing device.
  • the second computing device comprises a smartphone
  • many smartphones have a pre-installed or third party application which is capable of reading QR codes. Therefore, the inputting of the unique identifier into the second computing device may be performed quickly e.g. quickly in comparison to typing an alphanumeric string into the smartphone.
  • the unique identifier may be configured to prompt the second computing device to communicate with the server when the unique identifier is inputted into the second computing device by directing a browser on the second computing device to a unique resource locator, URL, wherein the URL is unique to the first user, and wherein the URL specifies a partition of the server.
  • a unique resource locator URL
  • configuring the unique identifier to prompt communication between the second computing device and the server of the digital doorbell system removes the need for the second user to have special software installed on the second computing device before visiting the property.
  • the unique identifier may be provided by means of a near radio frequency (RF) communication system i.e. the unique identifier may be received by the second computing device operated by the second user by means of a near radio frequency (RF) communication system.
  • RF near radio frequency
  • Near field RF (radio frequency) communication requires a pair of near RF communicators.
  • Each near RF communicators comprises an antenna.
  • the antenna of one near field RF communicator is provided within an alternating magnetic field (H field) generated by the antenna of the other near field RF communicator by transmission of an RF signal (for example a 13.56 Mega Hertz signal) to enable the magnetic field (H field) of the RF signal to be inductively coupled between the communicators.
  • an RF signal for example a 13.56 Mega Hertz signal
  • the RF signal may be modulated to enable communication of control and/or other data. Ranges of up to several centimetres (generally a maximum of 1 metre) are common for near field RF communicators.
  • the RF signal may comprise the unique identifier (i.e. the RF signal is modulated to comprise the unique identifier).
  • NFC Near field communication
  • RFID Radio Frequency Identification
  • the range of such devices depends on the antenna used but may be, for example, up to 1 metre.
  • Communication of data between NFC communicators may be via an active communication mode in which the NFC communicator transmits or generates an alternating magnetic field modulated with the data to be communicated and the receiving NFC communicator responds by transmitting or generating its own modulated magnetic field, or via a passive communication mode in which one NFC communicator transmits or generates an alternating magnetic field and maintains that field and the responding NFC communicator modulates the magnetic field to which it is inductively coupled with the data to be communicated, for example by modulating the load on the inductive coupling ("load modulation").
  • Near field RF communicators may be actively powered, that is have an internal or associated power source, or passively powered, that is derive a power supply from a received magnetic field. Generally an RF transceiver will be actively powered while an RF transponder may be passively or actively powered.
  • a first NFC communicator is disposed at the entranceway.
  • the first NFC communicator is configured to provide the unique identifier to the second computing device operated by the second user (e.g. a visitor to the property).
  • the second computing device may comprise a second NFC communicator (e.g. the second computing device may be a smartphone and the second NFC communicator is an integrated NFC communicator of the smartphone).
  • the second NFC communicator may be brought close to the first NFC communicator to thereby receive the unique identifier from the second NFC communicator.
  • the unique identifier is sent, by the second computing device, to a server, wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.
  • a first NFC communicator may be disposed at the entranceway.
  • the first NFC communicator is configured to provide a first unique identifier.
  • a second unique identifier which is a QR code.
  • the first unique identifier is received by the second computing device via NFC communication between the first NFC communicator and the second NFC communicator (i.e. the integrated NFC communicator of the second computing device.
  • the second unique identifier is received by the second computing device using a camera of the second computing device to obtain an image of the QR code (and executing a computer program executed on the second computing device to obtain the second unique identifier represented by the QR code).
  • the first unique identifier and the second unique identifier are compared for similarity e.g. a similarity comparison may be performed on the first unique identifier and the second unique identifier.
  • a similarity comparison may be performed locally at the second computing device e.g. the second computing device performs the similarity comparison.
  • the first unique identifier may be directly compared to the second unique identifier.
  • the second computing device may determine there is a similarity between the first unique identifier and the second unique identifier if the first unique identifier is identical to the second unique identifier.
  • a similarity comparison may be performed remotely from the second computing device.
  • the second computing device may send the first unique identifier and the second unique identifier to the server.
  • the similarity comparison may then be performed locally at the server.
  • the first unique identifier may be directly compared to the second unique identifier.
  • the server may determine there is a similarity between the first unique identifier and the second unique identifier if the first unique identifier is identical to the second unique identifier.
  • a similarity comparison may be performed remotely from the second computing device.
  • the second computing device may send the first unique identifier and the second unique identifier to the server.
  • the similarity comparison may then be performed locally at the server.
  • the server may store an association between pairs of unique identifiers wherein each pair of unique identifiers is associated with a particular first user.
  • the first unique identifier may be directly compared against the store associations. If a match is found between the received first unique identifier and a unique identifier in one of the pairs of unique identifiers stored at the server, then the received second unique identifier is compared to the other unique identifier. If the received first and second unique identifiers match a stored pair of unique identifiers then the server may determine there is a similarity between the first unique identifier and the second unique identifier.
  • any of the first computing device and the server is configured to: perform a similarity comparison of a first unique identifier and a second unique identifier to determine if there is a similarity between the first unique identifier and the second unique identifier; and, either: cease, sending packets to the first computing device from the server or, receiving packets from the server, if there is no similarity between first unique identifier and the second unique identifier; or, permit, packets to be sent from the server to the first computing device or, packets to be received by the first computing device from the server, if there is a similarity between the first unique identifier and the second unique identifier.
  • an entranceway unit may be provided.
  • the entranceway unit may comprise a first NFC communicator, for providing a first unique identifier; and, a QR code comprising a second unique identifier.
  • the first unique identifier and the second unique identifier may be compared for similarity as described herein.
  • a second user seeking to abuse the digital doorbell system by, for example, attempting to send a multitude of messages from the second computing device via the server to the first computing device may be prevented from doing so. Therefore, the first user is not subjected to an unwanted number of messages from the digital doorbell system.
  • the first computing device may execute a computer program configured to permit communication between the first computing device and the server.
  • the anonymous communication between the first computing device and the second computing device may comprise any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more preset packets to the second computing device from the server based on one or more packets sent to the server from the second computing device, wherein the one or more preset packets are selected by a first user.
  • the second user may be able to communicate anonymously with the first user - for example, without the need for the first user to divulge their personal details (e.g. phone number).
  • the second user may be able to communicate with the first user without physical interaction at the entranceway (e.g. no need to acutate a doorbell or knock upon a door), rather the second user operates a second computing device.
  • the second user may not need to touch anything on the property, therefore increasing the safety of the second user because they may be less likely to contract diseases e.g. there is no need to touch surfaces (which may harbour pathogens) which may be touched by many other visitors to a property.
  • the first user may be able to communicate with the second user without the need for the first user to travel to the entranceway to speak to the second user.
  • the first user may be able to send a message to the second user which instructs the second user to perform an action e.g. instructing the second user to leave a parcel in a particular location; or e.g. instructing the second user to wait for the first user to travel to the entranceway so that the first user and second user may interact directly at the entranceway.
  • the first user may select a preset message packet which is sent from the server to a second user in the event that a second user sends one or more messages from the second computing device to the server.
  • the present message may instruct the second user to perform an action e.g. instructing the second user to leave a parcel in a particular location; or, e.g. instructing the second user to return to the entranceway at a later time when the first user is available to answer the door.
  • instructions may be provided to the second user without real-time input of the first user.
  • the server may be configured to: request a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; compare: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of: the entranceway; and, the unique identifier; and, the server is configured to: prevent packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
  • a second user seeking to abuse the digital doorbell system by, for example, inputting a copy of the unique identifier into the second computing device at a location remote from the entranceway may be prevented from causing messages to be sent from the server to the first computing device.
  • the location datum and the live location information may each be indicative of a location on the earth’s surface.
  • the location datum and the live location information may each comprise geographic coordinates such as longitude and latitude.
  • the second computing device is configured to obtain the live location information e.g. using global positioning system (GPS).
  • the comparison between the live location information and the location datum may comprise calculating a distance between the location on the earth’s surface indicated by each of the live location information and the location datum to obtain a calculated difference distance.
  • the calculated distance between the locations indicated in the live location information and the location datum may be compared to a selected allowable difference distance.
  • the location datum and the live location information are considered to be similar e.g. a similarity between the location datum and the live location information is determined. In the same examples, if the calculated difference distance is greater than the selected allowable distance, then the location datum and the live location information are considered to be dissimilar e.g. a dissimilarity between the location datum and the live location information is determined.
  • the location datum and the live location information are considered to be similar e.g. a similarity between the location datum and the live location information is determined.
  • the location datum and the live location information are considered to be dissimilar e.g. a dissimilarity between the location datum and the live location information is determined.
  • the selected allowable distance may be any of 1 meter, 2 meters, 3 meters, 4 meters, 5 meters, or 10 meters.
  • the location datum may comprise an area, for example, an area delimited by lines connecting a plurality of location points e.g. geofencing. If the live location information corresponds to a point within the area of the location datum, then it may be determined that there is a similarity between the location datum and the live location information. If the live location information corresponds to a point outside of the area of the location datum, then it may be determined that there is a dissimilarity between the location datum and the live location information.
  • the digital doorbell system may be configured to switch the entranceway from a closed configuration to an open configuration.
  • the entranceway may comprise a lock (e.g. a smartlock) which is switchable from a closed configuration (e.g. configured to prevent access to the property via the entranceway) to an open configuration (e.g. configured to permit access to the property via the entranceway).
  • a lock e.g. a smartlock
  • Any of the first computing device and the server may be configured to: send an open request to the entranceway in response based on an open request sent from the first computing device, wherein the entranceway is configured to receive an open request, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
  • a smartlock may be a lock which is remotely switchable from a closed configuration to an open configuration e.g. the smartlock may be connected to an internet access point (e.g. a router in the property) and a signal (e.g. an open request) instructing the smart lock to switch from a closed configuration to an open configuration may be sent via the internet access point from either the server or a first computing device.
  • the smartlock may be configured to receive open requests.
  • the smartlock may be configured to switch from a closed configuration to an open configuration when the smartlock receives an open request.
  • the first user may be able to provide access to the entranceway without needing to travel to the entranceway and manually providing access therethrough.
  • At least one of the messages sent from the second computing device may comprise a second user identifier, wherein the second user identifier is unique to a single second user or group of second users.
  • the group of second users may belong to a selected group.
  • the group may be defined by the first user and the group may comprise “trusted” second users.
  • the group may be defined by the server and the group may comprise “authenticated” second users e.g. members of a specific delivery company.
  • the first user may be able to learn the identity of the second user without needing to be present at the entranceway e.g. the first user can avoid the need to switch the entranceway from a closed configuration to an open configuration in order to identify the second user; or, e.g. travel to the entranceway and use a peephole (also known as a door viewer) in order to identify the second user.
  • it may be advantageous to learn the identity of the second user without needing to be present at the entranceway, for example, if the second user is a person the first user would not like to provide access to, thereby avoiding the need for a confrontation between the first user and the second user.
  • the server may store a list of “authenticated” and/or “trusted” second users.
  • Authenticated second users may comprise second users employed by delivery companies. Trusted second users may be selected by the first user and may comprise family members and friends of the first users.
  • the list of “authenticated” and/or “trusted” second users may comprise a list of the second user identifiers of the second computing device of those users.
  • a communication request may be sent from a second computing device to the server, the communication request comprising a second user identifier.
  • the server may be configured to determine if the list of “authenticated” and/or “trusted” second users comprises the second user identifier.
  • a notification is sent from the server to the first computing device.
  • the notification comprises the second user identifier thereby identifying the second user to the first user e.g. “family member A is at the door” or “member of delivery company B is at the door”.
  • such notifications may be sent to the first user even if a “do not disturb” setting is in an “ON” state (described herein).
  • Any of the first computing device and the server is configured to: record the number of packets sent from the second computing device during a first selected period of time; determine if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; cease, sending packets to the first computing device from the server or receiving packets from the server, for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
  • a second user seeking to abuse the digital doorbell system by, for example, attempting to send a multitude of messages from the second computing device via the server to the first computing device may be prevented from doing so. Therefore, the first user is not subjected to an unwanted number of messages from the digital doorbell system.
  • Any of the server, first computing device and the second computing device may be configured to store any of : messages sent from the first computing device to the server; messages sent from the second computing device to the server; messages sent from the server to the first computing device; and, messages sent from the server to the second computing device.
  • the store of messages may be used as evidence of communications at the entranceway via the digital doorbell system.
  • a first user could show that a delivery person had not called at the entranceway using the system to prove that a parcel had not been delivered.
  • An aspect of the disclosure provides a method for permitting a second user operating a second computing device to communicate with a first user operating a first computing device, wherein the first user controls access to an entrance way; the method comprising : receiving, by the second computing device, a unique identifier disposed at the entranceway; sending, by the second computing device, a communication request comprising the unique identifier to a server to communicate anonymously with the first user operating the first computing device via the server.
  • the method may further comprise: receiving, by the second computing device, one or more packets from the first computing device via the server.
  • An aspect of the disclosure provides a method for permitting communication between a first user operating a first computing device and a second user operating a second computing device wishing to communicate with the first user, wherein the first user controls access to an entranceway; the method comprising: receiving, by the first computing device, a communication request from a server, wherein the communication request is based on a unique identifierdisposed at the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; sending, by the first computing device, a response to the communication request to the server to communicate with the second user operating the second communication device.
  • An aspect of the disclosure provides a system for digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein at least one of: the first computing device performs one of the methods described above; and, the second computing device performs one of the methods described above.
  • An aspect of the disclosure provides a computer program for a first computing device in a digital doorbell system, wherein the digital doorbell system is configured to permit communication, via a server, between: a first user operating the first computing device, wherein the first user controls access to an entrance way; and, a second user operating a second computing device wishing to communicate with the first user; wherein the computer program is configured to: receive a communication request from the server, wherein the communication request is based on a unique identifier located proximate to the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; send a response to the request to the server to communicate with the second user operating the second communication device.
  • the communication request received from the server may be based on one or more packets sent to the server by the second computing device.
  • Any of the communication request and the response comprise one or more packets.
  • An aspect of the disclosure provides a method of permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entranceway, wherein a unique identifier is disposed at the entranceway; and, a second user operating a second computing device and wishing to communicate with the first user; the method comprising: receiving a unique identifier, wherein the unique identifier is unique to the first user; identifying a first computing device based on the unique identifier; permitting anonymous communication between the first computing device and the second computing device via a server.
  • An aspect of the disclosure provides a server configured to perform the preceding method.
  • the first computing device executes a computer program configured to permit communication between the first computing device and the server.
  • the anonymous communication between the first computing device and the second computing device may comprise any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the second computing device.
  • the anonymous communication between the first computing device and the second computing device may comprise: requesting a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; comparing: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of : the entranceway; and, the unique identifier; and, preventing the one or more packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
  • the method may further comprise: sending an open request to the entranceway in response based on an open request sent from the first computing device; wherein: the entranceway is configured to receive an open request; and, switching, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
  • the method may further comprise: recording the number of packets sent from the second computing device during a first selected period of time; determining if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; ceasing to send one or more packets to the first computing device for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
  • requests may comprise one or more packets sent from one device to another (e.g. second computing device to server; server to first computing device; first computing device to server; server to second computing device).
  • response may comprise one or more packets sent from one device to another (e.g. second computing device to server; server to first computing device; first computing device to server; server to second computing device).
  • the notation “2-S” may refer to a request, response or packet set from the second computing device to the server.
  • the notation “S-1” may refer to a request, response or packet set from the server to the first computing device.
  • the notation “1-S” may refer to a request, response or packet set from the first computing device to the server.
  • S-2 may refer to a request, response or packet set from the server to the second computing device.
  • first user may be referred to as a “resident” and the second user may be referred to as a “visitor”.
  • a computing device may comprise any of: a smartphone; a tablet computer; a laptop computer; a desktop computer; and a smart speaker.
  • notifications and/or options may be spoken aloud by the speaker (e.g. the smart speaker may be configured to play words indicative of the notifications and/or options via a speaker).
  • a user may speak aloud a command to thereby select one of the options or to, for example, dictate a text message to be sent to the other user (e.g. the smart speaker may be configured to receive an input via a microphone).
  • a smart speaker may be used in conjunction with another computing device e.g. a smartphone.
  • the first user may use both a smart speaker and a smartphone as first computing devices.
  • the first user may use either the smart speaker or the smartphone to receive notifications and/or communicate with the second user via the server e.g. depending on which of the smart speaker and the smartphone the first user considers most convenient.
  • Smartphones may also be configured to operate in the same manner as a smart speaker e.g. by use of a “voice assistant”.
  • An aspect of the disclosure provides a method of identifying the contents of a parcel, the method comprising: providing a parcel unique identifier on a parcel; storing, at an association storage location (e.g. a server), an association between a parcel unique identifier disposed on the parcel and a label of the contents of the parcel; wherein the label associated with the parcel unique identifier is obtainable by the receipent of the parcel, by sending a request comprising the parcel unique identifier to the association storage location and receiving in response the label associated with the parcel unique identifier to thereby permit identification of the contents of the parcel by the recipient.
  • an association storage location e.g. a server
  • An aspect of the disclosure provides a method of identifying the contents of a parcel comprising a parcel unique identifier disposed on the parcel, the method comprising: requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel, wherein the label is indicative of the contents of the parcel; receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
  • An aspect of the disclosure provides a method of identifying the contents of a parcel, the method comprising: providing a parcel unique identifier on a parcel; storing, at an association storage location (e.g. a server), an association between a parcel unique identifier disposed on the parcel and a label of the contents of the parcel; requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel , wherein the label is indicative of the contents of the parcel; receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
  • an association storage location e.g. a server
  • the recipient of a parcel can identify the contents of the parcel by requesting requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel, wherein the label is indicative of the contents of the parcel and then receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
  • embodiments of the above methods may prevent COD scams.
  • the recipient of the parcel may refuse to receive the parcel on the assumption that they did not order the parcel.
  • the recipient of the parcel can use the label associated with the parcel unique identifier received from the storage location to determine whether they wish to pay for and therefore receive the parcel (i.e. if the contents of the parcel comprise an item they are expecting) or to reject the parcel and not pay for it (i.e. if the contents of the parcel does not comprise an item they are expecting).
  • the label may also comprise further information to permit a recipient to verify that the parcel is an order which they have made.
  • the label may comprise at least one of : an indication of the contents of the parcel; the name of the recipient; the delivery address; the last four digits of the payment card.
  • the parcel unique identifier may comprise a QR code.
  • Allowing the recipient to use the parcel unique identifier to receive a label associated with the unique identifier received from the storage location may prevent scammers recycling a legitimately generated parcel unique identifier.
  • An aspect of the disclosure provides a computer-implemented method of generating a parcel unique identifier, the method comprising: receiving, at a server from a client system, a client identifier identifying the client system; generating, at the server, based on the client identifier, a parcel unique identifier.
  • the step of generating a parcel unique identifier is initiated upon receipt of an initiation request from the client system.
  • the initiation request may derive from the client system receiving an input such as a mouse clicking on a graphic element displayed on the client computer (e.g. an on-screen button).
  • the computer-implemented method further comprises: receiving, at a server from a client system, a client order request identifying a product or service which the operator of the client system requests delivered.
  • Figure 1 illustrates a schematic view of a digital doorbell system
  • Figure 2 illustrates a schematic view of a first type of signal exchange between a second computing device, a server and a first computing device of the digital doorbell system shown in Figure 1 ;
  • Figure 3 illustrates a schematic view of a second type of signal exchange between a first computing device, a server and a second computing device of the digital doorbell system shown in Figure 1 ;
  • Figure 4 illustrates a schematic view of a first type of signal exchange between a second computing device and a server of the digital doorbell system shown in Figure 1 ;
  • Figure 5 illustrates a schematic view of a a digital doorbell system.
  • FIG. 1 illustrates a schematic view of a digital doorbell system 100.
  • the digital doorbell system comprises: a computer program executed by a first computing device 101 ; a second computing device 102; a unique identifier 105; and, a server 107.
  • a first user operates a first computing device 101.
  • the computer program comprises software.
  • a second user operates a second computing device 102.
  • the unique identifier 105 is disposed at an entranceway.
  • the first user controls access to an entranceway.
  • the entranceway may comprise: an exterior door of a dwelling (e.g. a house or apartment) ; an exterior door of a commercial property (e.g. an office); or, a gate (e.g. of an industrial property such as a delivery depot).
  • Disposing the unique identifier at an entranceway may comprise: placing the unique identifier on the entranceway; or, placing the unique identifier on a wall adjacent the entranceway.
  • the unique identifier 105 is inputted into the second computing device 102.
  • the first computing device 101 connects to the server 107.
  • the second computing device 102 connects to the server 107.
  • the computer program is configured to receive the unique identifier 105 disposed at the entranceway via the second computing device 102.
  • the unique identifier 105 is configured to be input into the second computing device 102.
  • the unique identifier 105 is configured to identify the first computing device e.g. the unqiue identifier is unique to the first computing device.
  • each unique identifier is configured to identify one of the plurality of first users e.g. each unique identifier is unique to one of the plurality of first users.
  • Each of the unique identifiers may be associated with the first computing device of each first user.
  • the each of the unique idenitfiers may be associated with a hardware identifier of the first computing device of each first user (e.g. a Media Access Control (MAC) address).
  • MAC Media Access Control
  • the unique identifier of the given user is associated with each of the first computing devices of the given first user e.g. the unique idenitifer of the given first user is associated with a hardware identifier of each of the first computing devices of the given first.
  • first user A In an example with three first users, first user A, first user B, and first user C which operate, first computing device A, first computing device B, and, first computing device C respectively.
  • first computing device A There are three unique identifiers, unique identifier A, unique identifier B and, unique identifier C which correspond to, first user A, first user B, and first user C respectively.
  • the unique identifier A is associated with first computing device A.
  • the unique identifier B is associated with first computing device B.
  • the unique identifier C is associated with first computing device C.
  • a given first user may wish to use the digital doorbell system with a variety of first computing devices commonly operated by the given first user (e.g. primary first computing device X1 and secondary first computing device X2).
  • first computing devices commonly operated by the given first user
  • the first user X may operate a primary first computing device X1 (e.g. the primary first computing device X1 may be a tablet computer), and when absent fromthe property, the first user X may operate a secondary first computing device X2 (e.g. a smartphone).
  • Unique identifier Y is associated with both the primary first computing device X1 and the secondary first computing device X2.
  • the first user X may receive messages from the server on both the primary first computing device X1 and the secondary first computing device X2.
  • the first user X may toggle which first computing device receives messages from the server e.g. the first user may send a toggle setting request from one of the first computing devices X1 , X2, which identifies which of the first computing devices X1 , X2, to which the server should send messages.
  • a single unique identifier K may be associated to one or more computing devices from a shared property e.g. family members of a single household. Each person in the shared property may associate their own computing device (e.g. first computing devices which they operate) to the unique identifier K.
  • a list of computing device identifiers e.g. unique hardware identifiers of the computing devices
  • the list of computing device identifiers may be associated to the single unique identifier K may be stored on the server of the digital doorbell system.
  • more than one user e.g. person in a single household
  • a single unique identifier L may be associated with one or more first users from a divided property e.g. the property is divided into sub-properties such as apartments or offices.
  • residents of each sub-property e.g. residents of each apartment
  • sub-property identifier e.g an address such as an apartment number
  • a list of computing device identifiers e.g. unique hardware identifiers of the computing devices
  • the sub-property identifier is associated to the single unique identifier L. The list may be stored on the server of the digital doorbell system.
  • a visitor to the property would obtain the unique identifier L at the entranceway of the divided property and subsequently would be prompted to select a sub-property to notify e.g. select the apartment number which the visitor would like to contact. Once a selection is made, the system notifies one or more computing devices associated with the subproperty and unique identifier L of the visitor’s presence at the entranceway.
  • an address database comprising a list of the unique idenitifers and the first computing devices associated with each unique identifier.
  • the address database may be accessible by the server (e.g. the address database may be stored on the server).
  • the unique identifier may be input into the second computing device by a camera of the second computing device e.g. the camera of the second computing device captures an image of the unique identifier.
  • the image of the unique identifier is received (e.g. input) by the second computing device 102.
  • the unique identifier may be a Quick Response (QR) code.
  • the second computing device 102 is configured to send the unique idenitifer 105 to the server 107.
  • the second computing device 102 is configured to send a communication request, comprising the unique identifier, to the server 107, to communicate anonymously via the server with the first user operating the first computing device 101 .
  • the server 107 stores a database, the database comprising a list of unique identifiers and indentifiers of the first computing devices e.g. an address database as described herein.
  • receiving the unique identifier by the second device may prompt the second computing device to communicate with the server when the unique identifier is inputted into the second computing device.
  • inputting the unique identifer into the second computing device directs a browser on the second computing device to a unique resource locator, URL, wherein the URL is unique to the first user, and wherein the URL directs a communication request to the server.
  • the second computing device may automatically launch the browser when the unique identifier is input into the second computing device or alternatively, the second computing device may require an input from the second user to launch the browser at the URL associated with the unique identifier.
  • the first computing device 101 is configured to receive a communication request from the server 107.
  • the first computing device is configured to send one or more packets to the server.
  • the first computing device 101 In response to the communication request received by the first computing device 101 from the server 107, the first computing device 101 notifies the first user of the second user’s presence at the entranceway.
  • the first computing device 101 executes a computer program configured to receive the communication request and generate a notification to alert the first user of the second user’s presence at the entranceway.
  • Figure 2 illustrates a schematic view of a first type of signal exchange 200 between the second computing device 102, the server 107 and, a first computing device 101 of the digital doorbell system 100 of Figure 1.
  • the first type of signal exchange comprises: a 2-S packet 201 sent from the second computing device 102 to the server 107; and, a S-1 packet 202 sent from the server 107 to the first computing device 101.
  • the server 107 is configured to generate a S-1 packet 202 based on the 2-S packet 201 .
  • the 2-S packet 201 may comprise the whole of or part of any 2-S request or 2-S response described herein.
  • the S-1 packet 202 may comprise the whole of or part of any S-1 request or S-1 response described herein.
  • Figure 3 illustrates a schematic view of a second type of signal exchange 300 between the first computing device 101 , the server 107 and, a second computing device 102 of the digital doorbell system 100 of Figure 1.
  • the second type of signal exchange 300 comprises: a 1 -S packet 301 sent from the first computing device 101 to the server 107; and, a S-2 packet 302 sent from the server 107 to the second computing device 102.
  • the server 107 is configured to generate an S-2 packet 302 based on the 1 -S packet 301 .
  • the 1 -S packet 301 may comprise the whole of or part of any 1 -S request or 1 -S response described herein.
  • the S-2 packet 302 may comprise the whole of or part of any S-2 request or S-2 response described herein.
  • Figure 4 illustrates a schematic view of a third type of signal exchange 400 between the second computing device 102 and the server 107 of the digital doorbell system 100 of Figure 1 .
  • the third type of signal exchange 400 comprises: a 2-S packet 501 sent from the second computing device 102 to the server 107; and, an S-1 packet 502 sent from the server 107 to the second computing device 102.
  • the first user may preselect a packet to be sent from the server 107 to the second computing device 102.
  • the server 107 is configured to generate an S-2 packet 402 based on the 2-S packet 401 .
  • the 2-S packet 401 may comprise the whole of or part of any 2-S request or 2-S response described herein.
  • the S-2 packet 402 may comprise the whole of or part of any S-2 request or S-2 response described herein.
  • the first user may be unable to attend to the entranceway e.g. the first user may be absent from the property.
  • the first user may preset response to be sent from the server 107 to the second computing device 102 which states that the first user is absent from the property.
  • the preset response may state that any deliveries are to be delivered to a neighbouring property (e.g. a house a nextdoor to the property).
  • the first user may be unable to attend to the entranceway for a given period of time e.g. the first user may be asleep or may be shopping.
  • the first user may choose a preset response to be sent from the server 107 to the second computing device 102 which states that the first user is absent from the property until the expiration of the given period.
  • the preset response may state that the second user may revisit the property after the expiration of the given period.
  • FIG. 5 illustrates a schematic view of a digital doorbell system.
  • the digital doorbell system comprises: a computer program executed by a first computing device 501 ; a second computing device 502; a unique identifier 505; and, a server 507.
  • the second computing device 502 receives the unique identifier 505.
  • a second user operates the second computing device 502 to input the unique identifier 505 into the second computing device 502.
  • the first computing device 501 executes a computer program which permits communication between the first computing device 501 and the server 507.
  • the computer program is configured to send, from the first computing device 501 , 1 -S packets to the server 507.
  • the computer program is configured to receive, at the first computing device 501 , S-1 packets from the server 507.
  • the second computing device 502 is configured to send 2-S packets to the server 507.
  • the second computing device 502 is configured to receive S-2 packets from the server 507.
  • the unique identifier 505 is unique to a first user.
  • the unique identifier 505 represents a URL.
  • the unique identifier is configured to direct a web browser to a web page, in response to the URL being input into a web browser.
  • the web page comprises dynamic content.
  • the unique identifier is configured to be inputted into the second computing device e.g. the unique identifier is intellegible by the second user who inputs it into the second computing device or the unique identifier is directed readable by the hardware of the second computing device (e.g. a camera).
  • the unique identifier comprises a QR code.
  • the QR code may be replaced with another form of unique identifier e.g. the URL written in alphanumeric form.
  • the unique identifier comprising a QR code is inputted into the second computing device via a QR reader application executed by the second computing device.
  • the QR reader application uses a camera of the second computing device to capture an image of the QR code.
  • the image of the QR code is read by the QR reader application to recover the URL represented by the unique identifier.
  • the second computing device may be a smartphone wherein QR reader applications are either native to the operating system or are readily installed via an application repository.
  • the second computing device may not require special software to be installed as the functionality to read QR codes is native to many computing devices such as smartphones.
  • the second computing device 502 displays an option to launch a web browser of the second computing device at the URL represented by the unique identifier and the option to take no further action with regards to the URL.
  • the first computing device 501 is configured to receive inputs which are indicative of the first user’s choice of option.
  • the second computing device 502 is configured to receive inputs which are indicative of the second user’s choice of option.
  • the computing device may comprise a screen upon which options are displayed.
  • each option may have an associated distinct area of the screen (distinct in that the areas associated with different options to not overlap) wherein in the event that the user touches the touchscreen within the area associated option, then the computing device selects the option associated with that area of the touch screen i.e. the input is a touch in the area associated with the option.
  • each distinct area associated with an option may be referred to as a button.
  • Each option may comprises label such as text or symbols which enable to users to ascertain the option represented.
  • the second computing device 502 sends a 2-S communication request to the server 507.
  • the 2-S communication request packet comprises a request for the website stored at the URL represented by the unique identifier.
  • the 2-S communication request comprises one or more 2-S packets.
  • the server 507 is configured to receive the 2-S communication request.
  • the server 507 is configured to identify the first user associated with the unique identifier 505.
  • the server 507 is configured to identify one or more first computing devices 501 associated with the first user.
  • the server may store a database of first users and their associated first computing devices as described herein.
  • the server 507 receives a 2-S communication request, the server identifies the first user associated with the unique identifier 505.
  • the server 507 identifies the first user associated with the unique identifier 505
  • the server 507 identifies one or more first computing devices 501 associated with the identified first user.
  • the server 507 is configured to send a S-2 preset response (details described herein).
  • the S-2 present response may be customisable by the first user.
  • the server 507 sends a S-2 welcome response to the second computing device 502.
  • the S-2 welcome response comprises welcome options (a list of one or more options).
  • the S-2 welcome response may comprise information about the first user associated with the unique identifier 505.
  • the information about the first user may comprise a chosen display name (hereinafter CDN) of the first user.
  • the web browser of the second computing device 502 displays a web page comprising welcome options.
  • the welcome options comprise: a contact option; and, a terminate option.
  • the web page may comprise dynamic content.
  • an 2-S initiate request is sent from the second computing device to the server.
  • the 2-S initiate request comprises instructions for the server 505 to permit anonymous communication between the second computing device 502 and the first computing device 501 via the server 507.
  • the second computing device 502 terminates communication to the server 507.
  • the server 507 is configured to receive the 2-S inititate request.
  • the server 507 is configured to generate a S-1 initiate request based on the 2-S inititate request.
  • a S-1 initiate packet comprises one or more communication response options.
  • the communication response options comprise: one or more preset response option; and, a live-chat option.
  • the server 507 receives the 2-S initiate request, the server sends a S-1 initiate request to the first computing device 501 .
  • the server 507 immediately after the server 507sends a S-1 initiate request to the first computing device 501 , the server 507 begins a timer.
  • the server 507 is configured to run the timer until a selected response time has elapsed.
  • the server 507 has received a communication response from the first computing device 501 (e.g. one or more packets corresponding to one of the response options set out below), then an S-2 preset response is not sent from the server 507 to the second computing device 501 . If during the selected response time, the server 507 has not received a communication response from the first computing device 501 (e.g. one or more packets corresponding to one of the response options set out below), then an S-2 preset response (e.g. comprising a message informing the second user that the first user is unavailable) is sent from the server 507 to the second computing device 501.
  • a communication response from the first computing device 501 e.g. one or more packets corresponding to one of the response options set out below
  • the selected response time may be any of 10 seconds, 15 seconds or 20 seconds.
  • the computer program displays the communication response options.
  • the one or more preset response options comprise text phrases.
  • a preset response option e.g. comprising preset response X
  • a 1 -S preset response e.g. a 1 -S present response X comprising one or more packets
  • the server 507 receives a 1 -S preset response (e.g. 1 -S preset reponse X)
  • the server generates a S-2 preset response (e.g. 1 -S preset response X) based on the 1 -S preset response.
  • the server 507 receives a 1 -S preset response (e.g. 1 -S preset response X)
  • the server 507 sends a S-2 preset response (e.g. 1 -S preset response X) to the second computing device 502.
  • the preset message options may include any of : a message informing the second user that the first user is travelling to the entranceway e.g. “CND is on the way” displayed on the second computing device upon receipt of the S-2 preset response; a message informing the second user that the first user is unavailable e.g. “CND is not available right now” displayed on the second computing device upon receipt of the S-2 preset response.
  • the S-2 preset response further comprises a list of one or more unavailable options.
  • the unavailable options may comprise any of : a try again option; a leave message option; and an emergency option.
  • the web browser of the second computing device 502 displays a web page comprising the unavailable options.
  • the web page displayed on the web browser of the second computing device displays a text box configured to receive an input from the second user (e.g. text, numbers, symbols).
  • the second computing device 502 is configured to generate a 2-S leave message response comprising the composed message.
  • the second computing device 502 is configured to send the 2-S leave message response to the server 507.
  • the server 507 receives a 2-S leave message response from the second computing device, the server 507 is configured to generate an S-1 leave message response based on the 2-S leave message response. In the event that the server 507 receives a 2-S leave message response from the second computing device 502, the server 507 is configured to send an S-1 leave message response based on the 2-S leave message response to the first computing device 501 .
  • the computer program is configured to display the composed message on the first computing device 501 .
  • the web page displayed in the web browser begins an audio call between the second computing device 502 and the first computing device 501 , via the server 507.
  • a 1 -S start chat response is sent from the first computing device 501 to the server 507.
  • the first computing device is configured to: send chat messages from the first computing device 501 , via the server 507, to the second computing device 502; and, receive at the first computing device 501 chat messages from the second computing device 502, via the server 507.
  • the server 507 In the event that the server 507 receives a 1 -S start chat packet, the server generates a S-2 start chat packet. In the event that the server 507 receives a 1 -S start chat packet, the server sends a S-2 start chat packet to the second computing device 502.
  • the second computing device 502 is configured to: send chat messages fromthe second computing device 502, via the server 507, to the first computing device 501 ; and, receive chat messages fromthe first computing device 501 , via the server 507, to the second computing device 502.
  • Chat messages may comprise: text; numbers; symbols; and, images.
  • Chat messages may be composed by the first user via the computer program executed on the first computing device 501 . Chat message received by the first computing device 501 are displayed by the computing program. 1 -S response packets comprising the chat messages are sent from the first computing device 501 to the server 507. The server generates S-2 response packets comprising chat messages. The server 507 sends generated S-2 response packets comprising chat messages to the second computing device.
  • Chat messages may be composed by the second user via the web page in the web browser of the second computing device 502. Chat message received by the second computing device 502 are displayed on the web page displayed in the web browser.
  • 2-S response packets comprising the chat messages may be sent from the second computing device 502 to the server 507.
  • the server generates S-1 response packets comprising chat messages.
  • the server 507 sends generated S-1 response packets comprising chat messages to the first computing device 501 .
  • chat messages may comprise live video chat wherein video and/or audio are sent from each of the first and second computing devices via the server to the other computing thereby permitting live anonymous video and/or audio to be exchanged between the first user and the second user.
  • the computer program is configured to allow the first user operating the first computing device to select settings of the digital doorbell system.
  • the settings may comprise any of: a do not disturb setting; a require name setting; and, a display CDN setting.
  • Each of the settings is configured to be toggled between an “ON” state and an “OFF” state.
  • each setting In the “ON” state, each setting has the function set out below.
  • the “OFF” state the setting no longer performs the function performed in the “ON” state.
  • the first user is able to toggle each of the settings between the “ON” state and the “OFF” state via the computer program executed on the first computing device 501.
  • the user provides an input to the first computing device (e.g. presses a button on the first computing device) to indicate that a given setting (e.g. setting X) is to be toggled from one state to the other (e.g. toggled from the “OFF” state to the “ON” state or vice versa).
  • a 1 -S setting toggle request e.g. 1 -S setting X toggle request
  • the server is configured to receive 1 -S setting toggle request from the first computing device.
  • the server is configured to toggle the state of a setting based on a received 1 -S setting toggle request.
  • the state of the setting is stored at the server.
  • the do not disturb setting is configured to prevent packets being sent from the server 507 and the first computing device 501.
  • the server 507 reviews the state of the do not disturb setting stored at the server 507.
  • an S-2 preset message packet (a message informing the second user that the first user is unavailable) is sent from the server 507 to the second computing device 502.
  • an S-1 request packet is sent from the server 507 to the first computing device 501 (as described herein).
  • the first user may provide an override list to the server wherein the override list comprises one or more second user identifiers.
  • the override list comprises one or more second user identifiers.
  • the require name setting is configured to request the name of the second user.
  • the server upon receipt upon receipt of a 2-S communication request sent from the second computing device 502 to the server 507, the server reviews the state of the require name setting stored at the server. If the server 507 determines that the state of the require name setting stored at the server is the “ON” state, an S-2 name request is sent from the server 507 to the second computing device 502. If the server 507 determines that the state of the require name setting stored at the server is the “OFF” state then an S-1 request packet is sent from the server 507 to the first computing device 501 (as described herein).
  • the second computing device 502 displays an input field in the web page displayed on the web browser.
  • the second computing device 502 Upon inputting their name (e.g. “second user name”, SUN for short) into the input field the second computing device 502 sends a 2-S name response to the server 502.
  • the server 502 receives a 2-S name response from the second computing device 502, the server generates a S-1 name response.
  • the server 507 sends an S-1 name response to the first computing device 501.
  • the name message is displayed by the computer program operated by the first computing device 501 .
  • the name message comprises the name inputted into the second computing device 502 by the second user e.g. “SUN is at the door”.
  • the show CDN setting is configured to send the CDN from the server 507 to the second computing device 502.
  • the server upon receipt of a 2-S communication request sent from the second computing device 502 to the server 507, the server reviews the state of the show CDN setting stored at the server. If the server 507 determines that the state of the show CDN setting stored at the server is the “ON” state, an S-2 preset response (comprising the CDN of the first user) is sent from the server 507 to the second computing device 502. If the server 507 determines that the state of the show CDN setting stored at the server is the “OFF” state, the CDN is not included in any of the packets sent from the server 507 to the second computing device 502.
  • the server 502 may determine the state of each of the settings stored at the server in any order e.g. determine the state of the do not disturb setting first, then subsequently detemine the state of the request name setting, then subsequently determine the state of a show CDN setting or any permutation thereof.
  • the first user may have to select a setting to allow the emergency option (this setting may only be available if the first user has certain priviledges e.g. such as may granted upon payment of a suscription fee).
  • to select option X and the like are to be taken to mean “to provide an input (to a computing device) to indicating option X is to be pursued”.
  • a message packet may comprise information in addition to any messages in the packet e.g. the message may comprise an appropriate header to allow the message to be understood by the receiving device.
  • processors used in the computer system may be implemented with fixed logic such as assemblies of logic gates or programmable logic such as software and/or computer program instructions executed by a processor.
  • the computer system may comprise a central processing unit (CPU) and associated memory, connected to a graphics processing unit (GPU) and its associated memory.
  • CPU central processing unit
  • GPU graphics processing unit
  • programmable logic include programmable processors, programmable digital logic (e.g., a field programmable gate array (FPGA), a tensor processing unit (TPU), an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), an application specific integrated circuit (ASIC), or any other kind of digital logic, software, code, electronic instructions, flash memory, optical disks, CD-ROMs, DVD ROMs, magnetic or optical cards, other types of machine-readable mediums suitable for storing electronic instructions, or any suitable combination thereof.
  • Such data storage media may also provide the data store of the computer system (and any of the apparatus outlined herein).
  • Examples of near field RF communicators are defined in various standards for example ISO/IEC 18092 and ISO/IEC 21481 for NFC communicators, and ISO/IEC 14443 and ISO/IEC 15693 for near field RF communicators.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
  • Telephonic Communication Services (AREA)

Abstract

An aspect of the disclosure provides a digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein the second computing device is configured to: receive a unique identifier disposed at the entranceway, wherein the unique identifier is unique to the first user; and, send the unique identifier to a server; wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.

Description

Digital doorbell system and method
Technical Field
The present disclosure relates to the field of doorbells, in particular, a digital doorbell system and methods.
Background
Properties (e.g.: dwellings; work spaces) are typically accessible via an entranceway (e.g.: a door; gate). Often a visitor to the property may need to obtain the attention of an occupant of the property.
One means by which a visitor can obtain the attention of an occupant is to knock on the entranceway (e.g. using a fist or a knocker attached to the door) to produce a sound. If the occupant hears the sound produced by the knock, they may travel to the entranceway to interact with the visitor. However, if the occupant is not in the immediate vicinity of the entranceway, or there are noises inside the property (e.g. music being played etc.), then the occupant may not hear the knock and therefore, the visitor is unable to obtain the attention of the occupant.
Another means by which a visitor can obtain the attention of an occupant is to use a traditional doorbell system. Traditional doorbell systems comprise two parts of hardware: a transmitter part, usually disposed at an entranceway; and, a receiver part, usually disposed within a property. The transmitter part is actuated by the visitor which transmits a signal to the receiver. Upon receipt of the signal from the transmitter by the receiver, the receiver produces an audible tone.
If the occupant hears the audible tone produced by the receiver, they may travel to the entranceway to interact with the visitor. However, if the occupant is not in the vicinity of the receiver, or again if there are noises inside the property (e.g. music being played etc.), then the occupant may not hear the audible tone, and therefore, the visitor is unable to obtain the attention of the occupant.
The advantage a traditional doorbell system has over knocking on the entranceway is that an occupant may position the receiver close to a part of the property they spend a lot of their time in and therefore, are more likely to be near the receiver and hear the audible tone.
However, a disadvantage with both knocking and a traditional doorbell system is that these means may fail to notify a resident of a visitor in the event that the resident is absent from the property e.g. the visitor using these systems may fail to obtain the attention of the resident when the resident is remote from the property.
Another means by which a visitor can obtain the attention of an occupant is to use a video doorbell system. Video doorbell systems comprise the following hardware parts: a camera and microphone disposed at an entranceway; and, a receiver configured to display images captured by the camera and to play audio captured by the microphone.
In some examples, the receiver is fixed within the property and therefore a disadvantage with these apparatus is that they may fail to notify a resident of a visitor in the event that the resident is absent from the property e.g. the visitor using these systems may fail to obtain the attention of the resident when the resident is remote from the property.
In other examples, the receiver may be a smartphone which the resident may keep about their person. A disadvantage with these systems is that the hardware at the entranceway (e.g. camera and microphone) may be expensive compared to other doorbell systems (e.g. traditional doorbell systems or knocking). The hardware at the entranceway can become damaged or stolen and then required replacing, further adding to the expense of such systems.
When ordering online goods, sometimes there is an option for “cash-on-delivery” also known as COD. COD is where a customer orders an item to be delivered to their address. Upon delivery of a parcel containing the item by a delivery person, the customer is required to pay for the item before receiving and opening the parcel. The payment is given to the delivery person (e.g. using physical currency), who upon receipt of the payment hands the parcel to the customer. A disadvantage of COD is that it is open to abuse by scammers.
For example, scammers may pose as legitimate delivery drivers and deliver a parcel to a customer who is expecting an item to be delivered from a legitimate business. In such cases, the customer assumes that the parcel contains the item which they are expecting and pay the scammer posing as a delivery driver the sum of money required for the item they are expecting. In such cases, the scammer posing as a delivery driver leaves the customer before they realise that the contents of the parcel are not that which they were expecting.
For example, scammers may pose as legitimate businesses and receive an order for an item from a customer who indicates that they will pay COD. The scammers may then post an item of lower quality (or a completely different item altogether) to the customer. Upon delivery, the customer assumes that the parcel contains the item which they ordered from the scammers posing as a legitimate business. Therefore, the customer may assume that the item in the parcel is that which they ordered and will pay the delivery driver for the parcel. In this example, the deliver driver may be a legitimate deliver driver who is couriering unbeknownst to them, a fraudulent parcel.
Often there is little recourse to recover the payment handed over at delivery or often the amount paid is not worth the time and effort required to recover it.
Summary
Aspects of the disclosure are set out in the independent claims and optional features are set out in the dependent claims. Aspects of the disclosure may be provided in conjunction with each other, and features of one aspect may be applied to other aspects.
An aspect of the disclosure provides a digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein the second computing device is configured to: receive a unique identifier disposed at the entranceway, wherein the unique identifier is unique to the first user; and, send the unique identifier to a server; wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.
Advantageously, a first user and second user are able to use the digital doorbell system to communicate without the need of either the first user or the second user to disclose their personal details, such as: mobile phone number; email address.
Advantageously, the digitial doorbell system can be implemented at an entranceway without the need for dedicated doorbell hardware parts such as a transmitter and a receiver. Rather, the system allows a first user to implement a doorbell system at an entranceway by merely: disposing a unique identifier at the entranceway; and, operating a first computing device which executes the computer program, such as a smartphone. Additionally, the first user may also need to request access to the service (e.g. by paying a subscription fee).
The unique identifier can be delivered to the first user by physical mail (e.g. by letter), purchased in a store, or the first user may be able to print the unique identifier using a printer (e.g. such as a domestic printer).
The unique identifier may not require a power supply (e.g. batteries; mains power). Advantageously, in the case wherein the power supply comprises batteries, the first user does not need to replace the batteries when they become flat. Advantageuosly, in the case wherein the power supply comprises mains power, the first user does not require an electrician to safely fit the doorbell system.
The system may permit a first user to be notified of a second user at the entranceway via the first computing device.
Advantageously, the first user may receive notifications of a second user at the entranceway whereever the user may be. For example, the first user may receive notifications in situtations wherein they would miss notifications of traditional notifications such as a knock or a doorbell ringing. For example, in situations wherein a knock or doorbell tone are not heard by a first user or in situations when the first user is absent from the property.
In examples, wherein the computing device is a smartphone of the first user, the first user may be notified of a second user at the entranceway wherever the first user may be e.g. in the event that the first user is absent from the property the first user may receive a notification via the first computing device.
Therefore, aspects of the disclosure described herein may increase the rate of successful deliveries e.g. because the first user may be more likely to be close to or operating the first computing device and therefore, may be more likely to be alerted by the system of a delivery worker at the entranceway.
In examples, the first user may select a time period when they do not receive notifications from the computer program. For example, the user may select the time period during which they typically sleep e.g. 2300hrs to 0700hrs. The first user may select a preset response which is sent (e.g. from the server) to a second user in the event that a second user sends one or more messages from the second computing device (e.g. to the server).
The entranceway may selectively provide access to a selected portion of a property. The entranceway may be switched between: a closed configuration which prevents entrance to the selected portion of the property via the entranceway; and, an open configuration which permits entrance to the selected portion of the property via the entranceway.
In examples the entranceway may comprise an exterior door of a dwelling (e.g. a house or apartment) or an exterior door of a commercial property (e.g. an office) and the selected portion of the property may comprise the interior of the dwelling or commercial property.
The selected portion of the property may be a private part of a property or a shared part of a property. For example, a private part may be a part of a property which is owned or rented by a given person (or family).
For example, a shared part may be a part of a property which is communal such as a shared entranceway which leads to a plurality of dwellings wherein each dwelling is owned or rented by a given person (or family). Examples of shared parts of properties may be hallways and stairways (and elevators) in a block of flats.
In examples the entranceway may comprise a gate of a property (e.g. such as an industrial property e.g. a delivery depot) and the selected portion of the property may comprise the entirety of the property.
A closed configuration of the exterior door may comprise any of : the exterior door is closed (e.g. the exterior door blocks all of the doorway); and, a locking mechanism of the exterior door is locked (e.g. the locking mechanism is in a configuration wherein actuation of the door is not permitted).
An open configuration of the exterior door may comprise any of : the exterior door is open (e.g. the exterior door does not block all of the doorway); and, a locking mechanism of the exterior door is unlocked (e.g. the locking mechanism is in a configuration wherein actuation of the door is permitted).
In examples the entranceway may comprise a gate door at the border of a property and the selected portion of the property comprises the entire property.
Disposing a unique identifier at an entranceway may comprise: placing the unique identifier on the entranceway (e.g. on a door or on a gate of a property); or, placing the unique identifier on a wall adjacent the entranceway.
The unique identifier may be configured to direct the a computing device to a web page. The unique identifier may be configured to direct a web browser of a computing device to a web page. The unique identifier may represent or be associated with a specific URL unique to the unique identifier. The unique identifier may be machine readable by a computing device e.g. a camera of the computing device may be configured to obtain an image of the unique identifier and a computer program executed on the computing device may be configured to obtain a URL represented by the unique identifier.
In examples, the unique identifier may be a quick response, QR, code.
Advantageously, QR codes are readily inputted into computing device. In examples wherein the second computing device comprises a smartphone, many smartphones have a pre-installed or third party application which is capable of reading QR codes. Therefore, the inputting of the unique identifier into the second computing device may be performed quickly e.g. quickly in comparison to typing an alphanumeric string into the smartphone.
The unique identifier may configured to prompt the second computing device to communicate with the server when the unique identifier is inputted into the second computing device by directing a browser on the second computing device to a unique resource locator, URL, wherein the URL is unique to the first user, and wherein the URL specifies a partition of the server.
Advantageously, configuring the unique identifier to prompt communication between the second computing device and the server of the digital doorbell system removes the need for the second user to have special software installed on the second computing device before visiting the property.
In examples, the unique identifier may be provided by means of a near radio frequency (RF) communication system i.e. the unique identifier may be received by the second computing device operated by the second user by means of a near radio frequency (RF) communication system.
Near field RF (radio frequency) communication requires a pair of near RF communicators. Each near RF communicators comprises an antenna. To provide communication between two near RF communicators, the antenna of one near field RF communicator is provided within an alternating magnetic field (H field) generated by the antenna of the other near field RF communicator by transmission of an RF signal (for example a 13.56 Mega Hertz signal) to enable the magnetic field (H field) of the RF signal to be inductively coupled between the communicators.
The RF signal may be modulated to enable communication of control and/or other data. Ranges of up to several centimetres (generally a maximum of 1 metre) are common for near field RF communicators. In examples, the RF signal may comprise the unique identifier (i.e. the RF signal is modulated to comprise the unique identifier).
Near field communication (NFC) in the context of this application may be referred to as near-field RF communication, near field RFID (Radio Frequency Identification) or near field communication. The range of such devices depends on the antenna used but may be, for example, up to 1 metre.
Communication of data between NFC communicators may be via an active communication mode in which the NFC communicator transmits or generates an alternating magnetic field modulated with the data to be communicated and the receiving NFC communicator responds by transmitting or generating its own modulated magnetic field, or via a passive communication mode in which one NFC communicator transmits or generates an alternating magnetic field and maintains that field and the responding NFC communicator modulates the magnetic field to which it is inductively coupled with the data to be communicated, for example by modulating the load on the inductive coupling ("load modulation"). Near field RF communicators may be actively powered, that is have an internal or associated power source, or passively powered, that is derive a power supply from a received magnetic field. Generally an RF transceiver will be actively powered while an RF transponder may be passively or actively powered.
In examples, a first NFC communicator is disposed at the entranceway. The first NFC communicator is configured to provide the unique identifier to the second computing device operated by the second user (e.g. a visitor to the property). In such examples, the second computing device may comprise a second NFC communicator (e.g. the second computing device may be a smartphone and the second NFC communicator is an integrated NFC communicator of the smartphone). In such examples, the second NFC communicator may be brought close to the first NFC communicator to thereby receive the unique identifier from the second NFC communicator. The unique identifier is sent, by the second computing device, to a server, wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.
In examples, a first NFC communicator may be disposed at the entranceway. The first NFC communicator is configured to provide a first unique identifier. Also disposed at the doorway is a second unique identifier which is a QR code.
The first unique identifier is received by the second computing device via NFC communication between the first NFC communicator and the second NFC communicator (i.e. the integrated NFC communicator of the second computing device. The second unique identifier is received by the second computing device using a camera of the second computing device to obtain an image of the QR code (and executing a computer program executed on the second computing device to obtain the second unique identifier represented by the QR code).
The first unique identifier and the second unique identifier are compared for similarity e.g. a similarity comparison may be performed on the first unique identifier and the second unique identifier.
A similarity comparison may be performed locally at the second computing device e.g. the second computing device performs the similarity comparison. For example, the first unique identifier may be directly compared to the second unique identifier. The second computing device may determine there is a similarity between the first unique identifier and the second unique identifier if the first unique identifier is identical to the second unique identifier.
A similarity comparison may be performed remotely from the second computing device. In such examples, the second computing device may send the first unique identifier and the second unique identifier to the server. The similarity comparison may then be performed locally at the server. For example, the first unique identifier may be directly compared to the second unique identifier. The server may determine there is a similarity between the first unique identifier and the second unique identifier if the first unique identifier is identical to the second unique identifier.
A similarity comparison may be performed remotely from the second computing device. In such examples, the second computing device may send the first unique identifier and the second unique identifier to the server. The similarity comparison may then be performed locally at the server. For example, the server may store an association between pairs of unique identifiers wherein each pair of unique identifiers is associated with a particular first user. The first unique identifier may be directly compared against the store associations. If a match is found between the received first unique identifier and a unique identifier in one of the pairs of unique identifiers stored at the server, then the received second unique identifier is compared to the other unique identifier. If the received first and second unique identifiers match a stored pair of unique identifiers then the server may determine there is a similarity between the first unique identifier and the second unique identifier.
In examples, any of the first computing device and the server is configured to: perform a similarity comparison of a first unique identifier and a second unique identifier to determine if there is a similarity between the first unique identifier and the second unique identifier; and, either: cease, sending packets to the first computing device from the server or, receiving packets from the server, if there is no similarity between first unique identifier and the second unique identifier; or, permit, packets to be sent from the server to the first computing device or, packets to be received by the first computing device from the server, if there is a similarity between the first unique identifier and the second unique identifier.
In examples, an entranceway unit may be provided. The entranceway unit may comprise a first NFC communicator, for providing a first unique identifier; and, a QR code comprising a second unique identifier. The first unique identifier and the second unique identifier may be compared for similarity as described herein.
Advantageously, a second user seeking to abuse the digital doorbell system by, for example, attempting to send a multitude of messages from the second computing device via the server to the first computing device may be prevented from doing so. Therefore, the first user is not subjected to an unwanted number of messages from the digital doorbell system.
The first computing device may execute a computer program configured to permit communication between the first computing device and the server.
The anonymous communication between the first computing device and the second computing device may comprise any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more preset packets to the second computing device from the server based on one or more packets sent to the server from the second computing device, wherein the one or more preset packets are selected by a first user.
Advantageously, the second user may be able to communicate anonymously with the first user - for example, without the need for the first user to divulge their personal details (e.g. phone number).
The second user may be able to communicate with the first user without physical interaction at the entranceway (e.g. no need to acutate a doorbell or knock upon a door), rather the second user operates a second computing device. Advantageously, the second user may not need to touch anything on the property, therefore increasing the safety of the second user because they may be less likely to contract diseases e.g. there is no need to touch surfaces (which may harbour pathogens) which may be touched by many other visitors to a property.
Advantageously, the first user may be able to communicate with the second user without the need for the first user to travel to the entranceway to speak to the second user. For example, the first user may be able to send a message to the second user which instructs the second user to perform an action e.g. instructing the second user to leave a parcel in a particular location; or e.g. instructing the second user to wait for the first user to travel to the entranceway so that the first user and second user may interact directly at the entranceway.
For example, the first user may select a preset message packet which is sent from the server to a second user in the event that a second user sends one or more messages from the second computing device to the server. In examples, the present message may instruct the second user to perform an action e.g. instructing the second user to leave a parcel in a particular location; or, e.g. instructing the second user to return to the entranceway at a later time when the first user is available to answer the door.
Conveniently, instructions may be provided to the second user without real-time input of the first user.
The server may be configured to: request a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; compare: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of: the entranceway; and, the unique identifier; and, the server is configured to: prevent packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
Advantageously, a second user seeking to abuse the digital doorbell system by, for example, inputting a copy of the unique identifier into the second computing device at a location remote from the entranceway may be prevented from causing messages to be sent from the server to the first computing device.
The location datum and the live location information may each be indicative of a location on the earth’s surface. For example, the location datum and the live location information may each comprise geographic coordinates such as longitude and latitude.
In examples, the second computing device is configured to obtain the live location information e.g. using global positioning system (GPS). The comparison between the live location information and the location datum may comprise calculating a distance between the location on the earth’s surface indicated by each of the live location information and the location datum to obtain a calculated difference distance.
The calculated distance between the locations indicated in the live location information and the location datum may be compared to a selected allowable difference distance.
In some examples, if the calculated difference distance is less than or equal to the selected allowable distance, then the location datum and the live location information are considered to be similar e.g. a similarity between the location datum and the live location information is determined. In the same examples, if the calculated difference distance is greater than the selected allowable distance, then the location datum and the live location information are considered to be dissimilar e.g. a dissimilarity between the location datum and the live location information is determined.
In other examples, if the calculated difference distance is less than the selected allowable distance, then the location datum and the live location information are considered to be similar e.g. a similarity between the location datum and the live location information is determined. In the same examples, if the calculated difference distance is greater than or equal to the selected allowable distance, then the location datum and the live location information are considered to be dissimilar e.g. a dissimilarity between the location datum and the live location information is determined.
In examples, the selected allowable distance may be any of 1 meter, 2 meters, 3 meters, 4 meters, 5 meters, or 10 meters.
The location datum may comprise an area, for example, an area delimited by lines connecting a plurality of location points e.g. geofencing. If the live location information corresponds to a point within the area of the location datum, then it may be determined that there is a similarity between the location datum and the live location information. If the live location information corresponds to a point outside of the area of the location datum, then it may be determined that there is a dissimilarity between the location datum and the live location information.
In examples, the digital doorbell system may be configured to switch the entranceway from a closed configuration to an open configuration. The entranceway may comprise a lock (e.g. a smartlock) which is switchable from a closed configuration (e.g. configured to prevent access to the property via the entranceway) to an open configuration (e.g. configured to permit access to the property via the entranceway).
Any of the first computing device and the server may be configured to: send an open request to the entranceway in response based on an open request sent from the first computing device, wherein the entranceway is configured to receive an open request, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
Herein a smartlock may be a lock which is remotely switchable from a closed configuration to an open configuration e.g. the smartlock may be connected to an internet access point (e.g. a router in the property) and a signal (e.g. an open request) instructing the smart lock to switch from a closed configuration to an open configuration may be sent via the internet access point from either the server or a first computing device. The smartlock may be configured to receive open requests. The smartlock may be configured to switch from a closed configuration to an open configuration when the smartlock receives an open request.
Advantageously, the first user may be able to provide access to the entranceway without needing to travel to the entranceway and manually providing access therethrough.
At least one of the messages sent from the second computing device may comprise a second user identifier, wherein the second user identifier is unique to a single second user or group of second users.
In examples wherein the second user idenitifer is unique to a group of second users, the group of second users may belong to a selected group. For example, the group may be defined by the first user and the group may comprise “trusted” second users. For example, the group may be defined by the server and the group may comprise “authenticated” second users e.g. members of a specific delivery company.
Conveniently, the first user may be able to learn the identity of the second user without needing to be present at the entranceway e.g. the first user can avoid the need to switch the entranceway from a closed configuration to an open configuration in order to identify the second user; or, e.g. travel to the entranceway and use a peephole (also known as a door viewer) in order to identify the second user. In some examples, it may be advantageous to learn the identity of the second user without needing to be present at the entranceway, for example, if the second user is a person the first user would not like to provide access to, thereby avoiding the need for a confrontation between the first user and the second user.
In examples, the server may store a list of “authenticated” and/or “trusted” second users. Authenticated second users may comprise second users employed by delivery companies. Trusted second users may be selected by the first user and may comprise family members and friends of the first users. The list of “authenticated” and/or “trusted” second users may comprise a list of the second user identifiers of the second computing device of those users.
In examples, a communication request may be sent from a second computing device to the server, the communication request comprising a second user identifier. The server may be configured to determine if the list of “authenticated” and/or “trusted” second users comprises the second user identifier.
In the event that the list of “authenticated” and/or “trusted” second users comprises the second user identifier, a notification is sent from the server to the first computing device. The notification comprises the second user identifier thereby identifying the second user to the first user e.g. “family member A is at the door” or “member of delivery company B is at the door”. In examples, such notifications may be sent to the first user even if a “do not disturb” setting is in an “ON” state (described herein). Any of the first computing device and the server is configured to: record the number of packets sent from the second computing device during a first selected period of time; determine if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; cease, sending packets to the first computing device from the server or receiving packets from the server, for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
Advantageously, a second user seeking to abuse the digital doorbell system by, for example, attempting to send a multitude of messages from the second computing device via the server to the first computing device may be prevented from doing so. Therefore, the first user is not subjected to an unwanted number of messages from the digital doorbell system.
Any of the server, first computing device and the second computing device may be configured to store any of : messages sent from the first computing device to the server; messages sent from the second computing device to the server; messages sent from the server to the first computing device; and, messages sent from the server to the second computing device.
Advantageously, the store of messages may be used as evidence of communications at the entranceway via the digital doorbell system. For example, a first user could show that a delivery person had not called at the entranceway using the system to prove that a parcel had not been delivered.
An aspect of the disclosure provides a method for permitting a second user operating a second computing device to communicate with a first user operating a first computing device, wherein the first user controls access to an entrance way; the method comprising : receiving, by the second computing device, a unique identifier disposed at the entranceway; sending, by the second computing device, a communication request comprising the unique identifier to a server to communicate anonymously with the first user operating the first computing device via the server. The method may further comprise: receiving, by the second computing device, one or more packets from the first computing device via the server.
An aspect of the disclosure provides a method for permitting communication between a first user operating a first computing device and a second user operating a second computing device wishing to communicate with the first user, wherein the first user controls access to an entranceway; the method comprising: receiving, by the first computing device, a communication request from a server, wherein the communication request is based on a unique identifierdisposed at the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; sending, by the first computing device, a response to the communication request to the server to communicate with the second user operating the second communication device.
An aspect of the disclosure provides a system for digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein at least one of: the first computing device performs one of the methods described above; and, the second computing device performs one of the methods described above.
An aspect of the disclosure provides a computer program for a first computing device in a digital doorbell system, wherein the digital doorbell system is configured to permit communication, via a server, between: a first user operating the first computing device, wherein the first user controls access to an entrance way; and, a second user operating a second computing device wishing to communicate with the first user; wherein the computer program is configured to: receive a communication request from the server, wherein the communication request is based on a unique identifier located proximate to the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; send a response to the request to the server to communicate with the second user operating the second communication device. The communication request received from the server may be based on one or more packets sent to the server by the second computing device.
Any of the communication request and the response comprise one or more packets.
An aspect of the disclosure provides a method of permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entranceway, wherein a unique identifier is disposed at the entranceway; and, a second user operating a second computing device and wishing to communicate with the first user; the method comprising: receiving a unique identifier, wherein the unique identifier is unique to the first user; identifying a first computing device based on the unique identifier; permitting anonymous communication between the first computing device and the second computing device via a server.
An aspect of the disclosure provides a server configured to perform the preceding method.
The first computing device executes a computer program configured to permit communication between the first computing device and the server.
The anonymous communication between the first computing device and the second computing device may comprise any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the second computing device.
The anonymous communication between the first computing device and the second computing device may comprise: requesting a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; comparing: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of : the entranceway; and, the unique identifier; and, preventing the one or more packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
The method may further comprise: sending an open request to the entranceway in response based on an open request sent from the first computing device; wherein: the entranceway is configured to receive an open request; and, switching, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
The method may further comprise: recording the number of packets sent from the second computing device during a first selected period of time; determining if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; ceasing to send one or more packets to the first computing device for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
Herein, “requests” may comprise one or more packets sent from one device to another (e.g. second computing device to server; server to first computing device; first computing device to server; server to second computing device).
Herein, “responses” may comprise one or more packets sent from one device to another (e.g. second computing device to server; server to first computing device; first computing device to server; server to second computing device).
Herein, the notation “2-S” may refer to a request, response or packet set from the second computing device to the server.
Herein, the notation “S-1” may refer to a request, response or packet set from the server to the first computing device. Herein, the notation “1-S” may refer to a request, response or packet set from the first computing device to the server.
Herein, the notation “S-2” may refer to a request, response or packet set from the server to the second computing device.
Herein the first user may be referred to as a “resident” and the second user may be referred to as a “visitor”.
In examples, a computing device may comprise any of: a smartphone; a tablet computer; a laptop computer; a desktop computer; and a smart speaker.
In examples wherein a computing device comprises a smart speaker, notifications and/or options may be spoken aloud by the speaker (e.g. the smart speaker may be configured to play words indicative of the notifications and/or options via a speaker). In response to the options, a user may speak aloud a command to thereby select one of the options or to, for example, dictate a text message to be sent to the other user (e.g. the smart speaker may be configured to receive an input via a microphone).
In examples a smart speaker may be used in conjunction with another computing device e.g. a smartphone. For example, the first user may use both a smart speaker and a smartphone as first computing devices. The first user may use either the smart speaker or the smartphone to receive notifications and/or communicate with the second user via the server e.g. depending on which of the smart speaker and the smartphone the first user considers most convenient.
Smartphones may also be configured to operate in the same manner as a smart speaker e.g. by use of a “voice assistant”.
An aspect of the disclosure provides a method of identifying the contents of a parcel, the method comprising: providing a parcel unique identifier on a parcel; storing, at an association storage location (e.g. a server), an association between a parcel unique identifier disposed on the parcel and a label of the contents of the parcel; wherein the label associated with the parcel unique identifier is obtainable by the receipent of the parcel, by sending a request comprising the parcel unique identifier to the association storage location and receiving in response the label associated with the parcel unique identifier to thereby permit identification of the contents of the parcel by the recipient.
An aspect of the disclosure provides a method of identifying the contents of a parcel comprising a parcel unique identifier disposed on the parcel, the method comprising: requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel, wherein the label is indicative of the contents of the parcel; receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
An aspect of the disclosure provides a method of identifying the contents of a parcel, the method comprising: providing a parcel unique identifier on a parcel; storing, at an association storage location (e.g. a server), an association between a parcel unique identifier disposed on the parcel and a label of the contents of the parcel; requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel , wherein the label is indicative of the contents of the parcel; receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
In examples, the recipient of a parcel can identify the contents of the parcel by requesting requesting, from an association storage location, a label associated with the parcel unique identifier disposed on the parcel, wherein the label is indicative of the contents of the parcel and then receiving, from the association storage location, the label associated with the parcel unique identifier to thereby permit the recipient of the parcel to identify the contents of the parcel.
Advantageously, embodiments of the above methods may prevent COD scams.
If the parcel does not comprise the parcel unique identifier then the recipient of the parcel may refuse to receive the parcel on the assumption that they did not order the parcel.
The recipient of the parcel can use the label associated with the parcel unique identifier received from the storage location to determine whether they wish to pay for and therefore receive the parcel (i.e. if the contents of the parcel comprise an item they are expecting) or to reject the parcel and not pay for it (i.e. if the contents of the parcel does not comprise an item they are expecting).
The label may also comprise further information to permit a recipient to verify that the parcel is an order which they have made. For example, the label may comprise at least one of : an indication of the contents of the parcel; the name of the recipient; the delivery address; the last four digits of the payment card.
The parcel unique identifier may comprise a QR code.
Allowing the recipient to use the parcel unique identifier to receive a label associated with the unique identifier received from the storage location may prevent scammers recycling a legitimately generated parcel unique identifier.
An aspect of the disclosure provides a computer-implemented method of generating a parcel unique identifier, the method comprising: receiving, at a server from a client system, a client identifier identifying the client system; generating, at the server, based on the client identifier, a parcel unique identifier.
In examples, the step of generating a parcel unique identifier is initiated upon receipt of an initiation request from the client system. For example, the initiation request may derive from the client system receiving an input such as a mouse clicking on a graphic element displayed on the client computer (e.g. an on-screen button).
In examples, the computer-implemented method further comprises: receiving, at a server from a client system, a client order request identifying a product or service which the operator of the client system requests delivered.
Figures
Some embodiments will now be described, by way of example only, with reference to the figures, in which:
Figure 1 illustrates a schematic view of a digital doorbell system;
Figure 2 illustrates a schematic view of a first type of signal exchange between a second computing device, a server and a first computing device of the digital doorbell system shown in Figure 1 ;
Figure 3 illustrates a schematic view of a second type of signal exchange between a first computing device, a server and a second computing device of the digital doorbell system shown in Figure 1 ;
Figure 4 illustrates a schematic view of a first type of signal exchange between a second computing device and a server of the digital doorbell system shown in Figure 1 ;
Figure 5 illustrates a schematic view of a a digital doorbell system.
In the drawings like reference numerals are used to indicate like elements.
Specific Description
Figure 1 illustrates a schematic view of a digital doorbell system 100. The digital doorbell system comprises: a computer program executed by a first computing device 101 ; a second computing device 102; a unique identifier 105; and, a server 107.
A first user operates a first computing device 101. In the example illustrated in Figure 1 , the computer program comprises software. A second user operates a second computing device 102.
The unique identifier 105 is disposed at an entranceway. The first user controls access to an entranceway. The entranceway may comprise: an exterior door of a dwelling (e.g. a house or apartment) ; an exterior door of a commercial property (e.g. an office); or, a gate (e.g. of an industrial property such as a delivery depot).
Disposing the unique identifier at an entranceway may comprise: placing the unique identifier on the entranceway; or, placing the unique identifier on a wall adjacent the entranceway.
The unique identifier 105 is inputted into the second computing device 102. The first computing device 101 connects to the server 107. The second computing device 102 connects to the server 107.
The computer program is configured to receive the unique identifier 105 disposed at the entranceway via the second computing device 102. The unique identifier 105 is configured to be input into the second computing device 102. The unique identifier 105 is configured to identify the first computing device e.g. the unqiue identifier is unique to the first computing device.
In examples wherein there are a plurality of first users each operating a unique first computing device, there are a plurality of unique identifiers. In such examples, each unique identifier is configured to identify one of the plurality of first users e.g. each unique identifier is unique to one of the plurality of first users. Each of the unique identifiers may be associated with the first computing device of each first user.
For example, the each of the unique idenitfiers may be associated with a hardware identifier of the first computing device of each first user (e.g. a Media Access Control (MAC) address). In examples wherein a given first user operates a plurality of first computing devices, the unique identifier of the given user is associated with each of the first computing devices of the given first user e.g. the unique idenitifer of the given first user is associated with a hardware identifier of each of the first computing devices of the given first.
In an example with three first users, first user A, first user B, and first user C which operate, first computing device A, first computing device B, and, first computing device C respectively. There are three unique identifiers, unique identifier A, unique identifier B and, unique identifier C which correspond to, first user A, first user B, and first user C respectively. The unique identifier A is associated with first computing device A. The unique identifier B is associated with first computing device B. The unique identifier C is associated with first computing device C.
In an example, a given first user (e.g. first user X) may wish to use the digital doorbell system with a variety of first computing devices commonly operated by the given first user (e.g. primary first computing device X1 and secondary first computing device X2). For example, when present at the property comprising the entranceway, the first user X may operate a primary first computing device X1 (e.g. the primary first computing device X1 may be a tablet computer), and when absent fromthe property, the first user X may operate a secondary first computing device X2 (e.g. a smartphone). Unique identifier Y is associated with both the primary first computing device X1 and the secondary first computing device X2.
In such examples, the first user X may receive messages from the server on both the primary first computing device X1 and the secondary first computing device X2. Alternatively, the first user X may toggle which first computing device receives messages from the server e.g. the first user may send a toggle setting request from one of the first computing devices X1 , X2, which identifies which of the first computing devices X1 , X2, to which the server should send messages.
In examples, a single unique identifier K may be associated to one or more computing devices from a shared property e.g. family members of a single household. Each person in the shared property may associate their own computing device (e.g. first computing devices which they operate) to the unique identifier K. A list of computing device identifiers (e.g. unique hardware identifiers of the computing devices) may be associated to the single unique identifier K. The list of computing device identifiers may be associated to the single unique identifier K may be stored on the server of the digital doorbell system. In such examples, more than one user (e.g. person in a single household) may receive notifications indicating that a second user is at the entranceway. In examples, a single unique identifier L may be associated with one or more first users from a divided property e.g. the property is divided into sub-properties such as apartments or offices. In such examples, residents of each sub-property, (e.g. residents of each apartment) may associate their own computing device and sub-property identifier (e.g an address such as an apartment number) with the unique indentifier L. A list of computing device identifiers (e.g. unique hardware identifiers of the computing devices) may be associated with a sub-property identifier and the sub-property identifier is associated to the single unique identifier L. The list may be stored on the server of the digital doorbell system.
A visitor to the property would obtain the unique identifier L at the entranceway of the divided property and subsequently would be prompted to select a sub-property to notify e.g. select the apartment number which the visitor would like to contact. Once a selection is made, the system notifies one or more computing devices associated with the subproperty and unique identifier L of the visitor’s presence at the entranceway.
In examples, there may be provided an address database comprising a list of the unique idenitifers and the first computing devices associated with each unique identifier. The address database may be accessible by the server (e.g. the address database may be stored on the server).
In examples, the unique identifier may be input into the second computing device by a camera of the second computing device e.g. the camera of the second computing device captures an image of the unique identifier. The image of the unique identifier is received (e.g. input) by the second computing device 102. For example, the unique identifier may be a Quick Response (QR) code.
The second computing device 102 is configured to send the unique idenitifer 105 to the server 107. The second computing device 102 is configured to send a communication request, comprising the unique identifier, to the server 107, to communicate anonymously via the server with the first user operating the first computing device 101 .
In examples, the server 107 stores a database, the database comprising a list of unique identifiers and indentifiers of the first computing devices e.g. an address database as described herein.
In examples, receiving the unique identifier by the second device may prompt the second computing device to communicate with the server when the unique identifier is inputted into the second computing device. In examples, inputting the unique identifer into the second computing device directs a browser on the second computing device to a unique resource locator, URL, wherein the URL is unique to the first user, and wherein the URL directs a communication request to the server.
The second computing device may automatically launch the browser when the unique identifier is input into the second computing device or alternatively, the second computing device may require an input from the second user to launch the browser at the URL associated with the unique identifier.
The first computing device 101 is configured to receive a communication request from the server 107. In examples, such as that shown in Figure 1 , the first computing device is configured to send one or more packets to the server.
In response to the communication request received by the first computing device 101 from the server 107, the first computing device 101 notifies the first user of the second user’s presence at the entranceway. The first computing device 101 executes a computer program configured to receive the communication request and generate a notification to alert the first user of the second user’s presence at the entranceway.
Figure 2 illustrates a schematic view of a first type of signal exchange 200 between the second computing device 102, the server 107 and, a first computing device 101 of the digital doorbell system 100 of Figure 1.
The first type of signal exchange comprises: a 2-S packet 201 sent from the second computing device 102 to the server 107; and, a S-1 packet 202 sent from the server 107 to the first computing device 101.
The server 107 is configured to generate a S-1 packet 202 based on the 2-S packet 201 . For example, the 2-S packet 201 may comprise the whole of or part of any 2-S request or 2-S response described herein.
For example, the S-1 packet 202 may comprise the whole of or part of any S-1 request or S-1 response described herein.
Figure 3 illustrates a schematic view of a second type of signal exchange 300 between the first computing device 101 , the server 107 and, a second computing device 102 of the digital doorbell system 100 of Figure 1.
The second type of signal exchange 300 comprises: a 1 -S packet 301 sent from the first computing device 101 to the server 107; and, a S-2 packet 302 sent from the server 107 to the second computing device 102.
The server 107 is configured to generate an S-2 packet 302 based on the 1 -S packet 301 .
For example, the 1 -S packet 301 may comprise the whole of or part of any 1 -S request or 1 -S response described herein.
For example, the S-2 packet 302 may comprise the whole of or part of any S-2 request or S-2 response described herein.
Figure 4 illustrates a schematic view of a third type of signal exchange 400 between the second computing device 102 and the server 107 of the digital doorbell system 100 of Figure 1 .
The third type of signal exchange 400 comprises: a 2-S packet 501 sent from the second computing device 102 to the server 107; and, an S-1 packet 502 sent from the server 107 to the second computing device 102.
In the example shown in Figure 4, the first user may preselect a packet to be sent from the server 107 to the second computing device 102. The server 107 is configured to generate an S-2 packet 402 based on the 2-S packet 401 .
For example, the 2-S packet 401 may comprise the whole of or part of any 2-S request or 2-S response described herein.
For example, the S-2 packet 402 may comprise the whole of or part of any S-2 request or S-2 response described herein.
In examples, the first user may be unable to attend to the entranceway e.g. the first user may be absent from the property. The first user may preset response to be sent from the server 107 to the second computing device 102 which states that the first user is absent from the property. Optionally, the preset response may state that any deliveries are to be delivered to a neighbouring property (e.g. a house a nextdoor to the property).
In examples, the first user may be unable to attend to the entranceway for a given period of time e.g. the first user may be asleep or may be shopping. The first user may choose a preset response to be sent from the server 107 to the second computing device 102 which states that the first user is absent from the property until the expiration of the given period. Optionally, the preset response may state that the second user may revisit the property after the expiration of the given period.
Figure 5 illustrates a schematic view of a digital doorbell system. The digital doorbell system comprises: a computer program executed by a first computing device 501 ; a second computing device 502; a unique identifier 505; and, a server 507.
The second computing device 502 receives the unique identifier 505. In the example shown in Figure 5 a second user operates the second computing device 502 to input the unique identifier 505 into the second computing device 502.
The first computing device 501 executes a computer program which permits communication between the first computing device 501 and the server 507. The computer program is configured to send, from the first computing device 501 , 1 -S packets to the server 507. The computer program is configured to receive, at the first computing device 501 , S-1 packets from the server 507.
The second computing device 502 is configured to send 2-S packets to the server 507. The second computing device 502 is configured to receive S-2 packets from the server 507.
The unique identifier 505 is unique to a first user. The unique identifier 505 represents a URL. The unique identifier is configured to direct a web browser to a web page, in response to the URL being input into a web browser. In the example shown the web page comprises dynamic content.
The unique identifier is configured to be inputted into the second computing device e.g. the unique identifier is intellegible by the second user who inputs it into the second computing device or the unique identifier is directed readable by the hardware of the second computing device (e.g. a camera).
In the example shown in Figure 5, the unique identifier comprises a QR code. In examples, the QR code may be replaced with another form of unique identifier e.g. the URL written in alphanumeric form.
In the example shown in Figure 5, the unique identifier comprising a QR code is inputted into the second computing device via a QR reader application executed by the second computing device. The QR reader application uses a camera of the second computing device to capture an image of the QR code. The image of the QR code is read by the QR reader application to recover the URL represented by the unique identifier.
The second computing device may be a smartphone wherein QR reader applications are either native to the operating system or are readily installed via an application repository. Advantageously, the second computing device may not require special software to be installed as the functionality to read QR codes is native to many computing devices such as smartphones. In the example shown in Figure 5, in the event that the unique identifier 505 is inputted into second computing device 502, the second computing device 502 displays an option to launch a web browser of the second computing device at the URL represented by the unique identifier and the option to take no further action with regards to the URL.
The first computing device 501 is configured to receive inputs which are indicative of the first user’s choice of option. The second computing device 502 is configured to receive inputs which are indicative of the second user’s choice of option. In examples, the computing device may comprise a screen upon which options are displayed. In examples wherein the computing device is a smartphone comprising a touchscreen, each option may have an associated distinct area of the screen (distinct in that the areas associated with different options to not overlap) wherein in the event that the user touches the touchscreen within the area associated option, then the computing device selects the option associated with that area of the touch screen i.e. the input is a touch in the area associated with the option. Herein each distinct area associated with an option may be referred to as a button. Each option may comprises label such as text or symbols which enable to users to ascertain the option represented.
In the event that the second user selects the option to lauch the web browser of the second computing device at the URL represented by the unique identifier, then the second computing device 502 sends a 2-S communication request to the server 507. The 2-S communication request packet comprises a request for the website stored at the URL represented by the unique identifier. The 2-S communication request comprises one or more 2-S packets.
The server 507 is configured to receive the 2-S communication request. The server 507 is configured to identify the first user associated with the unique identifier 505. The server 507 is configured to identify one or more first computing devices 501 associated with the first user. In examples, the server may store a database of first users and their associated first computing devices as described herein.
In the event that the server 507 receives a 2-S communication request, the server identifies the first user associated with the unique identifier 505.
In the event that the server 507 identifies the first user associated with the unique identifier 505, the server 507 identifies one or more first computing devices 501 associated with the identified first user.
In the do not disturb setting the server 507 is configured to send a S-2 preset response (details described herein). In examples, the S-2 present response may be customisable by the first user.
In the event that the server 507 identifies one or more first computing devices associated with the identified first user, the server 507 sends a S-2 welcome response to the second computing device 502. The S-2 welcome response comprises welcome options (a list of one or more options). The S-2 welcome response may comprise information about the first user associated with the unique identifier 505. In the example shown in Figure 5, the information about the first user may comprise a chosen display name (hereinafter CDN) of the first user.
In the event that the second computing device 502 receives the S-2 welcome response, the web browser of the second computing device 502 displays a web page comprising welcome options. The welcome options comprise: a contact option; and, a terminate option. The web page may comprise dynamic content.
In the event that the contact option is selected (e.g. the second user selects the contact option by pressing an appropriate button), an 2-S initiate request is sent from the second computing device to the server. The 2-S initiate request comprises instructions for the server 505 to permit anonymous communication between the second computing device 502 and the first computing device 501 via the server 507.
In the event that the second user selects the termination option, the second computing device 502 terminates communication to the server 507.
The server 507 is configured to receive the 2-S inititate request. The server 507 is configured to generate a S-1 initiate request based on the 2-S inititate request. A S-1 initiate packet comprises one or more communication response options. The communication response options comprise: one or more preset response option; and, a live-chat option.
In the event that the server 507 receives the 2-S initiate request, the server sends a S-1 initiate request to the first computing device 501 .
In some examples, such as that shown in Figure 5, immediately after the server 507sends a S-1 initiate request to the first computing device 501 , the server 507 begins a timer. The server 507 is configured to run the timer until a selected response time has elapsed.
If during the selected response time, the server 507 has received a communication response from the first computing device 501 (e.g. one or more packets corresponding to one of the response options set out below), then an S-2 preset response is not sent from the server 507 to the second computing device 501 . If during the selected response time, the server 507 has not received a communication response from the first computing device 501 (e.g. one or more packets corresponding to one of the response options set out below), then an S-2 preset response (e.g. comprising a message informing the second user that the first user is unavailable) is sent from the server 507 to the second computing device 501.
In examples the selected response time may be any of 10 seconds, 15 seconds or 20 seconds.
In the event that the first computing device 501 receives an S-1 initiate request, the computer program displays the communication response options.
The one or more preset response options comprise text phrases. In the event that a preset response option (e.g. comprising preset response X) is selected, a 1 -S preset response (e.g. a 1 -S present response X comprising one or more packets) is sent from the first computing device 501 to the server 507. In the event that the server 507 receives a 1 -S preset response (e.g. 1 -S preset reponse X), the server generates a S-2 preset response (e.g. 1 -S preset response X) based on the 1 -S preset response. In the event that the server 507 receives a 1 -S preset response (e.g. 1 -S preset response X), the server 507 sends a S-2 preset response (e.g. 1 -S preset response X) to the second computing device 502.
The preset message options may include any of : a message informing the second user that the first user is travelling to the entranceway e.g. “CND is on the way” displayed on the second computing device upon receipt of the S-2 preset response; a message informing the second user that the first user is unavailable e.g. “CND is not available right now” displayed on the second computing device upon receipt of the S-2 preset response.
In the example shown in Figure 5, the S-2 preset response further comprises a list of one or more unavailable options. The unavailable options may comprise any of : a try again option; a leave message option; and an emergency option.
In the event that the second computing device 502 receives an S-2 preset response comprising unavailable options, the web browser of the second computing device 502 displays a web page comprising the unavailable options.
In the event that the try again option is selected, another 2-S initiate request is sent from the second computing device 502 to the server 507 (as discussed herein).
In the event that the leave a message option is selected, the web page displayed on the web browser of the second computing device displays a text box configured to receive an input from the second user (e.g. text, numbers, symbols). Once a message has been composed, the second computing device 502 is configured to generate a 2-S leave message response comprising the composed message. The second computing device 502 is configured to send the 2-S leave message response to the server 507.
In the event that the server 507 receives a 2-S leave message response from the second computing device, the server 507 is configured to generate an S-1 leave message response based on the 2-S leave message response. In the event that the server 507 receives a 2-S leave message response from the second computing device 502, the server 507 is configured to send an S-1 leave message response based on the 2-S leave message response to the first computing device 501 .
In the event that the first computing device 501 receives a S-1 leave message response from the second computing device 502, via the server 507, the computer program is configured to display the composed message on the first computing device 501 .
In the event that the emergency option is selected, the web page displayed in the web browser begins an audio call between the second computing device 502 and the first computing device 501 , via the server 507.
In the event that the live chat option is selected, a 1 -S start chat response is sent from the first computing device 501 to the server 507. In the event that a 1 -S start chat response is sent from the first computing device 501 to the server 507, the first computing device is configured to: send chat messages from the first computing device 501 , via the server 507, to the second computing device 502; and, receive at the first computing device 501 chat messages from the second computing device 502, via the server 507.
In the event that the server 507 receives a 1 -S start chat packet, the server generates a S-2 start chat packet. In the event that the server 507 receives a 1 -S start chat packet, the server sends a S-2 start chat packet to the second computing device 502.
In the event that a S-2 start chat response is sent from the server 507 to the second computing device 502, the second computing device 502 is configured to: send chat messages fromthe second computing device 502, via the server 507, to the first computing device 501 ; and, receive chat messages fromthe first computing device 501 , via the server 507, to the second computing device 502.
Chat messages may comprise: text; numbers; symbols; and, images.
Chat messages may be composed by the first user via the computer program executed on the first computing device 501 . Chat message received by the first computing device 501 are displayed by the computing program. 1 -S response packets comprising the chat messages are sent from the first computing device 501 to the server 507. The server generates S-2 response packets comprising chat messages. The server 507 sends generated S-2 response packets comprising chat messages to the second computing device.
Chat messages may be composed by the second user via the web page in the web browser of the second computing device 502. Chat message received by the second computing device 502 are displayed on the web page displayed in the web browser. 2-S response packets comprising the chat messages may be sent from the second computing device 502 to the server 507. The server generates S-1 response packets comprising chat messages. The server 507 sends generated S-1 response packets comprising chat messages to the first computing device 501 .
In some examples, chat messages may comprise live video chat wherein video and/or audio are sent from each of the first and second computing devices via the server to the other computing thereby permitting live anonymous video and/or audio to be exchanged between the first user and the second user.
The computer program is configured to allow the first user operating the first computing device to select settings of the digital doorbell system. The settings may comprise any of: a do not disturb setting; a require name setting; and, a display CDN setting.
Each of the settings is configured to be toggled between an “ON” state and an “OFF” state. In the “ON” state, each setting has the function set out below. In the “OFF” state, the setting no longer performs the function performed in the “ON” state.
The first user is able to toggle each of the settings between the “ON” state and the “OFF” state via the computer program executed on the first computing device 501. The user provides an input to the first computing device (e.g. presses a button on the first computing device) to indicate that a given setting (e.g. setting X) is to be toggled from one state to the other (e.g. toggled from the “OFF” state to the “ON” state or vice versa). In the event that the first computing device receives such an appropriate input a 1 -S setting toggle request (e.g. 1 -S setting X toggle request) is sent from the first computing device to the server.
The server is configured to receive 1 -S setting toggle request from the first computing device. The server is configured to toggle the state of a setting based on a received 1 -S setting toggle request. The state of the setting is stored at the server.
In the “ON” state, the do not disturb setting is configured to prevent packets being sent from the server 507 and the first computing device 501.
For example, upon receipt of a 2-S communication request sent from the second computing device 502 to the server 507, the server 507 reviews the state of the do not disturb setting stored at the server 507.
If the server 507 determines that the state of the do not disturb setting stored at the server is the “ON” state, an S-2 preset message packet (a message informing the second user that the first user is unavailable) is sent from the server 507 to the second computing device 502.
If the server 507 determines that the state of the do not disturb setting stored at the server is the “OFF” state, an S-1 request packet is sent from the server 507 to the first computing device 501 (as described herein).
In some examples, the first user may provide an override list to the server wherein the override list comprises one or more second user identifiers. In such examples, in the event that a first user has the do not disturb setting in the “ON” state, and a second user whose user identifier appears on the override list, then a 2-S communication request sent from the second computing device to the server will prompt the generation of a S-1 communication request at the server which will be sent to the first computing device (i.e. the server does not prevent packets being sent from the server in response to packets received by the server from a second user who is listed on the override list.
In the “ON” state, the require name setting is configured to request the name of the second user.
For example, upon receipt upon receipt of a 2-S communication request sent from the second computing device 502 to the server 507, the server reviews the state of the require name setting stored at the server. If the server 507 determines that the state of the require name setting stored at the server is the “ON” state, an S-2 name request is sent from the server 507 to the second computing device 502. If the server 507 determines that the state of the require name setting stored at the server is the “OFF” state then an S-1 request packet is sent from the server 507 to the first computing device 501 (as described herein).
In the event that the second computing device 502 receives an S-2 name request, the second computing device 502 displays an input field in the web page displayed on the web browser. In examples, there may be text displayed on the web page displayed on the web browser requesting that the second user provide their name to be sent to the first user (e.g. “Please provide your name for CDN”). Upon inputting their name (e.g. “second user name”, SUN for short) into the input field the second computing device 502 sends a 2-S name response to the server 502.
In the event that the server 502 receives a 2-S name response from the second computing device 502, the server generates a S-1 name response. In the event that the server 502 receives a 2-S name response from the second computing device 502, the server 507 sends an S-1 name response to the first computing device 501.
In the event that the first computing device 501 receives an S-1 name response from the server, the name message is displayed by the computer program operated by the first computing device 501 . The name message comprises the name inputted into the second computing device 502 by the second user e.g. “SUN is at the door”.
In the “ON” state, the show CDN setting is configured to send the CDN from the server 507 to the second computing device 502.
For example, upon receipt of a 2-S communication request sent from the second computing device 502 to the server 507, the server reviews the state of the show CDN setting stored at the server. If the server 507 determines that the state of the show CDN setting stored at the server is the “ON” state, an S-2 preset response (comprising the CDN of the first user) is sent from the server 507 to the second computing device 502. If the server 507 determines that the state of the show CDN setting stored at the server is the “OFF” state, the CDN is not included in any of the packets sent from the server 507 to the second computing device 502.
The server 502 may determine the state of each of the settings stored at the server in any order e.g. determine the state of the do not disturb setting first, then subsequently detemine the state of the request name setting, then subsequently determine the state of a show CDN setting or any permutation thereof.
The first user may have to select a setting to allow the emergency option (this setting may only be available if the first user has certain priviledges e.g. such as may granted upon payment of a suscription fee).
Herein, “to select option X” and the like are to be taken to mean “to provide an input (to a computing device) to indicating option X is to be pursued”.
Herein, a message packet may comprise information in addition to any messages in the packet e.g. the message may comprise an appropriate header to allow the message to be understood by the receiving device.
Certain features of the methods described herein may be implemented in hardware, and one or more functions of the apparatus may be implemented in method steps. It will also be appreciated in the context of the present disclosure that the methods described herein need not be performed in the order in which they are described, nor necessarily in the order in which they are depicted in the drawings. Accordingly, aspects of the disclosure which are described with reference to products or apparatus are also intended to be implemented as methods and vice versa. The methods described herein may be implemented in computer programs, or in hardware or in any combination thereof. Computer programs include software, middleware, firmware, and any combination thereof. Such programs may be provided as signals or network messages and may be recorded on computer readable media such as tangible computer readable media which may store the computer programs in non-transitory form. Hardware includes computers, handheld devices, programmable processors, general purpose processors, application specific integrated circuits (ASICs), field programmable gate arrays (FPGAs), and arrays of logic gates.
Any processors used in the computer system (and any of the activities and apparatus outlined herein) may be implemented with fixed logic such as assemblies of logic gates or programmable logic such as software and/or computer program instructions executed by a processor. The computer system may comprise a central processing unit (CPU) and associated memory, connected to a graphics processing unit (GPU) and its associated memory. Other kinds of programmable logic include programmable processors, programmable digital logic (e.g., a field programmable gate array (FPGA), a tensor processing unit (TPU), an erasable programmable read only memory (EPROM), an electrically erasable programmable read only memory (EEPROM), an application specific integrated circuit (ASIC), or any other kind of digital logic, software, code, electronic instructions, flash memory, optical disks, CD-ROMs, DVD ROMs, magnetic or optical cards, other types of machine-readable mediums suitable for storing electronic instructions, or any suitable combination thereof. Such data storage media may also provide the data store of the computer system (and any of the apparatus outlined herein).
Examples of near field RF communicators are defined in various standards for example ISO/IEC 18092 and ISO/IEC 21481 for NFC communicators, and ISO/IEC 14443 and ISO/IEC 15693 for near field RF communicators.

Claims

1. A digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein the second computing device is configured to: receive a unique identifier disposed at the entranceway, wherein the unique identifier is unique to the first user; and, send the unique identifier to a server; wherein the server is configured to: identify the first computing device based on the unique identifier; and, permit anonymous communication between the first computing device and the second computing device via the server.
2. The digital doorbell system of claim 1 , wherein: the first computing device executes a computer program configured to permit communication between the first computing device and the server.
3. The digital doorbell system of any of the preceding claims, wherein: the anonymous communication between the first computing device and the second computing device comprises any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more preset packets to the second computing device from the server based on one or more packets sent to the server from the second computing device, wherein the one or more preset packets are selected by a first user.
4. The digital doorbell system of any of the preceding claims, wherein: the server is configured to: request a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; compare: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of : the entranceway; and, the unique identifier; and, the server is configured to: prevent packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
5. The digital doorbell system of any of the preceding claims, wherein: any of the first computing device and the server is configured to: send an open request to the entranceway in response based on an open request sent from the first computing device, wherein the entranceway is configured to receive an open request, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
6. The digital doorbell system of any of the preceding claims, wherein: any of the first computing device and the server is configured to: record the number of packets sent from the second computing device during a first selected period of time; determine if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; cease, sending packets to the first computing device from the server or receiving packets from the server, for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
7. A method for permitting a second user operating a second computing device to communicate with a first user operating a first computing device, wherein the first user controls access to an entrance way; the method comprising: receiving, by the second computing device, a unique identifier disposed at the entranceway; sending, by the second computing device, a communication request comprising the unique identifier to a server to communicate anonymously with the first user operating the first computing device via the server.
8. The method of claim 7, the method further comprising: receiving, by the second computing device, one or more packets from the first computing device via the server.
9. A method for permitting communication between a first user operating a first computing device and a second user operating a second computing device wishing to communicate with the first user, wherein the first user controls access to an entranceway; the method comprising: receiving, by the first computing device, a communication request from a server, wherein the communication request is based on a unique identifier disposed at the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; sending, by the first computing device, a response to the communication request to the server to communicate with the second user operating the second communication device.
10. A system for digital doorbell system for permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entrance way; and, a second user operating a second computing device and wishing to communicate with the first user; wherein at least one of : the first computing device performs the method according to any of claims 7 to 8; and, the second computing device performs the method according to claim 9.
11. A computer program for a first computing device in a digital doorbell system, wherein the digital doorbell system is configured to permit communication, via a server, between: a first user operating the first computing device, wherein the first user controls access to an entrance way; and, a second user operating a second computing device wishing to communicate with the first user; wherein the computer program is configured to: receive a communication request from the server, wherein the communication request is based on a unique identifier located proximate to the entrance way and wherein the unique identifier is unique to the first user, and wherein the communication request comprises an identifier permitting identification of the second user or the second communication device; send a response to the request to the server to communicate with the second user operating the second communication device.
12. The computer program of claim 1 1 , wherein: the communication request received from the server is based on one or more packets sent to the server by the second computing device.
13. The computer program of any claims 11 to 12, wherein: any of the communication request and the response comprise one or more packets .
14. A method of permitting anonymous communication between: a first user operating a first computing device wherein the first user controls access to an entranceway, wherein a unique identifier is disposed at the entranceway; and, a second user operating a second computing device and wishing to communicate with the first user; the method comprising: receiving a unique identifier, wherein the unique identifier is unique to the first user; identifying a first computing device based on the unique identifier; permitting anonymous communication between the first computing device and the second computing device via a server.
15. The method of claim 14, wherein: the first computing device executes a computer program configured to permit communication between the first computing device and the server.
16. The method of claims 14 to 15 further wherein: the anonymous communication between the first computing device and the second computing device comprises any of : sending one or more packets to the first computing device from the server based on one or more packets sent to the server from the second computing device; sending one or more packets to the second computing device from the server based on one or more packets sent to the server from the first computing device; and, sending one or more packets to the second computing device from the server based on one or more packets sent to the server fromthe second computing device.
17. The method of any of claims 14 to 16 wherein: the anonymous communication between the first computing device and the second computing device comprises: requesting a location packet from the second computing device, wherein the location packet is indicative of the location of the second computing device; comparing: the location packet received from a second computing device; and, a location datum, to determine a similarity or dissimilarity between the two; wherein the location datum is indicative of the location of any of : the entranceway; and, the unique identifier; and, preventing the one or more packets to be sent from the server to the first computing device if it has been determined that there is a dissimilarity between the location packet and the location datum.
18. The method of any of claims 14 to 17 further comprising: sending an open request to the entranceway in response based on an open request sent from the first computing device; wherein: the entranceway is configured to receive an open request; and, switching, in response to receiving an open request by the entranceway, the entranceway from: a closed configuration which prevents entrance via the entranceway; to, an open configuration which permits entrance via the entranceway.
19. The method of any of claims 14 to 18 further comprising: recording the number of packets sent from the second computing device during a first selected period of time; determining if the number of packets sent from the second computing device during the first selected period of time exceeds a selected packet limit; ceasing to send one or more packets to the first computing device for a second selected period of time, if the number of packets sent from the second computing device during the first selected period of time exceeds the first selected packet limit.
20. A server configured to perforin the method of any of claims 14 to 19.
PCT/EP2022/053034 2021-02-08 2022-02-08 Digital doorbell system and method WO2022167691A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB2101722.3 2021-02-08
GB2101722.3A GB2603526A (en) 2021-02-08 2021-02-08 Digital doorbell system and method

Publications (1)

Publication Number Publication Date
WO2022167691A1 true WO2022167691A1 (en) 2022-08-11

Family

ID=74879195

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2022/053034 WO2022167691A1 (en) 2021-02-08 2022-02-08 Digital doorbell system and method

Country Status (2)

Country Link
GB (1) GB2603526A (en)
WO (1) WO2022167691A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014083436A2 (en) * 2012-11-28 2014-06-05 Assa Abloy Ab Intercom system using an nfc communication device
EP3460770A1 (en) * 2017-09-20 2019-03-27 Google LLC Systems and methods of presenting appropriate actions for responding to a visitor to a smart home environment
US20200302716A1 (en) * 2019-03-22 2020-09-24 Eingot Llc Virtual intercom system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014083436A2 (en) * 2012-11-28 2014-06-05 Assa Abloy Ab Intercom system using an nfc communication device
EP3460770A1 (en) * 2017-09-20 2019-03-27 Google LLC Systems and methods of presenting appropriate actions for responding to a visitor to a smart home environment
US20200302716A1 (en) * 2019-03-22 2020-09-24 Eingot Llc Virtual intercom system

Also Published As

Publication number Publication date
GB202101722D0 (en) 2021-03-24
GB2603526A (en) 2022-08-10

Similar Documents

Publication Publication Date Title
US10482463B2 (en) Facial profile modification for hands free transactions
US9721282B2 (en) Merchant verification of in-person electronic transactions
US11816647B2 (en) Systems and methods for providing cash redemption to a third party
CN103617680B (en) A kind of intellectual access method and system based on Quick Response Code management manipulation
KR101538745B1 (en) System for Issuing an Electronic Receipt
JP2011134003A (en) Home-delivery object receiving system
US10475014B1 (en) Payment device security
KR101727459B1 (en) Method and apparatus for authentication of visitor
US20190140970A1 (en) Persistent integration platform for multi-channel resource transfers
US20190347441A1 (en) Patient privacy de-identification in firewall switches forming VLAN segregation
US20210406909A1 (en) Authorizing transactions using negative pin messages
JP2018106669A (en) Digital Community System
US10673636B1 (en) System and apparatus for providing authenticable electronic communication
US10469493B2 (en) Mobile device, authentication device and authentication methods thereof
CN108270841B (en) Prompting method and device
KR101746114B1 (en) Mobile video call system using near field wireless communications and the method thereof
JP2011041074A (en) Identification system, authentication station server, and identification method
WO2022167691A1 (en) Digital doorbell system and method
KR20080008763A (en) Memory information management system using rfid and the service method thereof
US9685016B2 (en) System and method for providing access to a defined space
KR102525430B1 (en) Calling system for visitors based on cloud computing and operating method thereof
US11922745B2 (en) Systems and methods for providing a secure physical storage system
AU2017216540A1 (en) Method and system for providing proof of delivery
KR102515656B1 (en) Customer complaint digital processing system
US20220351180A1 (en) Computer Implemented System and Method for Touchless Parking Entry, Payment, and Exit from Parking Facility, and Computer-Readable Medium Having Processor-Executable Instructions For Same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22708074

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 22708074

Country of ref document: EP

Kind code of ref document: A1