Location Verification Using Networked Client Peripherals

ABSTRACT

A system verifies the location of a first person during a specified period by sending random alerts to the smart phone of the first person. A user must respond to the alerts. A second person defines acceptable locations. The smart phone has location measuring capability, such as a GPS or connection to a WAN. The identity of the user can be verified by requiring the input of a security code that also gives the user access to confidential information of the first person.

COPYRIGHT AND TRADEMARK NOTICE

A portion of the disclosure of this patent document contains material to which a claim for copyright is made. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but reserves all other copyright rights whatsoever.

BACKGROUND OF THE INVENTION Smartphone Attendance Monitoring

Payroll companies provide payroll services to one or more client companies. A client company's employees are usually expected to work at defined locations between certain times. The location may be within an office, a factory, or some other defined area. Monitoring actual attendance is difficult. Moreover, specific locations and times of attendance may have a complicated relationship with the wages and benefits earned, especially for hourly paid employees.

A typical payroll company will allow a client to specify workers and job locations, but will require direct input of data on hours worked by employee by pay period at various locations, with separation of hours into various time codes, such as: regular, overtime, or double-time. Separate time-management software is available which can compute these aggregates from records of more basic data on clock-in and clock-out times. Some payroll companies may even have software that combines time-management tools with payroll data collection and processing.

Time management systems are easiest for the client company to use when employees themselves can perform clock-in and clock-out events using a system which collects this data centrally. However, to date this has only really been practical for employees in office environments who work at networked computers all day. Software can be put on the networked computer to handle the clocking events and if the software cannot be installed elsewhere, there is some limited assurance that the employee who is supposed to be doing the work is the one who is clocking in and out.

However, many workers do not work at computers often. This includes many types of workers with complicated payroll requirements, for example construction workers, electricians, and other blue collar trades. The complications for these workers start with overtime calculations. Rules regarding overtime and other shift payments are often complex. Overtime may include hours worked beyond a set total per day as well as per week or pay period, and may also include hours worked outside a preset shift or hours beyond a certain continuous interval without a break. Many of these workers divide their time between jobsites which may have different payroll-related requirements. For example, workers near a State boundary may work some hours in a neighboring State, and may be subject to different reporting requirements by State.

Requirements may also be complicated within States. For example, workers' compensation premiums for many construction workers in New York State must be computed differently based on the number of hours worked in each county. Minimum wage requirements vary by state, county and sometimes also municipality, and must typically be obeyed for the work done in each location. Recording and entering all the required data for such workers is typically onerous. There is a need therefore, for a system that will verify whether or not a worker is actually on the job in variable and remote locations.

SUMMARY OF THE INVENTION

FIG. 1 shows the various possible relationships 100 between physical devices used in a proposed payroll management processes. Horizontal bar 102 represents the internet. Direct internet connections (wired or wireless) are shown by solid connecting lines. Above the horizontal bar are a payroll company's server 104 and third party satellite(s) 106 used in a location checking process. Said server may be referred to as a first server. Said payroll company may be referred to as a second person. All items shown below the horizontal bar are located with the client company's employees. Any one of said employees may be referred to as a first person. The items may be owned by the client, or by the employees, or by a payroll company. Ownership of the devices is unimportant. Special software which may be owned and distributed by the payroll company may be used to configure the various devices to perform the required tasks. Items in 112, 114 and 116 are exemplary employee work locations. Items 122 and 124 are telecommunication devices that are with employees when they are at work. Specific labeled items are:

-   -   The payroll company's central server 104 comprising a store of         master payroll and benefit records, linked as needed to other         payroll company systems for billing, printing, insurance         management, etc.     -   The internet 102 or other computer-to-computer communications         network, such as M-2-M, digital cell phone, analog cell phone,         wired, fiber optic, or other network. As used herein, a         “computer” refers to a digital electronic device that comprises         a microprocessor, input device, output device, permanent memory         and computer readable instructions stored within said permanent         memory, said computer readable instructions being able to cause         said microprocessor to read in data from said input device,         process said input data and generate output data to control said         output device. Servers, smart phones, and all digital computing         devices described herein comprise a computer.     -   A client employee's smartphone 122 with an active internet link         but not located at a defined jobsite.     -   A client employee's smartphone 124 without an active internet         link and not located at a defined jobsite.     -   A client's truck 114 driven by an employee with a smartphone 115         in his/her possession.     -   A client's factory 116 where an employee is at work with his/her         smartphone 117.     -   A client's office location 112 where various employees and         peripherals are located.     -   A local area network (LAN) hub 132 located in the client's         office. All peripherals connected to this hub can be considered         to be at a work location.     -   An employee's work computer 134 connected to the LAN at his/her         office.     -   A Wi-Fi hub 136 (WAN) connected to the office LAN. Peripherals         connected to the Wi-Fi hub can be considered to be at a work         location.     -   The limit range 138 of the Wi-Fi network.     -   An employee's computer 142 connected to the WAN.     -   An employee's smartphone 144 connected to the WAN.     -   A client manager's computer 146 connected to the LAN.     -   A satellite 106 forming part of a location tracking system, such         as GPS, which can be used by smartphones and similar         peripherals.

BRIEF DESCRIPTION OF DRAWINGS

FIG. 1 is a schematic of a system for monitoring employee location.

DETAILED DESCRIPTION

The detailed description describes non-limiting exemplary embodiments. Any individual features may be combined with other features as required by different applications for at least the benefits described herein. As used herein, the term “about” means plus or minus 10% of a given value unless specifically indicated otherwise.

Smartphone Attendance Monitoring

A way around the difficulties described herein is to put attendance management software on smartphones or other personal programmable communications devices which employees then keep in their possession while they work. Most employees already carry sufficiently capable smartphones. The software controlling said smartphones will do the following:

-   -   1. The software will allow the employee to “clock in” and “clock         out” when the phone is within a defined acceptable area and time         shift. “Clocking in” means a first person has indicated that         said person has begun work or other task. “Clocking out” means         that said first person has ceased said work or task.     -   2. The software will send all collected data via an internet or         telephone connection to the payroll company's server (i.e. the         “first server”).     -   3. The payroll company's server will collect all data and send         necessary data and reports back to the client and its employees.         Data may be transmitted directly from one client peripheral to         another insofar as those peripherals form part of the internet         link. All communication through such peripherals will be         encrypted to prevent the client from bypassing any system         controls.     -   4. The employer (aka a “second person”) may define acceptable         location areas for working, for example, by drawing perimeters         on a map in software maintained by the payroll company, or by         specifying acceptable network connections to, for example, Wi-Fi         servers located at a job site.     -   5. The employer may also define schedules for each employee.     -   6. Presence of a first person within an acceptable area may be         assessed in one of the following ways or combinations thereof:         -   a. The phone (or similar device) may have access to a             satellite-driven location system, such as GPS, which the             software on the phone will access, then compare against the             perimeters of said acceptable location area.         -   b. The phone may allow the software to use triangulation             data from local cellphone towers, which the software will             compare against the acceptable perimeters.         -   c. The phone may connect to a Wi-Fi or wired network which             the employer has designated to be acceptable. For example, a             Wi-Fi network operating within a warehouse building. Such             networks are especially useful because they often exist in             locations where wireless phone, GPS or other external             wireless signals are inaccessible. These locations include             strongly constructed concrete buildings or other buildings             which are shielded from said external wireless signals. They             also include routes that a worker should be on that is             shielded from GPS signals by large buildings.     -   7. The specific phone location will be monitored at regular         short intervals between clock-in and clock-out events, and         transmitted automatically to the payroll company's server. Time         spent within each significant area for payroll purposes will be         computed automatically by a machine attached to the payroll         company's server. The amount of “clocked” time spent outside         defined worksites will be transmitted to the client, so said         client can consider taking action against employees who spend         too much time away from work.     -   8. A surprising benefit of collecting this data for the client         is a possible reduction in workers compensation (WC) liabilities         and fraud. To be compensable under WC rules, an employee must         suffer injury arising in the course of and arising out of their         work. So, an employee would generally be covered for injuries         suffered while traveling between assigned worksites. Said         employee would not be covered if he/she made a detour, for         example, on the way to run a personal errand. The location data         tracked by the software could be used to identify such injuries         that were not in an acceptable work area.     -   9. A further surprising benefit of the system derives to the         payroll company directly. Hours to be worked may be required to         be scheduled in advance and sent to employees' devices via the         payroll company's server. The payroll company will then have         advance notice before any employee is employed. This prevents a         common type of fraud whereby an employer pays a worker “under         the table” unless and until that worker is injured and wishes to         make a WC claim, at which point the employer announces to the         payroll company and WC insurance provider that the worker has         “just” been hired.

While much of the description above supposes the use of smartphones as the peripherals carried by employees, other personal programmable communications devices could be used including smart watches, tablet computers, or laptop computers. Similar software could also be rolled out for desktop computer users so that all of a client's employees have access all the time to the payroll system through the peripheral that would typically be their “computer of choice”. This includes regular office workers who typically sit at desktop computers, and workers who sometimes travel and sometimes stay at their desk, such as supervisory staff. Analog systems may also be used with proper circuitry design to provide the above described functionality without digital programming.

Mobile Employees and Distance Traveled

Certain employees do not work at fixed worksites. These include, for example, traveling salesmen and truckers. These employees pose unique challenges and opportunities to the system.

-   -   1. Many smartphones, tablet computers and other peripherals have         access to satellite-driven location-tracking systems such as         GPS. A module could be added in to the payroll company's         software to allow specifying routes by an employer (i.e. a         second person) which an employee (i.e. a first person) should         follow on the job. For example, a trucker might be expected to         drive from San Francisco to Phoenix on a given day. GPS tracking         data recorded by the software in the trucker's smartphone could         be used to monitor completion of assigned routes.     -   2. Timekeeping along a set route may or may not be important to         the client. Some employees are paid piece rates by distance         traveled. For these employees, data from a vehicle odometer is         often used to compute wage amounts, and would likely be         preferred over data from the smartphone. The smartphone could         still be used to find employee locations at any given time, and         to provide data which is readily accessible to systems which         prepare performance management reports.     -   3. Some employees are expected to travel as far as possible but         do not have set routes, or have very complex routes. These         employees may or may not be in vehicles equipped with odometers.         For example, this category includes security guards, local         delivery drivers, tractor drivers, yard workers, and cleaning         staff. For these workers, the client may specify that the         payroll company's server produce a regular report which breaks         down the total distance traveled by employee by pay period.         -   a. This category of employee may include some who are             expected to be mobile, but within a large jobsite, such as             field workers on a farm. These workers could be subject to             distance-traveled reporting and also worksite attendance             checking.     -   4. Additional benefits from data on distance traveled may accrue         through the WC rate setting process. The benefits include:         -   a. Using data on distance traveled by employees, it may be             possible to identify subclasses of employees within             traditional workers' compensation rating classes which have             a characteristically greater or lesser exposure to risk of             injury in accordance with differences in travel distance or             pattern. For example, it might be found that pizza delivery             workers travel further and faster than other delivery             drivers.         -   b. Using data on distance traveled by employees, the payroll             company can check for undesirable work patterns and fraud by             the client in the description of its business and the             activities of its employees. To continue the prior example,             if a pizza shop has described itself as not doing any             delivery, then its workers should not travel far on the job.             Material inaccuracies in descriptions given to the insurer             in the initial application for insurance may be sufficient             grounds for cancellation or non-renewal of the client, which             provides a benefit via reduced losses to the insurer.

Employee Access to Payroll and Benefit Data

Since every employee of the client will have software from the payroll company on a peripheral device in their possession with some access to the payroll company's server, it is natural to provide some employee access to wage and benefit data. This would typically include schedules, hours worked, wages earned, or benefits accrued. This personal information is typically kept confidential to an employee. By “confidential to a person” (e.g. an employee) it is meant at least that the information is not available through a simple search of the internet, such as using a Google search engine. Providing this personal financial data may have a surprising side benefit. The employee will need to have a method to verify his/her identity to access such data, which may be a PIN or password or similar standard protocol comprising personal security code.

For various actions within the payroll system, an employer needs to ensure that the employee is performing said various actions and not another user fraudulently acting on said employee's behalf. These actions include clocking in, clocking out, and responding to audit inquiries. By using the same login protocol for these actions as for access to the employee's confidential personal data, said fraud can be substantially discouraged. Most employees will weigh the cost of providing access to their confidential personal data as being larger than the benefit of being able to defeat the attendance-checking routines.

Active Attendance Audits

So far we have simply presumed that employees remain present with the peripherals used to monitor their location throughout the periods of time when they are recorded as being in attendance. We can add mechanisms to encourage full attendance by auditing this behavior.

-   -   1. The payroll company server may at intervals send a message to         the employee's peripheral, which causes the software on that         peripheral to issue an audible and/or visible alert to the         employee. The employee must respond by entering a secret code         within a specified time interval. If the code is not entered,         the employee's attendance will be provisionally struck out and         the employer will be informed.     -   2. The employer may choose any action, including letting the         strike-out stand or overturning it, and/or implementing their         own separate punishment actions.     -   3. The time allowed for entry of the secret code should be long         enough to allow for workers to put down tools safely or return         from a short break. Ten minutes is adequate in many situations,         although this and other parameters could be variable by employee         at the second person's (e.g. employer's) discretion. Said         functionality can be built into the first server (e.g. payroll         server).     -   4. The secret code should be one that employees will not         willingly share with their fellows, to discourage fraud.         Suitable codes would include: the employee's SSN; or the PIN or         password used to access the employee's payroll and benefit data         in the payroll company's system or other confidential financial         data.     -   5. The interval between messages being sent out could be random,         following, for example, a Poisson process, where the Poisson         parameter is settable by employee or employee type and is under         the ultimate control of the second person (e.g. employer) and         not the first person (e.g. the employee) This can be implemented         by setting various permissions in the first server.     -   6. Messages could also be sent out at specific times as         requested by the client.     -   7. The client's manager's access to the payroll company's         software would include tools for managing and monitoring the         results of attendance audits.

Miscellaneous Considerations

All data communications from client peripherals to the payroll company's server should be strongly encrypted. 

I claim:
 1. A system for location verification comprising: a) a personal programmable communications device; and b) a first server; wherein: c) said personal programmable communications device is controlled by computer readable instructions stored on a permanent memory to carry out the steps of: 1) allowing a user access to said device after said user inputs a personal security code that is confidential to said first person; 2) receiving from said user a clock-in command at a clock-in time; 3) receiving from said user a clock-out command at a clock-out time; 4) transmitting to said first server said clock-in time and said clock-out time; 5) receiving from said first server after said clock-in command but before said clock-out command, a first message which causes said personal programmable communications device to issue an audible alert; 6) receiving from said user said personal security code within a specified time interval after said first message; and 7) sending to said server a notice if said personal security code is not received in said time interval; and wherein d) said first server is modified to carry out the step of transmitting a second message triggering an audible alert to said personal programmable communications device at a random interval after said first message, said interval being determined by a Poisson process wherein said Poisson process is controlled by a Poisson parameter; and e) said personal programmable communications device is modified to: 1) receive from said user said personal security code within said specified time interval after said second message; and 2) send said first server a notice if said personal security code is not received from said user after said specified time interval after said second notice.
 2. The system of claim 1 wherein: a) said first server is controlled by computer readable instructions stored on a permanent memory to carry out the step of receiving from a second person a definition of an acceptable location area; and wherein b) said steps controlling said personal programmable communications device further comprise verifying said user is within said acceptable location area when said personal security code is received after said first message.
 3. The system of claim 2 wherein said acceptable location area comprises the interior of a building shielded from external GPS signals but covered by an internal Wi-Fi network and wherein said verification comprises connecting said personal programmable device to said Wi-Fi network.
 4. The system of claim 2 wherein said acceptable location area comprises a route defined by said second person.
 5. The system of claim 1 wherein said steps controlling said personal programmable communications device further comprise allowing said user to have access to confidential information of said first person upon receipt of said personal security code by said first server.
 6. The system of claim 1 wherein said confidential information comprises confidential financial data of said first person.
 7. The system of claim 1 wherein said Poisson parameter is settable by said second person but not by said first person. 