Method and system for reporting and monitoring location-related activities of mobile devices

ABSTRACT

This application relates to reporting and monitoring a location of a mobile device. Disclosed is an attendance recording service in which when an employee requests attendance recording using a mobile application installed in a smartphone, the smartphone communicates with a server and records clock-in and clock-out of the employee. When the employee selects an attendance recording request button from the mobile application, an analysis is made as to whether the employee is positioned in a workplace, and clock-in or clock-out of the employee is recorded only when it is determined that the employee is positioned in the workplace, thereby maintaining reliable attendance recording.

BACKGROUND

Field

The present application relates to reporting and monitoring a locationof a mobile device.

Related Technology

There are various methods of confirming and recording attendance ofemployees in workplaces. Recently, workplace computers are used forreporting attendance of employees. Meanwhile, with advancement ofwireless communication technologies, wireless devices such assmartphones can be used for confirming and recording the attendance.

SUMMARY

One aspect of the invention provides an attendance reporting system. Thesystem comprises one or more of the following features:

-   -   at least one beacon for installing at a designated facility for        an attendance reporting service, a first one of the at least one        beacon being installed at a first facility for the attendance        reporting service, each beacon being configured to broadcast        wireless signals such that the wireless signals can be received        by at least one mobile terminal located within the facility        where the beacon is installed, the wireless signals carrying one        or more selected from the group consisting of a service ID, a        hardware ID, a security code and a security key;    -   the server ID being pre-assigned to and indicative of the        attendance reporting service, the hardware ID being pre-assigned        and specific to hardware of the first beacon, the security code        being time-variant and generated by an algorithm included in the        first beacon, and the security key being a key for the security        code such that the same algorithm can generate the identical        security code when using the security key.    -   at least one database comprising data identifying facilities and        users and further comprising hardware IDs of beacons such that,        in the at least one database a first user working at a first        facility is linked to the first facility and a first beacon        installed in the first facility is linked to the first facility;    -   a mobile application provided for installation on mobile        terminals and for operation of the attendance reporting service,        the mobile application being installed on a first mobile        terminal; and    -   a server comprising at least one computing device capable of        accessing the at least one database and capable of communicating        with mobile terminals.

The foregoing system includes one or more of the additional features aslisted below:

-   -   subsequent to authentication of the first user for reporting        attendance via the mobile application installed on the first        mobile terminal, the server is configured to find the first        beacon in the at least one database using data identifying the        first user available from authenticating the first user based on        that in the at least one database the first beacon is linked to        the first facility and the first facility is linked to the first        user;    -   in response to the first user's command for reporting attendance        on the mobile application, the system is configured to cause        processing of wireless signals received by the first mobile        terminal to identify wireless signals broadcast by a beacon        associated with the attendance reporting service and further to        obtain the hardware ID, the security code and the security key        contained in the identified wireless signals;    -   subsequent to finding the first beacon in the at least one        database and further subsequent to obtaining the hardware ID,        the system is configured to determine if the obtained hardware        ID is that of the first beacon found in the at least one        database using the data identifying the first user;    -   subsequent to obtaining the security code and the security key,        the system is configured to determine if the obtained security        code is the one expected from the first beacon using the        obtained security key and an algorithm corresponding to the one        included in the first beacon for generating the security code;    -   the server is configured to record in the at least one database        the first user's attendance at the first facility in response to        the first user's command for reporting attendance when it is        determined that the obtained hardware ID is that of the first        beacon and further that the obtained security code is the one        expected from the first beacon.

Another aspect of the invention provides a method of processingattendance reporting. The method comprises providing the foregoingattendance reporting system with or without one or more additionalfeatures. The method further includes one or more of the additionalfeatures as listed below:

-   -   subsequent to installation of the first beacon at the first        facility and further subsequent to installation of the mobile        application on the first mobile terminal, authenticating, by the        server, the first user for reporting attendance via the mobile        application installed on the first mobile terminal;    -   subsequent to authentication of the first user, finding the        first beacon, the first facility or both in the at least one        database using data identifying the first user available from        authenticating the first user based on that in the at least one        database the first beacon is linked to the first facility and        the first facility is linked to the first user;    -   in response to the first user's command for reporting attendance        on the mobile application, causing to process wireless signals        received by the first mobile terminal to identify the wireless        signals broadcast by a beacon associated with the attendance        reporting service and further to acquiring the hardware ID, the        security code and the security key contained in the identified        wireless signals;    -   subsequent to finding the first beacon, the first facility or        both in the at least one database and further subsequent to        acquiring the hardware ID, determining if the acquired hardware        ID is that of the first beacon found in the at least one        database using the data identifying the first user;    -   subsequent to acquiring the security code and the security key,        determining if the acquired security code is the one expected        from the first beacon using the acquired security key and an        algorithm corresponding to the one included in the first beacon        for generating the security code; and    -   recording, in the at least one database, the first user's        attendance at the first facility in response to the first user's        command for reporting attendance when it is determined that the        acquired hardware ID is that of the first beacon and further        that the acquired security code is the one expected from the        first beacon.

The foregoing system or method may further include one or more of theadditional features that are defined in the claims such that the systemor method may include two or more features that are defined in differentclaims.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates an attendance recording system according to anembodiment of the present invention.

FIG. 2 illustrates an example of abuse using a copied beacon.

FIG. 3 illustrates another example of abuse using a workplace beaconoutside workplace.

FIG. 4 is a flowchart of an attendance recording method using the systemof FIG. 1.

FIG. 5 illustrates a setup process of the attendance recording system inthe method of FIG. 4.

FIG. 6 illustrates a process of recording attendance of an employee inthe method of FIG. 4.

FIG. 7 is a flowchart of processing a beacon signal in an embodiment ofthe present invention.

FIG. 8 illustrates a process of recording attendance of an employee inanother embodiment of the present invention.

FIG. 9 is an example of workplace records in the database of FIG. 1.

FIG. 10 is an example of employee records in the database of FIG. 1.

FIG. 11 is an example of beacon records in the database of FIG. 1.

FIG. 12 is an example of attendance event records in the database ofFIG. 1.

FIG. 13 is a flowchart of analyzing beacon signal strength for detectingabnormal activities according to an embodiment of the present invention.

FIG. 14 illustrates a normal profile of the beacon signal strengthreceived at the smartphone.

FIG. 15 illustrates an abnormal profile of the beacon signal strengthreceived at the smartphone.

FIG. 16 illustrates components of the server of FIG. 1.

FIGS. 17A to 17D illustrates user interfaces of a mobile applicationinstalled in the smartphone of FIG. 1.

DETAILED DESCRIPTION OF EMBODIMENTS

Hereinafter, embodiments of the present invention will be described withreference to the drawings. These embodiments are provided for betterunderstanding of the present invention, and the present invention is notlimited only to the embodiments. Changes and modifications apparent fromthe embodiments still fall in the scope of the present invention. Somefunctions in the embodiments of the present invention can be implementedin the form of program instructions that can be executed in variouscomputing devices and recorded in computer-readable recording media. Thecomputer-readable recording media may include program instructions, datafiles, data structures and the like. Some of hardware devices used inthe embodiments of the present invention can be implemented in softwaremodules, and vice versa. Meanwhile, the claims constitute part of thedetailed description of this application.

Attendance Recording Service Using Smartphone

This application discloses an attendance recording service, in which inresponse to an employee's request for attendance reporting using amobile application installed in a smartphone, the smartphonecommunicates with a server and records clock-in and clock-out of theemployee. When the employee selects an attendance recording requestbutton on the mobile application, an analysis is made as to whether theemployee is positioned in a workplace, and clock-in or clock-out of theemployee is recorded if it is determined that the employee is at theworkplace, thereby maintaining a reliable attendance record.

Confirming Position Using Beacon Signals

A wireless signal from a beacon installed in the workplace is used todetermine whether an employee is at the workplace. When the attendancerecording request button is selected on the mobile application, thesmartphone acquires wireless signals from beacons located in thevicinity. By analyzing the acquired signals, determination may be madeas to whether the employee is positioned at the workplace. The beacon'swireless signal reaches only a limited area around the beacon (e.g., 5 mto 15 m) and contains information identifying the workplace where thebeacon is installed. Accordingly, as the smartphone analyzes theacquired beacon signal, confirmation may be made as to whether thesignal is broadcast from the particular beacon installed in theworkplace, and attendance is recorded only when it is confirmed that theacquired signal is off the particular beacon of the workplace.

Attendance Recording System

FIG. 1 illustrates an environment for implementing an attendancerecording system according to an embodiment of the invention. A beacon100 for broadcasting a wireless signal is installed at a workplace 200.An employee goes to the workplace 200 with a smartphone 300. Thesmartphone 300 may detect signals from the beacon and communicates witha server 400 through a network 600. A database 500 connected to theserver stores information for identifying the employee, workplace andbeacon and also stores an attendance event log.

Abuse

An attendance recording method using a wireless signal of a beacon maybe vulnerable to certain abuses. First, one may replicate the workplacebeacon. As shown in FIG. 2, using a signal from the copied beacon 120,attendance can be recorded even outside the workplace 200 where signalsfrom the original beacon 100 is not available. Also, if a signal of theworkplace beacon is copied and broadcast using another device, the sameproblem remains. As shown in FIG. 3, an employee may take the beacon 100to outside the workplace 200 and attempt to report attendance there.According to an embodiment of the present invention, exemplified abusesmay be addressed.

Attendance Recording System

Smartphone

In FIG. 1, the smartphone 300 is a mobile computing device capable ofreceiving and processing beacon signals and communicating with a serverusing a wireless communication network (a mobile phone network, a Wi-Finetwork, etc.). In embodiments, the smartphone may include a positionmeasurement module such as a GPS module. In embodiments, other mobilecomputing devices such as a tablet computer, a PDA, a notebook computerand the like capable of receiving and processing beacon signals andcommunicating with a server using a wireless communication network mayreplace the smartphone. In this application, the term smartphone is usedto refer to mobile computing devices for convenience.

Mobile Application

In embodiments, a mobile application for using the attendance recordingservice is installed in the smartphone 300. The mobile applicationincludes one or more software modules and implements the functions ofthe attendance recording service by controlling hardware of thesmartphone. In some embodiments, the mobile application is softwareseparately produced for the attendance recording service anddownloadable through a mobile application store or the like. In otherembodiments, other computer programs of a smartphone, such as a webbrowser, can be used instead of or together with the mobile applicationto implement functions of the attendance recording service.

Server

In embodiments as in FIGS. 1 and 16, the server 400 is formed with oneor more networked computing devices. The computing device includes oneor more processors, a memory and a communication interface forexchanging information with other devices. One or more software modulesare installed in the server to implement functions of the attendancerecording service while communicating with the smartphone.

Database

In embodiments as in FIGS. 1 and 9 to 12, the database 500 isimplemented in one or more memory devices and stores workplacesregistered for the attendance recording service, beacons installed inthe workplaces, information about employees working at the workplacesand logs of attendance events. The workplaces, beacons, employees andlogs of attendance events may be stored in separate database modules.

Network

In embodiments as in FIG. 1, the network 600 is a communication networkfor connecting the smartphone 300 and server 400, and includes wired andwireless communication connections. For example, the network 600 mayinclude all or some of a mobile phone network, a Wi-Fi network, anInternet and an Intranet.

Workplace

In embodiments as in FIG. 1, the workplace is a place in which employeeswork, such as an office, a store, a factory or the like, and refers to aplace in which one or more beacons are installed so that the employeesmay receive beacon signals using a smartphone. In some embodiments, theworkplace refers to a location or space (e.g., a door, a passage, alocker room and the like) within the office, store or factory that isdesignated for employees to stop by for receiving beacon signals toreport attendance.

Beacon

In embodiment as in FIG. 1, the beacon 100 is a device for broadcastinga wireless signal based on a wireless communication protocol such asBluetooth. In embodiments, wireless communication protocols other thanBluetooth (e.g., Near Field Communication) may also be applicable to thebeacon. In embodiments, the beacon 100 includes a processor, a memoryand a broadcasting module. The processor, the memory and broadcastingmodule may be implemented with a microcontroller unit (MCU). In anembodiment, the beacon maintains time information using a clock or acounter included therein.

Beacon does not Communicate with Server Two Way

In embodiments, the beacon is a low-power broadcasting device operatingwith battery power, without a separate power supply thereto. When abeacon is assigned to a workplace and initialized, the beaconcontinuously or periodically broadcasts preprogrammed wireless signals.In embodiments, the beacon's signal strength is set such that a devicesuch as a smartphone may detect within the workplace only. Accordingly,the signal from the beacon does not arrive at a server installed at aplace other than the workplace. In embodiments, the beacon does notperform two-way communication with the server and does not have acommunication module needed for such two-way communication with theserver.

Beacon Signals

The wireless signal from the beacon carries one or more of a service IDfor the attendance recording service, a hardware ID of the beacon, asecurity code, a key for the security code. In some embodiments, thebeacon signal carries all of the service ID, the hardware ID, thesecurity code and the key for the security code. In some embodiments,the beacon signal carries the service ID, the hardware ID and thesecurity code and does not include the key for the security code. Insome embodiments, the beacon signal carries the service ID and thehardware ID, and does not include a security code or a key for thesecurity code. In some embodiments, the beacon signal may furtherinclude additional information or data. Each of the data carried by thebeacon signal may be loaded in different fields of a beacon signalformat, or two or more data may be loaded in a single field. In someembodiments, the beacon signal is configured in a format conforming tothe iBeacon Specification and includes a Universally Unique IDentifier(UUID) field, a Major field, a Minor field and a Parity field.

Attendance Recording Service ID

The attendance recording service ID is used to identifying beaconwireless signals for the attendance recording service from otherwireless signals. When the smartphone receives a plurality of beaconsignals, the mobile application process to select only beacon signalshaving the service ID that is known to the mobile application. In someembodiments, all beacons for the same attendance recording servicetransmit the same service ID even if they are installed in differentworkplaces. In some embodiments, only some beacons for the same servicetransmit the same service ID while other beacons transmit a differentservice ID. In an embodiment, the service ID does not change over timewhile the beacon operates. In an embodiment, the service ID is stored inthe memory of the beacon, and once the beacon is installed in aworkplace, it is maintained unless the hardware ID of the beacon isupdated using a PIN.

Hardware ID

The hardware ID is an identifier unique to the hardware of a particularbeacon. For example, a MAC address assigned to a network interface ofthe beacon is used as the hardware ID of the beacon (see FIG. 11). In anembodiment, a randomly generated unique identifier is assigned to eachbeacon and used as a hardware ID of the beacon. In an embodiment, thehardware ID does not change over time while the beacon operates. In anembodiment, the hardware ID is stored in the memory of the beacon.

Security Code

The security code is to prevent abuse of replicating the beacon or itssignal. In embodiments, the security code changes over time. As in FIG.3, the security code is periodically and repetitively updated fortransmission. The interval for updating the security codes may be oneminute, ten minutes, thirty minutes, one hour, eight hours, twenty-fourhours, five days and seven days. The security code is valid for theperiod of update interval. In some embodiments, the security codechanges according to other parameters in addition to the time. Here,other parameters are, for example, the hardware ID, the workplace'sname, workplace's address, and the workplace's employer. In anembodiment, the beacon has an algorithm, a logic, software or the likefor generating a security code. For example, a Time-based One-timePassword Algorithm (TOTP) may be included in the beacon.

Security Key

A key of a security code is data from which the security code can beobtained using the same algorithm as used for generating the securitycode. In some embodiments, the server 400 has the same algorithm as thebeacon used for generating a security code. When a key is transmitted tothe server via the smartphone, the server computes a security code usingthe transmitted key, and the computed security code is compared with asecurity code obtained from a beacon signal. In some embodiments, thekey is a time when the security code is generated at the beacon or atime representing a time frame (update interval) during which thesecurity code is valid. In another embodiment, the key is a modificationof a time and can be calculated back to the time. In another embodiment,if the beacon is synchronized with the smartphone or the server, thesecurity code can be generated using the time of the smartphone or theserver when the time of the beacon is not available from a beaconsignal. In this case, for example, a time when the employee pressed theattendance recording request button, a time when the beacon signal isobtained at the smartphone, a time when the server receives the securitycode can be used to generate the security code without referring to akey in the beacon signal. In an embodiment, the key contained in thebeacon signal does not include all parameters for generating thesecurity code, and some parameters for generating the security code(e.g., a current time of the server or the smartphone, an employee ID,an address of the workplace and the like) which are not contained in thebeacon signal and can be obtained from other information sources (thedatabase or the like).

Process of Attendance Recording Service

A setup process (4100) of the attendance recording system is performedprior to recording attendance using a smartphone. Referring to FIG. 4,setup of the attendance recording system includes registering aworkplace (4110), installing a beacon in the registered workplace(4120), and registering an employee working at the workplace (4130).After the setup process is completed, when an employee signs in theattendance recording service using a mobile application of thesmartphone 300, the server authenticates the employee (4210).Subsequently, when the smartphone receives signals of a nearby beacon(4220), the employee's presence in the workplace is verified based onanalysis of the received signals of the beacon (4230).

Process of Attendance Recording Service

Sign-Up of Employer (5100, 5110)

Referring to FIGS. 4 and 5, in embodiments, an employer operating aworkplace signs up the attendance recording service (5110). The serverrecords information (e.g., a name, contact information, an address) ofthe employer in the database and creates an account of the employer(5120). The sign-up of the employer is performed using a mobileapplication after installing the mobile application (5100) on theemployer smartphone 350.

Registration of Employer's Workplace (5130, 5140)

Referring to FIGS. 4 and 5, in embodiments, the employer subscribing theattendance recording service provides to the server 400 information of aworkplace that the employer operates and registers the workplace in thedatabase 500. In an embodiment, the information of the workplaceprovided to the server includes at least one of a name, an address, GPScoordinates, contact information of a manager and business hours of theworkplace. In an embodiment, the server 400 links the workplace and theemployer in the database 500.

Assign Beacon to Workplace (5150)

Referring to FIGS. 4 and 5, in embodiments, at least one beacon isassigned to each of the workplaces registered in the database. Inembodiments, beacons assigned to the workplace are linked to theworkplace in the database 500. In embodiments, the beacon is initializedbefore installing it in the workplace to which the beacon is assigned.

Initialization and Installation of Beacon

In embodiments, the beacon is programmed to broadcast wireless signals.In the embodiments of FIGS. 5 and 6, signals broadcast by the beaconincludes an attendance recording service ID, a beacon hardware ID, asecurity code and a key of the security code. In beacon initialization,time of the beacon may be synchronized with the server. The beacon isinstalled in a workplace and broadcasts wireless signals continuously orperiodically (6100).

Employee Sign-Up (5160)

Referring to FIG. 5, in the embodiments, an employee working at theworkplace registered by the employer installs the mobile application inthe smartphone 300 (5160) and signs up the attendance recording service(5170). The server 400 receives information of the employee andregisters an account of the employee by recording the information of theemployee in the database 500 (5180). In an embodiment, the informationon the employee provided to the server includes at least one of a nameand a contact (an e-mail address and a phone number) of the employee,and a model name of the smartphone and a serial number of thesmartphone.

Registration of Employee's Workplace (5220, 5230, 5240, 5250, 5260)

Referring to FIG. 5, in the embodiments, the employee searches forworkplaces using the smartphone and selects the workplace where theemployee works (5220). If the employee inputs (selects) the workplacewhere the employee works, a request to confirm the employee's workplaceis transmitted from the smartphone to the server. The server 400 placesa request to confirm the employee's workplace to the account of theemployer (5230). If the employer signs in (5240) and confirms theemployee's workplace (5260), the server 400 links the employee and theworkplace in the database 500. In an embodiment, a working schedule ofthe employee is recorded in the database 500 as well, based on theemployer's confirmation (approval).

Token Genration and Employee Authentication (5180, 5190, 5200, 5210)

Referring to FIG. 5, in the embodiments, if the employee signs in usinghis/her ID and password at the mobile application, the server generatesa token corresponding to a combination of the ID and password (5180) andsends the token to the mobile application of the smartphone. The tokengenerated by the server and transferred to the smartphone is a securedunique identification code for identifying the employee signed in usingthe ID and the password. Accordingly, an identifier of the employee canbe derived from the token. The mobile application stores the receivedtoken in the memory of the smartphone. If the mobile application isdeactivated (terminated or put into standby) and then activated(executed) while the employee does not sign out, the token stored in thememory of the smartphone is transmitted to the server. The server 400performs authentication on the employee's account using the receivedtoken (5210, 6120).

Providing Identifier of Assigned Beacon to Smartphone (6120)

In an embodiment, the server 400 performs authentication for theemployee using the token received from the smartphone 300. In anotherembodiment, alternatively to or together with the token, otheridentifiers (the employee's ID for the attendance recording service, oran identifier of the employee' smartphone) can be used to authenticatethe employee. Referring to FIG. 6, immediately after the authenticationfor the employee is completed, without a delay, the server 400identifies a workplace linked to the employee, and a beacon linked tothe workplace from the database 500 (see FIGS. 9 to 12), transmits tothe smartphone the hardware ID of the beacon installed in the employee'sworkplace. In an embodiment, the smartphone stores the hardware IDprovided by the server in its local memory. In an embodiment, inaddition to the hardware ID of the beacon assigned to the workplace,information on the workplace including at least one of a name, anaddress, GPS coordinates and business hours of the workplace is providedto the smartphone.

Activation of Attendance Recording Request Button, Receiving EmployeeInput (6130, 6140)

In the embodiments of FIG. 6, after the authentication of the employee'saccount is completed, the mobile application of the smartphone activates(displays or emphasizes) the attendance recording request button (anicon on the screen) and waits for an input of the employee. In anembodiment, along with the attendance recording request button, thesmartphone 300 also provides information of the workplace for which theemployee's attendance will be recorded based on selection of theattendance recording request button. In an embodiment, the informationof the workplace for which attendance will be recorded is identified bythe server 400 from the database 500 using the employee's identificationthat the server 400 provided to the smartphone 300 prior to activationof the attendance recording request button. If an input of the employeefor the attendance recording request button is received (6140), thesmartphone stores a time of the employee's input on the attendancerecording request button and collects signals of nearby beacons.

Acquisition and Processing of Beacon Signals (6150)

Referring to FIG. 6, in the embodiments, the smartphone collects beaconsignals using its wireless communication module. The smartphone 300acquires, from the beacon signals, a hardware ID of the beacon, asecurity code and a key of the security code. In an embodiment, thesmartphone referring to the service ID of the beacon signals (e.g., aUUID of the iBeacon specification) may selectively process only thebeacon signals having a service ID of the attendance recording service.In some embodiments, the smartphone collects beacon signals only for apredetermined duration (e.g., one second, three seconds, twenty seconds,one minute, five minutes or the like) after the attendance recordingrequest button is selected by the employee.

Verifying Match of Hardware ID (6160)

In the embodiments of FIG. 6, subsequent to the authentication of theemployee's account, the smartphone 300 determines whether the hardwareID acquired from the beacon signals matches the hardware ID (identifiedby the server from the database using the employee's identification)received from the server.

Verifying Match of Security Code (6160, 6170)

In the embodiments of FIG. 6, the smartphone 300 transmits the securitycode and the key of the security code obtained from the beacon signalsto the server 400. In an embodiment, the key is the time used forgenerating the security code at the beacon. The server 400 generates asecurity code using the same algorithm as the beacon used for generatingthe security code. The server 400 determines whether the security codeobtained from the beacon signals matches the security code generated bythe server. In an embodiment, the server 400 receives a hardware ID anda time contained in the beacon signals from the smartphone, and usesthem to generate a security code.

Recording Employee's Attendance (6180)

In the embodiments of FIG. 6, if (1) the hardware ID obtained from thebeacon signals by the smartphone matches the hardware ID identified fromthe database using the employee's identification and (2) the securitycode obtained from the beacon signals matches the security codegenerated by the server, the server 400 determines that the employee hasrequested attendance reporting at the employee's workplace and recordsthe employee's attendance in the database.

Two or More Workplaces of Employee

In some embodiments, if two or more workplaces are linked to theemployee in the database 500, the server 400 transfers hardware IDs ofall the beacons assigned to the two or more workplaces to the smartphone300. In another embodiment, the server selectively provides a subset ofhardware IDs of the beacons.

Server Determines Expected Workplaces and Transmits Related Information

In some embodiments, if the authentication is completed, the server 400identifies one or more workplaces where the employee is expected toreport his/her attendance by comparing a working schedule of theemployee recorded in the database 500 with a current time. The server400 provides, to the smartphone, information linked to the expectedworkplaces (names of the workplaces, addresses, GPS coordinates,hardware IDs of beacons installed in the expected workplaces and thelike) in the database 500. For example, assuming that a employee worksat workplace A from 9 a.m. to 5 p.m. on weekdays and works at workplaceB from 1 p.m. to 6 p.m. on Saturday, and that the employee activates themobile application at 8 a.m. on Monday, the server identifies workplaceA having the most close working schedule to the current time as anexpected workplace of attendance reporting, and transmits hardware IDsof the beacons installed in the workplace A to the smartphone while nottransmitting hardware IDs of the beacons installed in the workplace B tothe smartphone.

Process of Attendance Recording Service

Acquiring Beacon Dignals (710)

Referring to FIG. 6, in embodiments, the smartphone collects signalsfrom nearby beacons immediately after the employee presses theattendance recording request button. In other embodiments, thesmartphone continuously or periodically scans beacon signals regardlessof selection of the attendance recording request button. For example,the mobile application running in the background scans beacon signalsand records the detected beacon signals even while the mobileapplication is not displayed on a screen of the smartphone.

Screening of Beacon Signals (720)

In some embodiments, when multiple beacon signals are available at thesame time, the smartphone 300 selectively acquires and processes asubset of the multiple beacon signals. For example, the smartphoneverifies whether the service ID of the sensed beacon signal is identicalto at least one of service IDs registered in the database. To this end,the server provides the smartphone with the service IDs registered inthe database before the smartphone acquires the beacon signals.

Selective Processing of Multiple Beacon Signals Available

The smartphone has information regarding what is the service ID appliedto the beacons for implementing the attendance recording service. Whenseveral beacon signals are sensed at the smartphone, beacon signalshaving a service ID different from service IDs known to the smartphoneare ignored, and they are not used for attendance recording for theemployee. For such selective processing, the beacon's service ID foremployee attendance recording was stored in the memory of the smartphoneprior to obtaining the beacon signals (710). In an embodiment, theserver provides the smartphone with the service ID of the beacon of theemployee's workplace, or all service IDs on the database.

Acquiring Hardware ID and Security Code from Beacon Signal (730)

In an embodiments of FIG. 6, the smartphone obtains the hardware ID, thesecurity code and the key of the security code from the beacon signals.In other embodiments, the smartphone 300 forwards the beacon signals tothe server 400 and the server 400 acquires the hardware ID, the securitycode and the key for the security code from the forwarded beaconsignals.

Verifying Hardware ID of Beacon Signal (740)

Referring to FIG. 6, in embodiments, verification of matching betweenthe hardware ID of the beacon signals and the hardware ID identifiedfrom the database (6160 of FIG. 6) is performed at the smartphone. Inother embodiments, verification of matching between the hardware IDs canbe performed in the server 400. In such cases, before the serverperforms verification of matching between the hardware IDs, thesmartphone provides the server 400 with the beacon signals obtained atthe smartphone or the hardware ID obtained from the beacon signals. Inan embodiment, when the hardware ID obtained from the beacon signalsmatches the hardware ID identified from the database based on theemployee's identification, it is determined that the beacon broadcastthe beacon signals is a valid (original) one.

Verification of Hardware ID—Limited Comparison with Beacons of EmployeeWorkplace

In the hardware ID verification (6160) of FIG. 6, the hardware IDacquired from the beacon signals at the smartphone is compared with thehardware ID of the beacon installed in the authenticated employee'sworkplace, rather than with all beacon hardware IDs stored in thedatabase 500. When the hardware ID obtained from the beacon signals iscompared with limited numbers of target hardware IDs selected based onthe identifier of the employee, faster verification is possible. In someembodiments, when a working schedule of the employee is consideredadditionally, among the beacons of the workplace linked to the employee,the numbers of target hardware IDs to be considered for the hardware IDverification can be further reduced.

Verification of Security Code (750)

In the embodiments of FIG. 6, verifying match of beacon security code(6170) is performed at the server 400. In other embodiments, thesecurity code match verification (6170) can be performed at thesmartphone rather than the server 400. In such cases, the smartphone hasthe same algorithm, logic, software or the like as the beacon used forsecurity code generation, and generates a security code using a keyobtained from a beacon signal using the algorithm. In an embodiment,when the security code acquired from the beacon signals matches thesecurity code generated by the server or smartphone, it is determinedthat the beacon broadcast the beacon signals is a valid one (original).

Process of Attendance Recording Service—Using Location of Smartphone

Referring to FIG. 8, in embodiments, the smartphone's GPS locationinformation (GPS coordinates) can be used for determining the employee'slocation. If the employee requests attendance recording using thesmartphone, the smartphone 300 transmits GPS location information to theserver (8110). The server 400 verifies whether the employee is locatedat the workplace (8120) by determining whether the GPS locationinformation of the smartphone 300 matches a location (GPS coordinates oran address) of the employee's workplace (e.g., whether a distancebetween the smartphone's location and the workplace's location is notgreater than a predetermined distance). In an embodiment, only when thelocation information of the smartphone matches the location informationof the employee's workplace, the server 400 records attendance of theemployee in the database (6180). In an embodiment, verification of theGPS position information match (8120) can be performed in the smartphonerather than the server. In some embodiments, if (1) the hardware IDacquired by the smartphone from the beacon signals matches the beaconhardware ID identified from the database using the employee'sidentification and (2) the smartphone's location matches the locationinformation of the employee's workplace, the server determines that theemployee has requested attendance reporting at the workplace and recordsattendance of the employee in the database 500. In another embodiment,other information that indicating the smartphone's location, such asinformation of a recently connected wireless communication station andan IP address of the smartphone, can be considered alternatively to ortogether with the GPS location information.

Analyzing Beacon Signal Profile

FIG. 13 illustrates a process of detecting an abnormal pattern of beaconsignals according to an embodiment of the present invention. FIGS. 14and 15 illustrate profiles of beacon signal strength according to anembodiment of the present invention. When a beacon is taken out of aworkplace as illustrated in FIG. 3, it may be difficult to detect suchabuse by analyzing beacon signals of a limited time period (during aworking schedule) because signals of the original beacon will still bereceived at the smartphone. However, when the strength of beacon signalsat the employee's smartphone outside the working schedule is monitoredadditionally, it may be determined whether the employee records his/herattendance using the beacon taken out of the workplace.

Monitoring Beacon Signal Strength (1210)

In embodiments, the smartphone 300 periodically scans beacon signals andrecords a Received Signal Strength Indicator (RSSI) of the beaconsignals. In an embodiment, even when the mobile application forattendance recording is not activated, the smartphone 300 periodicallyobtains signals from nearby beacons while running in the background. Inan embodiment, the smartphone maintains a signal strength profile onlyfor the signals having the hardware ID of the beacon assigned to theemployee's workplace.

Analyzing Beacon Signal Strength Profile (1220)

The signal profile of the beacon assigned to the employee's workplace isanalyzed at the server or the smartphone. In an embodiment, a profilecontaining beacon signal strength outside the employee's workingschedule is analyzed at the smartphone 300, and the smartphone 300provides the analysis result to the server while providing the beaconsignal strength profile to the server 400.

Detecting Abnormal Signal Strength (1230)

Since the employee is generally outside the workplace after clocking out(e.g., during sleeping hours), it is not likely for the smartphone tosense to detect signals from the workplace's beacon after clock-out.FIG. 14 illustrates a profile of the beacon signal strength at thesmartphone of the employee who clocks in at 9 a.m. and clocks out at 5p.m. When the employee clocks in at 9 a.m., the beacon signal strengthincreases beyond a minimum expected signal strength of the workplace.After the employee clocks out at 5 p.m., the beacon signal decreasesbelow the minimum expected signal strength of the workplace. The beaconsignal is not detected during the night after 8 p.m. However, when theemployee carries the beacon outside the workplace, the beacon signalwill be sensed at the smartphone even outside the working schedule asillustrated in FIG. 15. Particularly, if the beacon signal does not fallbelow the minimum signal strength of the workplace even after thescheduled clock-out of 5 p.m. and maintains the signal strengths thatare expected at the workplace, the signal profile is abnormal. In anembodiment, if a beacon signal higher than a reference value is sensedat the smartphone even after a predetermined time from the scheduledclock-out according to the working schedule stored in the database 500,it is determined as an abnormality.

Database

Workplace Information Database

FIG. 9 illustrates information of workplaces recorded in a databaseaccording to an embodiment. A unique identifier is assigned to each ofthe workplaces. A unique identifier of a beacon assigned to a workplaceis linked to the unique identifier of the workplace. A unique identifierof an employee working at the workplace is also linked to the uniqueidentifier of each workplace. In an embodiment, information such as aname, an address, GPS coordinate information, business hours of aworkplace is linked to the unique identifier of the workplace and storedin the database.

Employee Information Database

FIG. 10 illustrates information of employees recorded in a databaseaccording to an embodiment of the present invention. A unique identifieris assigned to each of the employees. In an embodiment, employee'scontact information, a smartphone device model, a smartphone serialnumber, a workplace and a working schedule at the workplace are recordedin the database in connection with the identifier of the employee.

Beacon Information Database

FIG. 11 illustrates information of beacons stored in a databaseaccording to an embodiment of the present invention. In connection to anidentifier of a beacon, information such as a workplace wherer thebeacon is installed, an initialization or installation date of thebeacon, a firmware version of the beacon, a pin code for updating thebeacon, a beacon data transmission period, a beacon security codeupdating period may be recorded in the database.

Attendance Log Database

FIG. 12 illustrates an attendance log stored in a database according toan embodiment of the present invention. The attendance log includesinformation regarding clock-in and clock-out of employees. For example,information such as a time when an employee reported workplace check-in(Clock-in time), an identifier of a smartphone used for check-inreporting (Clock-in smartphone ID), an identifier of a beacon of whichsignal is sensed by the smartphone at the time of check-in reporting(Clock-Beacon ID) can be recorded in the database in connection with theidentifier of the employee and the identifier of the workplace.

Configuration of Server

FIG. 16 illustrates configuration of a server according to anembodiment. The server 400 includes one or more processors 1510, amemory configured to store software executable by the processors, and acommunication interface for communicating with other devices. The server400 implements features of the attendance recording system based onexecution of software modules. Referring to FIG. 16, the server hassoftware modules such as a token generation module, an authenticationmodule, a hardware ID verification module, a security code verificationmodule, an attendance event log management module, and an abnormalphenomenon detection module.

User Interface

FIG. 17A illustrates an interface displayed on the smartphone 300 afterauthentication for an employee is completed. The smartphone displays anupcoming working schedule 1610 of the authenticated employee, a currenttime 1620, and an attendance event 1630. A clock-in button and aclock-out button are displayed in association with the working schedule1610. FIG. 17B illustrates activation of the clock-in button. FIG. 17Cillustrates display of attendance reporting progress 1640 in response tothe selection of the clock-in button. FIG. 17D illustrates a message1650 that clock-in of the employee is confirmed.

Transmission Period of Beacon Data

In embodiments, a beacon periodically transmits at least one of theattendance service ID, the hardware ID of the beacon, the security codeand the key of the security code. The data transmission period can be,for example, one selected among a half second, one second, two seconds,three seconds, five seconds, ten seconds and one minute. In anembodiment, the data transmission period of the beacon is longer thanthe time period allowed for beacon signals collection (time-out) by thesmartphone in response to the employee's selection of the attendancerecording request button. For example, if the smartphone collects beaconsignals only for three seconds as the employee selects the attendancerecording request button, the beacon is set to transmit its data atleast one time during the allowed three seconds. In other embodiments,the data transmission period of the beacon is adjusted to generatewireless signals more frequently during a business opening time period(or a business closing time frame) of the workplace, when compared tothe other time periods. For example, when the business opening ofworkplace A is 9 a.m., a beacon installed at the workplace A maytransmit its data more frequently during a time period starting 9:30a.m. than a time period ending 9:30 a.m. (for example, from 8:30 a.m.until 9:30 a.m.).

Attendance Includes Clock-in and Clock-Out

In embodiments, attendance means clock-in and clock-out of an employee.In this application, procedures of recording clock-in of an employee andtheir description can be applied for procedures of recording clock-out.

Duplicated Beacon Signals

In embodiments, the server or the smartphone examine whether a beaconsignal collected at the smartphone for employee attendance reporting isduplicated to a previously collected beacon signal having the samehardware ID, and may not approve the attendance reporting based on theexamination. For example, if two beacon signals having the same hardwareID collected with a time difference (one hour) longer than a time periodof security code updating (e.g., fifteen minutes) have the same securitycode, it may be determined as an indication of potential abuse. Forexample, in a case where a beacon installed in a workplace updates thesecurity code every one hour, if a beacon signal collected on July 29and another beacon signal collected after a day have the same hardwareID and the same security code, it is a basis of rejecting the attendancerecording (or a basis of determining an abuse).

Attendance Recording Based on Smartphone ID Match

In embodiments, when the employee activates the mobile application inthe smartphone 300, the identifier of the smartphone is transmitted tothe server. The server 400 determines whether the transferred identifierof the smartphone matches the identifier of the smartphone linked to theemployee in the database. In some embodiments, the server may recordattendance of the employee only when matching between the smartphoneidentifiers is verified. In some embodiments, if the identifier of thesmartphone transferred to the server does not match the identifierrecorded in the database, the server may not approve an attendancerecording request of the employee, notify mismatch of the identifier tothe manager of the store, or transmit a request to register a newsmartphone to the employee.

Combination of Multiple Criteria for Attendance Recording

In an embodiment, the attendance recording system may approve employee'sattendance recording request or determine a potential abuse byconsidering at least one of the following criteria including (1) whetherthe hardware ID acquired from the beacon signals at the smartphonematches the hardware ID identified from the database using theemployee's identifier, (2) whether the security code acquired from thebeacon signals matches the security code generated at the server, (3)whether location of the smartphone matches location of the employee'sworkplace (within a predetermined range), (4) whether the beacon signalcurrently acquired for attendance reporting is duplicated to anotherbeacon signal previously used for attendance reporting of the sameemployee, and (5) whether the employee uses different smartphones forattendance reporting.

What is claimed is:
 1. A method of processing attendance reporting, themethod comprising: providing at least one beacon for installing at adesignated facility for an attendance reporting service such that afirst beacon is installed at a first facility for the attendancereporting service, each beacon being configured to broadcast wirelesssignals such that the wireless signals can be received by at least onemobile terminal located within the facility where the beacon isinstalled, the wireless signals carrying a service ID and a hardware ID,the service ID being pre-assigned to and indicative of an attendancereporting service, the hardware ID being pre-assigned and specific tohardware of the first beacon; providing at least one database comprisingdata identifying users and facilities and further comprising hardwareIDs of beacons such that, in the at least one database a first userworking at a first facility is linked to the first facility and a firstbeacon installed in the first facility is linked to the first facility;providing a mobile application for installation on mobile terminals andfor operation of the attendance reporting service such that the mobileapplication is installed on a first mobile terminal; providing a servercomprising at least one computing device capable of accessing the atleast one database and capable of communicating with mobile terminals;subsequent to installation of the first beacon at the first facility andfurther subsequent to installation of the mobile application on thefirst mobile terminal, authenticating, by the server, the first user forreporting attendance via the mobile application installed on the firstmobile terminal; subsequent to authentication of the first user, findingthe first beacon, the first facility or both in the at least onedatabase using data identifying the first user based on that in the atleast one database the first beacon is linked to the first facility andthe first facility is linked to the first user, wherein a particularhardware ID of the first beacon is identified by finding the firstbeacon, the first facility or both identifies; in response to the firstuser's command for reporting attendance on the mobile application,causing to process wireless signals received by the first mobileterminal to identify the wireless signals broadcast by a beaconassociated with the attendance reporting service and further to acquirethe hardware ID contained in the identified wireless signals; subsequentto finding the first beacon, the first facility or both in the at leastone database and further subsequent to acquiring the hardware ID,comparing the acquired hardware ID against the particular hardware ID ofthe first beacon found in the at least one database using the dataidentifying the first user; subsequent to determining that the acquiredhardware ID is that of the first beacon, monitoring signal strength ofthe wireless signals broadcast by the first beacon; and processing asignal strength profile of the wireless signals broadcast by the firstbeacon over time to determine a predetermined pattern of abnormalityindicating a potential abuse in attendance reporting, wherein in thepredetermined pattern, the signal strength stays stronger than areference level in a time frame at which the first user is not expectedto be at the first facility.
 2. The method of claim 1, wherein causingto process wireless signals received by the first mobile terminal toidentify the wireless signals comprises determining if the receivedwireless signals broadcast by a beacon contains the service ID that ispre-assigned to and indicative of the attendance reporting service. 3.The method of claim 1, wherein the mobile application installed on thefirst mobile terminal contains the service ID for the attendancereporting service, wherein determining comprises checking to see if theservice ID contained in the mobile application matches data contained inthe wireless signals that the first mobile terminal has received,wherein acquiring the hardware ID from the identified wireless signalsis performed in parallel or in an order with a time gap between twoconsecutive acquisitions such that one or more steps of operationintervene between the two consecutive acquisitions.
 4. The method ofclaim 1, wherein the first user's command for reporting attendance atthe first facility occurs prior to authenticating the first user,wherein identifying the wireless signals broadcast by a beaconassociated with the attendance reporting service is performed by thefirst mobile terminal alone, by the server alone or by the first mobileterminal and the server in combination.
 5. The method of claim 1,wherein the first user's command for reporting attendance occurssubsequent to authenticating the first user and further subsequent tofinding the first beacon, the first facility or both in the at least onedatabase, wherein acquiring the hardware ID contained in the identifiedwireless signals is performed by the first mobile terminal alone, by theserver alone or by the first mobile terminal and the server incombination.
 6. The method of claim 1, wherein the first mobile terminalprocesses the identified wireless signals to acquire the hardware ID andtransmits the hardware ID to the server, wherein the server determinesif the hardware ID from the first mobile terminal matches the hardwareID of the first beacon found in the at least one database using the dataidentifying the first user.
 7. The method of claim 1, wherein subsequentto the first user's command for reporting attendance occurs subsequentto authenticating the first user and further subsequent to finding thefirst beacon, the first facility or both in the at least one database.8. The method of claim 7, wherein subsequent to finding the firstbeacon, the first facility or both in the at least one database, theserver communicates with the first mobile terminal to cause the mobileapplication of the first mobile terminal to provide a prompt or buttonfor the first user to make the command for reporting attendance.
 9. Themethod of claim 7, wherein the first user is linked to a second facilitythat is linked to a second beacon of the at least one beacon, whereinsubsequent to authentication of the first user, the server further findsthe second beacon, the second facility or both in the at least onedatabase using the data identifying the first user, wherein subsequentto finding, the server transmits data to the first mobile terminal tocause the mobile application to provide a prompt for choosing betweenthe first facility and the second facility prior to making the commandfor reporting attendance.
 10. The method of claim 7, wherein subsequentto finding the second beacon, the second facility or both in addition tofinding the first beacon, the first facility or both, the server, themobile application or both in combination processes to determine whichof the first and second facilities is the one the first user is morelikely to be based on one or more selected from the group consisting ofday of the week, time of the day, GPS information from the first mobileterminal and the first user's schedule stored in the at least onedatabase, wherein upon determination, the mobile application presentsthe more likely option between the first and second facilities to selectmore conveniently than the less likely option between the first andsecond facilities.
 11. The method of claim 7, wherein finding the firstbeacon, the first facility or both in the at least one database isperformed by the server, wherein subsequent to finding, the servertransmits the hardware ID of the first beacon to the first mobileterminal, which causes the mobile application to provide a prompt orbutton for the first user to make the command for reporting attendance.12. The method of claim 11, wherein in response to the first user'scommand for reporting attendance, the mobile application determines ifthe hardware ID acquired from the wireless signals matches the hardwareID of the first beacon received from the server.
 13. The method of claim1, wherein the wireless signals further carry a security code and asecurity key, the security code being time-variant and generated by analgorithm included in each beacon, the security key being a key for thesecurity code such that the same algorithm can generate the identicalsecurity code when using the security key, wherein the method furthercomprises: in response to the first user's command for reportingattendance on the mobile application, causing to process wirelesssignals received by the first mobile terminal to acquire the securitycode and the security key contained in the identified wireless signals;subsequent to acquiring the security code and the security key,determining if the acquired security code is the one expected from thefirst beacon using the acquired security key and an algorithmcorresponding to the one included in the first beacon for generating thesecurity code; and recording, in the at least one database, the firstuser's attendance at the first facility in response to the first user'scommand for reporting attendance when it is determined that the acquiredhardware ID is that of the first beacon and further that the acquiredsecurity code is the one expected from the first beacon.
 14. The methodof claim 13, wherein acquiring the security code and the security keyfrom the identified wireless signals is performed in parallel or in anorder with a time gap between two consecutive acquisitions such that oneor more steps of operation intervene between the two consecutiveacquisitions.
 15. A method of processing attendance reporting, themethod comprising: providing at least one beacon for installing at adesignated facility for an attendance reporting service such that afirst beacon is installed at a first facility for the attendancereporting service, each beacon being configured to broadcast wirelesssignals such that the wireless signals can be received by at least onemobile terminal located within the facility where the beacon isinstalled, the wireless signals carrying a service ID and a hardware ID,the service ID being pre-assigned to and indicative of an attendancereporting service, the hardware ID being me-assigned and specific tohardware of the first beacon; providing at east one database comprisingdata identifying users and facilities and further comprising hardwareIDs of beacons such that, in the at least one database a first userworking at a facility is linked to the first facility and a first beaconinstalled in the first facility is linked to the first facility;providing a mobile application for installation on mobile terminals andfor operation of the attendance reporting service such that the mobileapplication is installed on a first mobile terminal; providing a servercomprising least one computing device capable of accessing the at leastone database and capable of communicating with mobile terminals;subsequent to installation of the first beacon at the first facility andfurther subsequent to installation of the mobile application on thefirst mobile terminal, authenticating, by the server, the first user forreporting attendance via the mobile application installed on the firstmobile terminal; subsequent to authentication of the first user, findingthe first beacon, the first facility or both in the at least onedatabase using data identifying the first user based on that in the atleast one database the first beacon is linked to the first facility andthe first facility is linked to the first user, wherein a particularhardware ID of the first beacon is identified by finding the firstbeacon, the first facility or both identifies; in response to the firstuser's command for reporting attendance on the mobile applicationcausing to process wireless signals received by the first mobileterminal to identify the wireless signals broadcast by a beaconassociated with the attendance reporting service and further to acquirethe hardware ID contained in the identified wireless signals; subsequentto finding the first beacon, the first facility or both in the at leastone database and further subsequent to acquiring the hardware ID,determining if the acquired hardware ID is the particular hardware ID ofthe first beacon found the at least one database using the dataidentifying the first user; subsequent to determining that the acquiredhardware ID is that of the first beacon, monitoring signal strength ofthe wireless signals broadcast by the first beacon; and processing asignal strength profile of the wireless signals broadcast by the firstbeacon over time to determine a predetermined pattern of abnormalityindicating a potential abuse in attendance reporting, wherein in thepredetermined pattern, the signal strength stays stronger than areference level and substantially constant in a time frame at which thefirst user is not expected to be at the first facility.
 16. A method ofprocessing attendance reporting, the method comprising: providing atleast one beacon for installing at a designated facility for anattendance reporting service such that a first beacon is installed at afirst facility for the attendance reporting service, each beacon beingconfigured to broadcast wireless signals such that the wireless signalscan be received by at least one mobile terminal located within thefacility where the beacon is installed, the wireless signals carrying ahardware ID, pre-assigned and specific to hardware of the first beacon,providing at least one database comprising data identifying users andfacilities and further comprising hardware IDs of beacons such that, inthe at least one database a first user working at a first facility islinked to the first facility and a first beacon installed in the firstfacility is linked to the first facility; providing a mobile applicationfor installation on mobile terminals and for operation of the attendancereporting service such that the mobile application is installed on afirst mobile terminal; providing a server comprising at least onecomputing device capable of accessing the at least one database andcapable of communicating with mobile terminals; subsequent toinstallation of the first beacon at the first facility and furthersubsequent to installation of the mobile application on the first mobileterminal, processing wireless signals received by the first mobileterminal to acquire the hardware ID contained in the wireless signals;subsequent to acquiring the hardware ID, determining if the acquiredhardware ID is a particular hardware ID of the first beacon using dataof the at least one database; subsequent to determining that theacquired hardware ID is that of the first beacon, monitoring signalstrength of the wireless signals broadcast by the first beacon; andprocessing a signal strength profile of the wireless signals broadcastby the first beacon over time to determine a predetermined pattern ofabnormality indicating a potential abuse in attendance reporting,wherein in the Predetermined pattern, the signal strength stays strongerthan a reference level in a time frame at which the first user is notexpected to be at the first facility.
 17. The method of claim 16,further comprising: subsequent to installation of the first beacon atthe first facility and further subsequent to installation of the mobileapplication on the first mobile terminal, authenticating, by the server,the first user for reporting attendance via the mobile applicationinstalled on the first mobile terminal.
 18. The method of claim 16,further comprising: subsequent to authentication of the first user,finding the first beacon, the first facility or both in the at least onedatabase using data identifying the first user based on that in the atleast one database the first beacon is linked to the first facility andthe first facility is linked to the first user, wherein finding thefirst beacon, the first facility or bot leads to identify the particularhardware ID of the first beacon, wherein determining if the acquiredhardware ID is the particular hardware ID of the first beacon comprisescomparing the acquired hardware ID against the identified particularhardware ID of the first beacon.
 19. The method of claim 16, furthercomprising: in response to the first user's command for reportingattendance on the mobile application, causing to process wirelesssignals received by the first mobile terminal to identify the wirelesssignals broadcast by a beacon associated with the attendance reportingservice, wherein acquiring the hardware ID is also performed in responseto the first user's command for reporting attendance on the mobileapplication.
 20. The method of claim 16, wherein the wireless signalsfurther carry a security code and a security key, the security codebeing time-variant and generated by an algorithm included in eachbeacon, the security key being a key for the security code such that thesame algorithm can generate the identical security code when using thesecurity key, wherein the method further comprises: in response to thefirst user's command for reporting attendance on the mobile application,causing to process wireless signals received by the first mobileterminal to acquire the security code and the security key contained inthe identified wireless signals.
 21. The method of claim 20, furthercomprising: subsequent to acquiring the security code and the securitykey, determining if the acquired security code is the one expected fromthe first beacon using the acquired security key and an algorithmcorresponding to the one included in the first beacon for generating thesecurity code.
 22. The method of claim 21, further comprising:recording, in the at least one database, the first user's attendance atthe first facility in response to the first user's command for reportingattendance when it is determined that the acquired hardware ID is thatof the first beacon and further that the acquired security code is theone expected from the first beacon.
 23. The method of claim 16, furthercomprising: in response to the first user's command for reportingattendance on the mobile application, causing to process wirelesssignals received by the first mobile terminal to identify the wirelesssignals broadcast by a beacon associated with the attendance reportingservice, wherein the wireless signals from the first beacon furthercarry a service ID pre-assigned to and indicative of the attendancereporting service, wherein causing to process wireless signals receivedby the first mobile terminal to identify the wireless signals comprisesdetermining if the received wireless signals broadcast by a beaconcontains the service ID that is pre-assigned to and indicative of theattendance reporting service.
 24. The method of claim 23, wherein themobile application installed on the first mobile terminal contains theservice ID for the attendance reporting service, wherein determiningcomprises checking to see if the service ID contained in the mobileapplication matches data contained in the wireless signals that thefirst mobile terminal has received, wherein acquiring the hardware ID,the security code and the security key from the identified wirelesssignals is performed in parallel or in an order with a time gap betweentwo consecutive acquisitions such that one or more steps of operationintervene between the two consecutive acquisitions.
 25. The method ofclaim 23, wherein the first user's command for reporting attendance atthe first facility occurs prior to authenticating the first user,wherein identifying the wireless signals broadcast by a beaconassociated with the attendance reporting service is performed by thefirst mobile terminal alone, by the server alone or by the first mobileterminal and the server in combination.
 26. The method of claim 20,wherein the first user's command for reporting attendance occurssubsequent to authenticating the first user and further subsequent tofinding the first beacon, the first facility or both in the at least onedatabase, wherein acquiring the hardware ID, the security code and thesecurity key contained in the identified wireless signals is performedby the first mobile terminal alone, by the server alone or by the firstmobile terminal and the server in combination.
 27. The method of claim16, wherein the first mobile terminal processes the identified wirelesssignals to acquire the hardware ID and transmits the hardware ID to theserver, wherein the server compares the hardware ID from the firstmobile terminal against the hardware ID of the first beacon found in theat least one database using information identifying the first user. 28.The method of claim 18, wherein the first user's command for reportingattendance occurs subsequent to authenticating the first user andfurther subsequent to finding the first beacon, the first facility orboth in the at least one database.
 29. The method of claim 18, whereinsubsequent to finding the first beacon, the first facility or both inthe at least one database, the server communicates with the first mobileterminal to cause the mobile application of the first mobile terminal toprovide a prompt or button for the first user to make the command forreporting attendance.
 30. The method of claim 18, wherein the first useris linked to a second facility that is liked to a second beacon of theat least one beacon, wherein subsequent to authentication of the firstuser, the server further finds the second beacon, the second facility orboth in the at least one database using the data identifying the firstuser, wherein subsequent to finding, the server transmits data to thefirst mobile terminal to cause the mobile application to provide aprompt for choosing between the first facility and the second facilityprior to making the command for reporting attendance.