Skip to main content

Virtual Doorbell™

Virtual Doorbell™ would be a software product that improves communication about visitors arriving at a location without the need for any physical device for a doorbell. It would do this by allowing a visitor to notify the host of his arrival through the app. This would provide the benefit of letting the host know who the visitor was.

Observation: Many people currently use alternatives to knocking or ringing a doorbell to announce their arrival at a location. Many have Internet connected mobile devices and already use such devices to announce their arrival through something like text messages or chat apps.

Overview of How it Works: A host could use the app to setup a Virtual Doorbell™ at his location. Visitors could also access the app. Then, when a visitor arrived at the location, the app would display the Virtual Doorbell™ for the visitor to activate. Once the visitor activated the Virtual Doorbell™, the app would notify the host of the visit and the identity of the visitor.

Other Features:
  • The possibility of integrating text and audio/video chat in the response
  • A visitor could get the attention of and individual host without disturbing others at the location, for example avoiding waking up other people who might want to keep sleeping
  • The host could answer the visitor without being home (and without the visitor necessarily knowing the host was not home)
  • The possibility of Do Not Disturb mode or quiet hours when visitors would be discouraged from activating the Virtual Doorbell™ except in emergencies
  • No Soliciting locations where only pre-approved contacts could activate the Virtual Doorbell™
  • Virtual Doorbell™ at more locations than doors, including bedrooms and work spaces

Monetizing: We could possibly offer the standard edition free and in-app purchases for extra features, for example, No Soliciting or Do Not Disturb for $1 each.

Concerns: We could possibly enhance our solution by using these concerns as opportunities to build in additional competitive advantages by mitigating them.
  • Crime
  • Pranks

Technical Details: The app could use location features to detect when a visitor was at the door. This could employ similar means as certain popular augmented reality games to ensure accuracy and anti-spoofing for the location.

Verified Author: Serafino Software™
Maturity Idea 
Type: Software Product
Date Claimed: 29 August 2017


Popular posts from this blog

Shared Project Manifesto Version 2

Contents:IntroductionLaunchTradeRewardDevelopVoteHarvest 1. Introduction IP (Intellectual Property) is a great asset but it is hard to produce well. We hypothesize that a market to facilitate shared projects would make it easy to produce IP better.

The market contains projects. Each project has one admin and a number of traders and developers. One user can have any combination of roles at the same time. For example, a user may be an admin and also a trader, or a trader and also a developer. ProjectsUsersAdmin: Provides ideas in exchange for controlTraders: Provide incentives in exchange for growthDevelopers: Provide IP in exchange for incentives 2. Launch When somebody came up with an idea for an IP product, they could create a project for it on the market. That person would be the admin.
The market would record the time the admin launched the project. That lasting record could provide for the admin to claim credit for the project idea, on a first-come, first-served basis. This recogn…

Contact Codes Lite™

CCL (Contact Codes Lite™) would be a software product to help people exchange many kinds of contact information much more easily. CCL would do this by providing users with relatively simple contact codes. The users could distribute the codes to many people in many ways. Then, a person who received a contact code could use it to retrieve the original person's contact information through CCL.

For example, many people still exchange business cards. Retrieving various information from the cards can be time consuming and error prone, especially when there are many cards. Also, when somebody updates their information, the information from the card is no longer valid.

Other good examples for usage of contact codes include:
On a slide in a presentationIn email signaturesOn name tagsIn applications that provide limited space for profile informationWhenever you want to provide easy access to many different contact options without listing each
The main thing that would make CCL different from…

Fog Machine

Fog Machine™ (named because fog is like a cloud, on the ground) is a software product to provide cloud services to customers without a cloud service provider. The problem with the traditional cloud is that it requires a provider. Fog Machine™ would run cloud "nodes" in idle system resources on ordinary user's devices. This would be a peer to peer system in which each connected device would be a peer.

It would support standard cloud APIs (perhaps Cloud Foundry?) and it would be easy to port cloud apps to it off providers such as Google cloud, Azure, or AWS--or maybe it would be effortless for apps that were already portable through compliance with open standards.

We might use encryption for privacy, redundancy for reliability, and remuneration/incentive for resource consistency. The showstopper (critical assumption) is that the synergy would be sufficient to significantly surpass the overhead, and provide competitive performance for at least some types of cloud applicat…

Please Comment

Have you ever heard of a similar idea? What challenges might an idea run into? How might you like to be involved? Comment to add your voice to each idea.