Skip to main content

Virtual Doorbell™

Virtual Doorbell™ would be a software product that improves communication about visitors arriving at a location without the need for any physical device for a doorbell. It would do this by allowing a visitor to notify the host of his arrival through the app. This would provide the benefit of letting the host know who the visitor was.

Observation: Many people currently use alternatives to knocking or ringing a doorbell to announce their arrival at a location. Many have Internet connected mobile devices and already use such devices to announce their arrival through something like text messages or chat apps.

Overview of How it Works: A host could use the app to setup a Virtual Doorbell™ at his location. Visitors could also access the app. Then, when a visitor arrived at the location, the app would display the Virtual Doorbell™ for the visitor to activate. Once the visitor activated the Virtual Doorbell™, the app would notify the host of the visit and the identity of the visitor.

Other Features:
  • The possibility of integrating text and audio/video chat in the response
  • A visitor could get the attention of and individual host without disturbing others at the location, for example avoiding waking up other people who might want to keep sleeping
  • The host could answer the visitor without being home (and without the visitor necessarily knowing the host was not home)
  • The possibility of Do Not Disturb mode or quiet hours when visitors would be discouraged from activating the Virtual Doorbell™ except in emergencies
  • No Soliciting locations where only pre-approved contacts could activate the Virtual Doorbell™
  • Virtual Doorbell™ at more locations than doors, including bedrooms and work spaces

Monetizing: We could possibly offer the standard edition free and in-app purchases for extra features, for example, No Soliciting or Do Not Disturb for $1 each.

Concerns: We could possibly enhance our solution by using these concerns as opportunities to build in additional competitive advantages by mitigating them.
  • Crime
  • Pranks

Technical Details: The app could use location features to detect when a visitor was at the door. This could employ similar means as certain popular augmented reality games to ensure accuracy and anti-spoofing for the location.

Verified Author: Serafino Software™
Maturity Idea 
Type: Software Product
Date Claimed: 29 August 2017


Popular posts from this blog

Shared Project Manifesto Version 2

Contents:IntroductionLaunchTradeRewardDevelopVoteHarvest 1. Introduction IP (Intellectual Property) is a great asset but it is hard to produce well. We hypothesize that a market to facilitate shared projects would make it easy to produce IP better.

The market contains projects. Each project has one admin and a number of traders and developers. One user can have any combination of roles at the same time. For example, a user may be an admin and also a trader, or a trader and also a developer. ProjectsUsersAdmin: Provides ideas in exchange for controlTraders: Provide incentives in exchange for growthDevelopers: Provide IP in exchange for incentives 2. Launch When somebody came up with an idea for an IP product, they could create a project for it on the market. That person would be the admin.
The market would record the time the admin launched the project. That lasting record could provide for the admin to claim credit for the project idea, on a first-come, first-served basis. This recogn…

Fog Machine

Fog Machine™ (named because fog is like a cloud, on the ground) is a software product to provide cloud services to customers without a cloud service provider. The problem with the traditional cloud is that it requires a provider. Fog Machine™ would run cloud "nodes" in idle system resources on ordinary user's devices. This would be a peer to peer system in which each connected device would be a peer.

It would support standard cloud APIs (perhaps Cloud Foundry?) and it would be easy to port cloud apps to it off providers such as Google cloud, Azure, or AWS--or maybe it would be effortless for apps that were already portable through compliance with open standards.

We might use encryption for privacy, redundancy for reliability, and remuneration/incentive for resource consistency. The showstopper (critical assumption) is that the synergy would be sufficient to significantly surpass the overhead, and provide competitive performance for at least some types of cloud applicat…

Nuke Login™

Nuke Login™ is a software product that would provide secure access to computer accounts without the user needing to worry about passwords or related concerns. Like other password manager products, Nuke Login™ would provide the ability to automatically login to many different accounts, but it wouldn't require a password to login to itself. Instead of replacing many passwords with one, it would replace many passwords with a different process.

Also, Nuke Login™ would not only manage the process of logging in. It would manage the whole login-related processes for the accounts, including registering, logging in, changing the security information, logging out, and closing accounts.

When a user was registering for a new account, if they only needed login credentials to register, Nuke Login would automatically generate those credentials and register them. If other things were needed, Nuke Login™ would take care of the login credentials and mask them in the registration process so the user…

Please Comment

Have you ever heard of a similar idea? What challenges might an idea run into? How might you like to be involved? Comment to add your voice to each idea.