Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
A PLATFORM FOR CONNECTING PLURALITY OF USERS AND METHOD THEREOF
Document Type and Number:
WIPO Patent Application WO/2020/026021
Kind Code:
A1
Abstract:
A computing platform for connecting plurality of users is disclosed. The platform includes a computing device (106) to capture a plurality of images by the at least two users simultaneously on their respective computing devices (106). The platform includes a server (102) to identify a request for temporary passwords after receiving the plurality of captured images of the plurality of users. Further, the server (102) generates a plurality of temporary passwords for the plurality of users stores the same in a database (108). The server (102), further, validates the generated temporary number on the computing device (106). Upon successful validation, mapping the computing devices (106) of the users and connecting the users for further communication without disclosing the contact information such as the contact number, email id and the like, of the plurality of users.

Inventors:
SHAIKH ASIF KASAM (IN)
Application Number:
PCT/IB2018/057674
Publication Date:
February 06, 2020
Filing Date:
October 03, 2018
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SHAIKH ASIF KASAM (IN)
International Classes:
G06F15/16; G06Q10/10
Domestic Patent References:
WO2007111573A12007-10-04
Foreign References:
KR20150094462A2015-08-19
Attorney, Agent or Firm:
SHETH, Girish Vijayanand (IN)
Download PDF:
Claims:
Claims :

1. A method for connecting with a plurality of users on a computing platform having a memory (110) and a processor (114), the method comprising:

capturing, by a computing device (106), a plurality of images of the plurality of users simultaneously on their respective computing devices (106), wherein said plurality of users comprises a user and a requestor;

transmitting, by the processor (114), the captured images of the user and the requestor to a server (102);

identifying, by the server (102), the request for a temporary password after receiving the captured images of the user and the requestor;

generating, by the server (102), a plurality of temporary passwords for the user and the requestor on their respective computing devices (106);

storing, by the server (102), the generated temporary passwords of the user and the requestor in a database (108);

validating, by the server (102), the generated temporary password on the requestor’s computing device (106);

mapping, by the processor (114), the computing devices (106) of the user and the requestor after successful validation;

connecting, by the processor (114), the user and the requestor after receiving an approval from the user; and

transmitting, by the processor (114), the user’s contact link to the computing device (106) of the requestor upon receiving a request from the requestor. 2. The method as claimed in claim 1, wherein the validating step comprises: providing the generated temporary password to the requestor by the user; inputting the generated temporary password on the computing device (106, 202, 204) of the requestor;

transmitting the inputted temporary password to the server (102); and verifying the temporary password inputted on the requestor’s computing device (106, 202, 204) in the server (102).

3. The method as claimed in claim 1, wherein the validating step comprises: providing the generated temporary password to the user by the requestor; inputting the generated temporary password on the computing device (106,

202, 204) of the user;

transmitting the inputted temporary password to the server (102); and verifying the temporary password inputted on the user’s computing device (106, 202, 204) in the server (102).

4. The method as claimed in claim 1, wherein the mapping step comprises: identifying the contact link of the requestor after verification of the temporary password; and

exchanging the contact link of the user and the requestor with each other based on pre-defmed rules.

5. The method as claimed in claim 4, wherein the pre-defmed rules comprise: presence of the user and the requestor on the same computing platform; determining presence of the user and the requestor at a predetermined proximity to capture the image of each other;

storing the captured images of the user and the requestor on their respective computing devices (106) at the same time for receiving the temporary passwords on their respective computing devices (106); and

exchanging the temporary passwords with each other within a specified time limit.

6. The method as claimed in claim 1, further comprises sending a connection notification to the computing device (106) of the user after successful validation.

7. The method as claimed in claim 1, further comprises sending a connection notification to the computing device (106) of the requestor after successful validation.

8. The method as claimed in claim 1, further comprises:

registering the user and the requestor on the computing platform;

creating their respective profiles on the computing platform, and wherein the user profile includes profile data such as the profile photo, contact number, email id and the like.

9. The method as claimed in claim 1, further comprises:

comparing captured images of the user and the requestor with the profile photo stored in their respective profiles, and

sending an instruction to the server (102) for generating the plurality of temporary passwords upon successful said comparison.

10. The method as claimed in claim 1, wherein the temporary password is a random number that includes special characters, alphabets, numerical and the like.

11. The method as claimed in claim 1, wherein the temporary password is released out of the database (108) at predetermined time intervals upon execution of one or more cron tasks on the server (102).

12. The method as claimed in claim 1, wherein said plurality of users further comprises a third user, and

wherein if the user is connected to the requestor and the requestor is connected to the third user, then the user is configured to connect directly with the third user based on the pre-defmed rules.

13. The method as claimed in claim 1, further comprises creating a temporary password by the user and/or the requestor on their respective computing devices (106).

14. The method as claimed in claim 1, wherein upon transmitting the captured images of the user and the requestor to the server (102), the method further comprises:

providing a graphical user interface with an input option to the user and the requestor on their respective computing devices (106),

wherein the input option includes:

creating a temporary password either by the user or the requestor; or

sending an instruction to the server (102) to create a temporary password.

15. A system for connecting with a plurality of users on a computing platform a memory (110) and a processor (114), the system comprising:

a computing device (106) configured to capture a plurality of images of the plurality of users simultaneously on their respective computing devices, wherein said plurality of users comprises a user and a requestor;

the processor (114) configured to transmit the captured images of the user and the requestor to a server (102);

the server (102) configured to:

identify the request for a temporary password after receiving the captured images of the user and the requestor;

generate a plurality of temporary passwords for the user and the requestor on their respective computing devices (106);

store the generated temporary passwords of the user and the requestor in a database (108); and

validate the generated temporary password on the requestor’s computing device (106); the processor (114) configured to:

map the computing devices (106) of the user and the requestor after successful validation;

connect the user and the requestor after receiving an approval from the user; and

transmit the user’s contact link to the computing device (106) of the requestor upon receiving a request from the requestor.

16. The system as claimed in claim 15, wherein the server (102) is further configured to:

provide the generated temporary password to the requestor by the user; input the generated temporary password on the computing device (106, 202, 204) of the requestor;

transmit the inputted temporary password to the server (102); and verify the temporary password inputted on the requestor’s computing device (106, 202, 204) in the server (102).

17. The system as claimed in claim 15, wherein the server (102) is further configured to:

provide the generated temporary password to the user by the requestor; input the generated temporary password on the computing device (106, 202, 204) of the user;

transmit the inputted temporary password to the server (102); and verify the temporary password inputted on the user’s computing device (106, 202, 204) in the server (102).

18. The system as claimed in claim 15, wherein the processor (114) configured to map the computing devices (106) of the user and the requestor is further configured to:

identify the contact link of the requestor after verification of the temporary password; and exchange the contact link of the user and the requestor with each other based on pre-defmed rules.

19. The system as claimed in claim 15, wherein the pre-defmed rules further comprise:

presence of the user and the requestor on the same computing platform; to determine the presence of the user and the requestor at a predetermined proximity to capture the image of each other;

to store the captured images of the user and the requestor on their respective computing devices (106) at the same time for receiving the temporary passwords on their respective computing devices (106); and

to exchange the temporary passwords with each other within a specified time limit.

20. The system as claimed in claim 15, further configured to send a connection notification to the computing device (106) of the user after successful validation.

21. The system as claimed in claim 15, further configured to send a connection notification to the computing device (106) of the requestor after successful validation.

22. The system as claimed in claim 15, is further configured to register the user and the requestor on the computing platform, and to create their respective profiles on the computing platform and wherein the user profile includes profile data such as the profile photo, contact number, email id and the like.

23. The system as claimed in claim 15, is further configured to:

compare the captured images of the user and the requestor with the profile photo stored in their respective profiles, and

send an instruction to the server (102) to generate the plurality of temporary passwords upon successful said comparison.

24. The system as claimed in claim 15, wherein the temporary password is a random number that includes special characters, alphabets, numerical and the like.

25. The system as claimed in claim 15, wherein the temporary password is released out of the database (108) at predetermined time intervals upon execution of one or more cron tasks on the server (102).

26. The system as claimed in claim 15, wherein said plurality of users further comprises a third user, and

wherein if the user is connected to the requestor and the requestor is connected to the third user, then the user is configured to connect directly with the third user based on the pre-defmed rules.

27. The system as claimed in claim 15 is further configured to create a temporary password by the user and/or the requestor on their respective computing devices (106).

28. The system as claimed in claim 15, wherein upon transmitting the captured images of the user and the requestor to the server (102), the system is further configured to:

provide a graphical user interface with an input option to the user and the requestor on their respective computing devices (106),

wherein the input option includes:

to create a temporary password either by the user or the requestor; or

to send an instruction to the server (102) to create a temporary password.

Description:
A PLATFORM FOR CONNECTING PLURALITY OF USERS AND METHOD THEREOF

TECHNICAL FIELD

[0001] The present invention relates generally to a platform for connecting plurality of users and method thereof. The invention, more particularly, relates to an improved system and method for connecting users on a computing platform without disclosing any contact information such as contact number, email id and the like, of the users.

BACKGROUND

[0002] Before the use of mobile devices became widespread, people used to obtain contact information by exchanging business cards and writing down numbers manually or digitally. Once mobile devices, such as cell phones became more popular, people began exchanging numbers by typing them directly into the cell phone. Such tasks are time consuming and started creating too many possibilities for human errors.

[0003] One of the convention techniques discloses about mimicking a fist bump by exchanging contact information between two people when their computing devices, such as mobile devices, touch each other. Specifically, the mobile devices include an accelerometer that tracks the movement of the mobile devices and compares the signatures of each device to infer an intentional approval to pass contact information from one person to another. In this example, the backend server recognizes that the two mobile devices shake in the same pattern and that the movement is not random and is therefore intended as permission to exchange the relevant information. However, this is a limited solution that requires the necessity of physical contact between the two mobile devices. [0004] Further, there are many conventional techniques available which has the facility to transfer the contact information of a person to another person. But the problem in many of these applications is that it works on specific platforms which might not be available on all computing devices. Additionally, there are few applications available that are laced either with a complex interface or inherent limitations. Moreover, while exchanging the contact information from one computing device to other, it might not maintain consistency in storing the information correctly.

[0005] Hence, there is a need of an invention which solves the above defined problems and provides an effective system and method for connecting a plurality of users on a computing platform for communication amongst each other. SUMMARY

[0006] This summary is provided to introduce concepts related to a platform for connecting a plurality of users and method thereof. This summary is neither intended to identify essential features of the present invention nor is it intended for use in determining or limiting the scope of the present invention. [0007] One of the various embodiments herein may include one or more systems and methods for connecting a plurality of users on a computing platform without disclosing their original information such as contact number, email id and the like. In one of the embodiments, the connection of a plurality of users on a computing platform is initiated by capturing a plurality of images by the plurality of users simultaneously on their respective computing devices such as mobile phones. After capturing and saving the images, the computing devices of the plurality of users interacts with the server through an API to generate temporary passwords for the computing devices of the plurality of users. The server generates temporary passwords and stores the same in the cache memory of the processor or the database. Further, either of the two users shares the generated temporary password with the other user. The generated temporary password is available for a predetermined time interval. In the predetermined time interval, the user has to share the temporary password with the other user. If the user fails to share the temporary password within the predetermined time interval, then the temporary password becomes invalid and a new temporary password is generated by the server.

[0008] Further, the temporary password generated on a computing device of the user is validated on the computing device of the other user. The user provides the temporary password to the other user and said temporary password has to be inputted on the computing device of the other user. Meanwhile, the server validates if the inputted temporary password is available in the cache memory of the processor or the database. If the temporary password is found in the cache memory of the processor or the database, then the computing devices of both the users are mapped. After successful mapping, a notification is sent to the computing device of the user wherein the notification is regarding the approval or rejection of the connection with the other user. Further, the two users are connected in response to the approval received for the notification from the user and contact link is established between the two users based on the pre-defmed rules.

BRIEF DESCRIPTION OF ACCOMPANYING DRAWINGS

[0009] The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to reference like features and modules.

[0010] Fig. 1 illustrates an exemplary block diagram depicting a system for establishing a contact link between a plurality of users, according to an exemplary implementation of the presently claimed subject matter. [0011] Fig. 2 illustrates an operation of the server-network communication, according to an exemplary implementation of the presently claimed subject matter. [0012] Fig. 3 illustrates another operation of the communication between three computing devices, according to an exemplary implementation of the presently claimed subject matter.

[0013] Fig 4 illustrates a flowchart of a method for establishing contact link between the users, according to an exemplary implementation of the presently claimed subject matter.

[0014] It should be appreciated by those skilled in the art that any block diagrams herein represent conceptual views of illustrative methods embodying the principles of the present disclosure. Similarly, it will be appreciated that any flow charts, flow diagrams, and the like represent various processes which may be substantially represented in computer readable medium and so executed by a computer or processor, whether or not such computer or processor is explicitly shown.

DETAILED DESCRIPTION [0015] The various embodiments of the present disclosure provide a platform for connecting plurality of users and method thereof. It further provides an improved system and method for connecting users on a computing platform without disclosing their contact information such as contact number, email id and the like, of the users. [0016] In the following description, for purpose of explanation, specific details are set forth in order to provide an understanding of the present claimed subject matter. It will be apparent, however, to one skilled in the art that the present claimed subject matter may be practiced without these details. One skilled in the art will recognize that embodiments of the present claimed subject matter, some of which are described below, may be incorporated into a number of systems. [0017] However, the systems and methods are not limited to the specific embodiments described herein. Further, structures and devices shown in the figures are illustrative of exemplary embodiments of the presently claimed subject matter and are meant to avoid obscuring of the presently claimed subject matter. [0018] Furthermore, connections between components and/or modules within the figures are not intended to be limited to direct connections. Rather, these components and modules may be modified, re-formatted or otherwise changed by intermediary components and modules.

[0019] One of the various embodiments herein may include one or more systems and methods for connecting a plurality of users on a computing platform without disclosing their contact information such as contact number, email id and the like. In one of the embodiments, the connection of a plurality of users on a computing platform is initiated by capturing a plurality of images by the plurality of users simultaneously on their respective computing devices such as computing devices. After capturing and saving the images, the computing devices of the plurality of users interacts with the server through an API to generate temporary passwords for the computing devices of the plurality of users. The server generates temporary passwords and stores the same in the cache memory of the processor or the database. Further, either of the two users shares the generated temporary password with the other user. The generated temporary password is available for a predetermined time interval, for example say 30 to 40 seconds of time interval. In the predetermined time interval, the user has to share the temporary password with the other user. If the user fails to share the temporary password within the predetermined time interval, then the temporary password becomes invalid and a new temporary password is generated by the server.

[0020] Further, the temporary password generated on a computing device of the user is validated on the computing device of the other user. The user provides the temporary password to the other user and said temporary password has to be inputted on the computing device of the other user. Meanwhile, the server validates if the inputted temporary password is available in the cache memory of the processor or the database. If the temporary password is found in the cache memory of the processor or the database, then the computing devices of both the users are mapped. After successful mapping, a notification is sent to the computing device of the user wherein the notification is regarding the approval or rejection of the connection with the other user. Further, the two users are connected in response to the approval received for the notification from the user and contact link is established between both the users based on the pre-defmed rules. [0021] It is important to note that both the users have to register themselves on the computing platform. For registration, the user and the requestor have to input their details such as contact number, email id, profile photo and the like. Once the registration is complete, a user id is created for the two users and they can connect with each other on the computing platform after completing a predetermined process.

[0022] In another embodiment, apart from the two users, there is a third user wherein if the first user is connected to the second user and the second user is connected to the third user, then the first user is configured to connect directly with the third user after completing the validation process. [0023] In another embodiment, the temporary password generated is a random number that includes special characters, alphabets, numerical and the like. Further, the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server. The cron task is an event scheduler which may schedule an event of flushing out the temporary password from the cache memory at the predetermined time interval.

[0024] It should be noted that the description merely illustrates the principles of the present invention. It will thus be appreciated that those skilled in the art will be able to devise various arrangements that, although not explicitly described herein, embody the principles of the present invention. Furthermore, all examples recited herein are principally intended expressly to be only for explanatory purposes to help the reader in understanding the principles of the invention and the concepts contributed by the inventor to furthering the art and are to be construed as being without limitation to such specifically recited examples and conditions. Moreover, all statements herein reciting principles, aspects, and embodiments of the invention, as well as specific examples thereof, are intended to encompass equivalents thereof.

[0025] Fig. 1 illustrates an exemplary block diagram depicting a system for establishing a contact link between a plurality of users, according to an exemplary implementation of the presently claimed subject matter. The system 100 includes a server 102, a network 104, a plurality of computing devices 106 (l06a, l06b, l06c, l06d), a database 108, a memory 110, I/O interfaces 112, a processor 114, and a plurality of data 116. [0026] The network 104 interconnects the plurality of computing devices

106, and the database 108 with the server 102. The network 104 includes wired and wireless networks. Examples of the wired networks include, but are not limited to, a Wide Area Network (WAN) or a Local Area Network (LAN), a client-server network, a peer-to-peer network, and so forth. Examples of the wireless networks include, but are not limited to, Wi-Fi, a Global System for Mobile communications (GSM) network, and a general Packet Radio Service (GPRS) network, an enhanced data GSM environment (EDGE) network, 802.5 communication networks, Code Division Multiple Access (CDMA) networks, or Bluetooth networks. In an example, the communication network 106 may be a combination of one or more wired and/or wireless networks.

[0027] In the present implementation, the database 108 may be implemented as, but not limited to, enterprise database, remote database, local database, and the like. Further, the database 108 may themselves be located either within the vicinity of each other or may be located at different geographic locations. Furthermore, the database 108 may be implemented inside the system 100 and the database 108 may be implemented as a single database.

[0028] In the present implementation, the computing devices 106 include, but are not limited to, mobile phones (for e.g. a smart phone), phablets, Personal Digital Assistants (PDAs), wearable devices (for e.g. smart watches and smart bands), tablet computers, laptops and the like.

[0029] In the present implementation, the memory 110 may be coupled to the processor 114. The memory 110 can include any computer-readable medium known in the art including, for example, volatile memory, such as static random- access memory (SRAM) and dynamic random-access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.

[0030] The I/O interface 112 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The I/O interface 112 may allow the server 102 to interact with a user directly or through the computing devices 106. Further, the I/O interface 112 may enable the server 102 to communicate with other computing devices, such as web servers and external data servers (not shown). The I/O interface 112 can facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite. The I/O interface 112 may include one or more ports for connecting a number of devices to one another or to another server.

[0031] In the present implementation, the server 102 includes one or more processors 114. The processor 114 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one processor 114 is configured to fetch and execute computer- readable instructions stored in the memory 110. [0032] Further, in the present implementation, the system 100 is configured to connect a plurality of users on a computing platform by establishing a contact link which is exchanged between the plurality of users without disclosing their contact information such as the contact number, email id and the like. The plurality of users comprises a user and a requestor and these two identities can be interchangeable. For establishing a connection for communication, the user and the requestor have to register themselves on the computing platform. For registration, the user and the requestor have to input their details such as the contact number, email id, profile photo and the like. Once the registration is complete, a profile is created for the user and the requestor and they can connect with each other on the computing platform after completing a predetermined process. The profiles of the plurality of users includes profile data such as the profile photo, contact number, email id and the like.

[0033] In one of the embodiments, the system includes the computing device 106 which is configured to capture an image of the user or the requestor. For capturing the image, both the user and the requestor have to open the instant contact screen on their respective computing devices 106 and capture each other’s image. In this case, we consider that the user captures the image of the requestor on the computing device, nonetheless the vice-versa is also possible. Further, the processor 114 is configured to transmit the captured image of the requestor on the user’s computing device, to the server 102. Further, the server 102 is configured to identify a request for generating a temporary password upon receiving the captured image of the requestor. The server 102 is further configured to generate the temporary password for the captured image of the requestor on the user’s computing device 106. To generate the temporary password, the computing device 106 of the user interacts with the server 102 through an API. Here, the temporary password is a random number that includes special characters, alphabets, numerical and the like. Further, the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server. In the predetermined time interval, the user has to share the temporary password with the requestor. If the user fails to share the temporary password within the predetermined time interval, then it becomes invalid and a new temporary password is generated by the server.

[0034] Further, the generated temporary passwords are stored in the cache memory of the processor 114. Alternatively, the generated temporary passwords may also be stored in the cache memory of the database 108. Furthermore, the server 102 is configured to validate the generated temporary password on the requestor’s computing device 106. The validation process is explained in detail in the further embodiments. Further, the processor 114 is configured to map the computing devices 106 of the user and the requestor upon successful validation. The server sends a connection notification to the user on its computing device 106, wherein the notification comprises the approval required to connect with the requestor. The processor 114 is further configured to connect the user and the requestor after receiving an approval from the user for the connection notification. Furthermore, the server is configured to connect the contacts of the user and the requestor for further communication by transmitting the user’s contact link to the requestor. Hence, the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules.

[0035] In the present implementation, the data 116 may include various data pertaining to the operation of the processor 114, and other data 122. The data 116, amongst other things, may serve as a repository for storing data that is processed, received, or generated as a result of the execution of one or more commands of the server 102. Although the data 116 is shown internal to the server 102, it may be understood that the data 116 can reside in an external repository or the database 108, which may be coupled to the server 102. Further, the data 116 broadly includes a user data 118 and a system data 120. The user data 118 includes all the data pertaining to the user or the requestor such as a contact details, profile photo and the like. The system data 120 includes all other data except the user data 118. The user data 118 and the system data 120, both may be stored in the database 108. The other data 122 may include data generated as a result of the execution of one or more commands of the server 102.

[0036] Fig. 2 illustrates an operation of the server-network communication, according to an exemplary implementation of the presently claimed subject matter. In the present implementation, the server 102 provides services, for connecting the plurality of computing devices 106 of the plurality of users on a computing platform for communication between the plurality of users without disclosing the contact information such as the contact number, email id and the like, through a network 104. The server 102 includes at least one computing device adapted for communication with the network 104, and a database 108 for storing temporary passwords. The network 104 includes any system or systems capable of facilitating communications between the server 102 and the computing devices (202, 204) and in various embodiments may include a wired or a wireless network. Each computing device (202, 204) is adapted for communications with the server 102 through the network 104.

[0037] Furthermore, the computing devices (202, 204) of the user and the requestor get connected to each other upon successful validation. In this case, we consider that the requestor requests for the temporary password generated on the user’s computing device, nonetheless the vice-versa is also possible. Further, for establishment of successful validation, the user provides the generated temporary password to the requestor and said temporary password has to be inputted on the computing device (106, 202, 204) of the requestor. The system is configured to transmit the inputted temporary password on the requestor’s computing device (106, 202, 204) to the server. Meanwhile, the server 102 is configured to verify whether the inputted temporary password is available in the cache memory of the processor 114 or the database 108. If the temporary password is found in the cache memory of the processor 114 or the database 108, then the computing devices (202, 204) of the user and the requestor are mapped. After successful mapping, the processor is configured to identify the contact link of the requestor upon verification of the temporary password inputted on the requestor’s computing device. The processor is further configured to exchange the contact links with the user and the requestor based on the pre-defmed rules, for further communication. Here, the contact links are provided in the form of call icons, mail icons and the like.

[0038] Additionally, for connecting the user and the requestor on the computing platform, a contact link is exchanged between the user and the requestor based on the pre-defmed rules. The pre-defmed rules include a requirement that the user and the requestor shall be sufficiently related on the same computing platform. This also includes that the user and the requestor shall be present on the same computing platform. The pre-defmed rules can also include a requirement that the user and the requestor should have a predetermined proximity from each other to capture the images of each other and exchange the temporary passwords with each other. The pre-defmed rules also include that the user and the requestor should store each other’s captured images on their respective computing devices (106, 202, 204) at the same time to receive the temporary passwords on their respective computing devices (106, 202, 204). Further, the pre-defmed rules can also include the requirement that the user and the requestor should exchange the temporary passwords with each other with a specified time limit, which if crossed will generate new temporary passwords. Once, these pre-defmed rules are satisfied, the server 102 transmits the contact links of the user and the requestor to each other without disclosing the contact information such as the contact number, email id and the like, of the user and the requestor.

[0039] Fig. 3 illustrates another operation of the communication between three computing devices, according to an exemplary implementation of the presently claimed subject matter. In one embodiment, a computing device 202 of a first user is configured to connect with a computing device 204 of a second user on a computing platform after completing a predetermined process. Further, the computing device 204 of the second user is configured to connect with a computing device 206 of a third user on the computing platform after completing the predetermined process. In this case, the third user is not connected to the first user but they both share a common contact link which is the second user. Hence, the computing device 204 of the second user is configured to share the first user’s contact link with the third user. The computing device 202 of the first user is configured to receive a connection notification, upon sharing his/her contact link by the second user with the third user, wherein this link is withheld within the server before reaching the third user. The connection notification is regarding the second user sharing first user’s contact link with the third user. In response to this connection notification, the first user approves or rejects the sharing of his/her contact link wherein the system is configured to call or to chat with the second user regarding the direct rejection or approval of the connection notification with the third user. If the first user approves the connection, then the server is configured to send a notification to the second user and the third user showing that the first user has approved the connection. If the first user rejects the connection, then the server is configured to send a notification to the second user showing that the first user has rejected the connection.

[0040] In another embodiment, the computing device 106 is configured to capture the image of the requestor on the user’s computing device, nonetheless the vice-versa is also possible. The system is configured to transmit the captured image of the requestor on the user’s computing device to the server 102. The server is configured to search for the images in the database and to compare the captured image of the requestor with its profile photo stored in the profile data of the requestor, upon receiving the captured image of the requestor. The system is configured to send an instruction to the server 102, upon successful said comparison, to generate the temporary password on the user’s computing device 106 and to share said temporary password with the requestor. Additionally, if said comparison is not successful, then the temporary passwords are not generated. Further, the requestor inputs the temporary password generated on the user’s computing device 106 and the system is configured to transmit said temporary password from requestor’s computing device 106 to the server. Further, the server 102 is configured to create a confirmation which includes that the contact links of the user and the requestor have agreed to share their contact link available with the server. The server is further configured to exchange the contact link, based on the pre-defmed rules, which does not disclose the contact number and email id but includes the profile photo, call icon, chat icon, mail icon for further communication.

[0041] In one of the embodiments, the present disclosure includes a system configured to establish a contact between the user and the requestor based on images to be captured and to create and exchange the temporary passwords. The computing devices 106 of the user and the requestor are configured to capture images of each other. The captured images are displayed on the screen of the computing devices 106 of the user and the requestor along with the indication to enter a temporary password. The user and the requestor create a temporary password of their own choice on their respective computing devices. The server 102 is configured to store the captured images along with the newly created temporary passwords of the user and the requestor in their respective computing devices 106. The system 102 is further configured to transmit these stored images along with the temporary passwords to the server. The server, on receiving the stored images and temporary passwords, is configured to identify a request of the user and the requestor to exchange the created temporary passwords. The server 102 is further configured to send the user’s temporary password to the requestor and vice-versa. Further, the server 102 is configured to perform this exchange of temporary passwords after calculating predetermined proximity distance of the computing devices 106 of the user and the requestor. Additionally, the server 102 is configured to send a notification to the user and the requestor to exchange the temporary passwords created on the computing devices 106 that are to be connected. Further, the user shares his created temporary password with the requestor and vice-versa. The system is further configured to input the temporary passwords of the user and the requestor on their respective computing devices 106 and to transmit these inputted temporary passwords to the server. The server 102 is configured to identify the temporary password created by requestor on user’s computing device 106 and also to identify the temporary password created by user on requestor’s computing device 106. If the temporary passwords match, the server is configured to send a notification to the user and the requestor to confirm the connection request. Upon approval received by the user and the requestor, the server is configured to connect the user and the requestor together for further communication by exchanging the contact links with the user and the requestor. Hence, the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules. [0042] Fig 4 illustrates a flowchart of a method for establishing contact link between the users, according to an exemplary implementation of the presently claimed subject matter. The flowchart 400 of Fig. 4 is explained below with reference to Fig. 1 as described above.

[0043] At step 402, registering on the computing platform, by inputting details such as contact number, email id, profile photo and the like, by the user and the requestor. In another embodiment, the system is configured to register the user and the requestor on the computing platform, and to create their respective profiles on the computing platform and wherein the user profile includes profile data such as the profile photo, contact number, email id and the like. [0044] At step 404, capturing images of the user and the requestor by opening the instant contact screen on their respective computing devices. In another embodiment, the system includes a computing device (106) that is configured to capture a plurality of images of the plurality of users simultaneously on their respective computing devices. [0045] At step 406, transmitting the captured images of the user and the requestor to the server. In another embodiment, the system includes a processor (114) that is configured to transmit the captured images of the user and the requestor to a server (102). [0046] At step 408, identifying a request for a temporary password upon receiving the captured images of the user and the requestor. In another embodiment, the system includes a server 102 configured to identify the request for a temporary password after receiving the captured images of the user and the requestor.

[0047] At step 410, generating a plurality of temporary passwords for the user and the requestor on their respective computing devices. In another embodiment, the system includes a server 102 configured to generate a plurality of temporary passwords for the user and the requestor on their respective computing devices (106).

[0048] At step 412, storing the generated temporary passwords in the cache memory of the processor. Alternatively, the generated temporary passwords may also be stored in the cache memory of the database. In another embodiment, the system includes a server 102 configured to store the generated temporary passwords of the user and the requestor in a database 108.

[0049] At step 414, providing the temporary password generated on the user’s computing device to requestor in response to the request for this information by the requestor. In another embodiment, the system includes a server 102 configured to provide the generated temporary password to the requestor by the user.

[0050] At step 416, inputting the user’s temporary password on the computing device of the requestor. In another embodiment, the system includes a server 102 configured to input the generated temporary password on the computing device (106, 202, 204) of the requestor. [0051] At step 418, transmitting the inputted temporary password on the computing device of the requestor to the server. In another embodiment, the system includes a server 102 configured to transmit the inputted temporary password to the server 102. [0052] At step 420, verifying the temporary password inputted on the requestor’s computing device in the server. In another embodiment, the system includes a server 102 configured to verify the temporary password inputted on the requestor’s computing device (106, 202, 204) in the server 102. [0053] At step 422, it is determined that if the verification is not successful, the plurality of temporary passwords is generated again for the user and the requestor on their respective computing devices. In another embedment, the system is configured to generate the plurality of temporary passwords again for the user and the requestor on their respective computing devices 106. [0054] At step 424, it is determined that if the verification is successful, the contact link of the requestor is identified after verification of the temporary password. In another embodiment, the system includes a processor 114 configured to identify the contact link of the requestor after verification of the temporary password. [0055] At step 426, exchanging the contact link of the user and the requestor with each other based on pre-defmed rules. After exchanging the contact links, the user and the requestor are connected with each other for further communication and their contact information like the contact number, email id and the like is not disclosed. In another embodiment, the system includes a server 102 configured to exchange the contact link of the user and the requestor with each other based on pre-defmed rules.

[0056] In one embodiment, a first user with a computing device 202 is connected to a second user with a computing device 204 on a computing platform after completing a predetermined process. Further, the second user with the computing device 204 is connected to a third user with a computing device 206 on the computing platform after completing the predetermined process. In this case, the third user is not connected to the first user but they both share a common contact link which is the second user. Hence, the second user with the computing device 204 shares the first user’s contact link with the third user. After sharing first user’s contact link by the second user with the third user, this link is withheld within the server before reaching the third user and the first user receives a connection notification on the computing device 202. The connection notification is regarding the second user sharing first user’s contact link with the third user. In response to this connection notification, the first user approves or rejects the sharing of his/her contact link by calling or by chatting with the second user regarding the direct rejection or approval of the connection notification with the third user. If the first user approves the connection, then a notification is sent to the second user and the third user showing that the first user has approved the connection. If the first user rejects the connection, then a notification is sent to the second user showing that the first user has rejected the connection.

[0057] In another embodiment, the user captures the image of the requestor on the computing device, nonetheless the vice-versa is also possible. Further, the captured image of the requestor on the user’s computing device is transmitted to the server 102. Upon receiving the captured image of the requestor, the server searches for the images in the database and compares the captured image of the requestor with its profile photo stored in the profile data of the requestor. Upon successful said comparison, an instruction is sent to the server 102 to generate the temporary password on the user’s computing device 106 and the same has to be shared with the requestor. Additionally, if said comparison is not successful, then the temporary passwords are not generated. Further, the requestor inputs the temporary password generated on the user’s computing device 106 and the same is transmitted from requestor’s computing device 106 to the server. Further, a confirmation is created that contact links of the user and the requestor have agreed to share their contact link available with the server. The server then exchanges the contact link, based on the pre-defmed rules, which does not disclose the contact number and email id but includes the profile photo, call icon, chat icon, mail icon for further communication.

[0058] In one of the embodiments, the present disclosure includes a method for establishing a contact between the user and the requestor based on capturing images and creating and exchanging the temporary passwords. The method comprises capturing images of the user and the requestor on their respective computing devices 106. The captured images are displayed on the screen of the computing devices 106 of the user and the requestor along with the indication to enter a temporary password. The method further comprises creating a temporary password for the user and the requestor of their own choice on their respective computing devices 106. The captured images along with the newly created temporary passwords of the user and the requestor are stored in their respective computing devices 106. These stored images along with the temporary passwords are transmitted to the server. The server on receiving the stored images and temporary passwords identifies a request of the user and the requestor for exchanging the created temporary passwords. The server 102 further sends user’s temporary password to the requestor and vice-versa. The server 102 performs this exchange of temporary passwords after calculating predetermined proximity distance of the computing devices 106 of the user and the requestor. The server 102 also sends notification to the user and the requestor to exchange the temporary passwords created on the computing devices 106 that are to be connected. Further, the user shares his created temporary password with the requestor and vice-versa. The user and the requestor input the temporary password on their respective computing devices and these inputted temporary passwords are transmitted to the server. The server then identifies the temporary password created by requestor on user’s computing device 106 and also identifies the temporary password created by user on requestor’s computing device 106. If the temporary passwords match, the server sends a notification to the user and the requestor to confirm the connection request. Upon approval received by the user and the requestor, the server connects the user and the requestor together for further communication by exchanging the contact links with the user and the requestor. Hence, the user can now receive access to communicate with the requestor via chat, call, email and the like based on the pre-defmed rules. [0059] In another embodiment, the temporary password generated is a random number that includes special characters, alphabets, numerical and the like. Further, the temporary password is released out of the cache memory of the processor or the database at predetermined time intervals when a cron task is implemented on the server.

[0060] The foregoing description of the invention has been set merely to illustrate the invention and is not intended to be limiting. Since modifications of the disclosed embodiments incorporating the substance of the invention may occur to person skilled in the art, the invention should be construed to include everything within the scope of the invention.