Sign In to Follow Application
View All Documents & Correspondence

Vehicles Access Control System

Abstract: ABSTRACT VEHICLES ACCESS CONTROL SYSTEM The present disclosure describes a vehicle access control system (100) that enhances security and convenience by allowing secure access management. The system (100) comprises a registration module (102) that registers at least one user device (104) and at least one buddy device (106). An authentication module (108) securely pairs the vehicle with either the user or buddy device, ensuring authorized access. The key sharing module (110) is configured to share at least one digital key from the user device to the buddy device through a secured communication protocol. The system (100) allows the user to grant access to trusted individuals on the basis of the at least one digital key. FIG. 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 January 2024
Publication Number
06/2025
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

Matter Motor Works Private Limited
301, PARISHRAM BUILDING, 5B RASHMI SOC., NR. MITHAKHALI SIX ROADS, NAVRANGPURA AHMEDABAD, GUJARAT, INDIA - 380010

Inventors

1. RAMACHANDRAN R
IP Department MATTER, DCT, C/O Container Corporations of India Ltd., Domestic Container Terminal Gate No. 4, Shed No 1, Khodiyar, Gujarat 382421
2. SATISH THIMMALAPURA
IP Department MATTER, DCT, C/O Container Corporations of India Ltd., Domestic Container Terminal Gate No. 4, Shed No 1, Khodiyar, Gujarat 382421
3. PANKAJ KUMAR BHARTI
IP Department MATTER, DCT, C/O Container Corporations of India Ltd., Domestic Container Terminal Gate No. 4, Shed No 1, Khodiyar, Gujarat 382421

Specification

DESC:VEHICLES ACCESS CONTROL SYSTEM
CROSS REFERENCE TO RELATED APPLICTIONS
The present application claims priority from Indian Provisional Patent Application No. 202421002056 filed on 11/01/2024, the entirety of which is incorporated herein by a reference.
TECHNICAL FIELD
The present disclosure generally relates to a vehicle access system. Particularly, the present disclosure relates to a vehicle access control system. Furthermore, the present disclosure relates to a method of access control of vehicle.
BACKGROUND
Recently, the usage of vehicles has significantly increased in recent times due to urbanization, rising population, and the growing demand for personal mobility. With advancements in technology and infrastructure, vehicles have become an essential part of daily life for commuting, travel, and logistics. This surge in vehicle usage has led to a shift in transportation patterns, with more people relying on personal cars, ride-sharing services, and electric vehicles.
As vehicle usage continues to rise, the vehicles are frequently shared among family members, friends, or colleagues. While sharing the vehicles, there is an increasing need for more efficient and secure methods to manage access of vehicle. The traditional model of vehicle ownership, where a single individual holds the keys, is rapidly evolving, and vehicles are often shared among family members, friends, colleagues, or even through ride-sharing services. The provision of additional locking keys resolve the issue of the single key holder. However, due to additional locking keys, users other than the primary owner can present several challenges, both in terms of security and practicality. One major issue is the potential compromise of the vehicle’s security, as multiple keys increase the likelihood of unauthorized access. If one of the keys falls into the wrong hands, it could lead to theft or misuse of the vehicle. Additionally, there is often a lack of control or traceability, making it difficult for the owner to monitor who has access to the vehicle and when it is being used. This can be particularly problematic in shared ownership or fleet scenarios, where responsibility for any damages, violations, or misuse becomes ambiguous. Another problem lies in the logistical challenges of key management. If a user misplaces or loses their key, the entire locking system might need to be replaced, incurring additional costs and inconvenience for the owner. Moreover, there is the issue of compatibility and wear over time. Also, duplicate keys may not always be of the same quality as the original, leading to potential lock damage or malfunction. In modern vehicles, especially electric ones with advanced locking systems, duplicate keys might not support all features, such as remote unlocking or starting of vehicle, which can frustrate secondary users. Furthermore, the lack of personalized access control associated with physical keys poses an issue. Unlike digital or smart keys, traditional locking keys cannot be programmed to restrict access to certain features or usage times, which could be a concern for owners who share their vehicle with inexperienced or unauthorized users. Overall, while providing additional keys seems practical, it comes with significant risks and operational challenges that need to be carefully addressed.
Therefore, there exists need for an improved vehicle access control system to overcome the one or more problems as set forth above.
SUMMARY
An object of the present disclosure is to provide a vehicle access control system.
Another object of the present disclosure is to provide a method of access control of vehicle.
In accordance with first aspect of the present disclosure, there is provided a vehicle access control system. The system comprises a registration module configured to register at least one user device and at least one buddy device, an authentication module configured to securely pair the vehicle with the at least one user device or the at least one buddy device, a key sharing module, wherein the key sharing module is configured to share at least one digital key from the at least one user device to the at least one buddy device via a secured communication protocol.
The present disclosure provides the vehicle access control system. The vehicle access control system as disclosed by the present disclosure offers secure, efficient, and user-friendly access management. Beneficially, the system enables seamless pairing and recognition of multiple devices, including user and buddy devices which enhances the flexibility for shared vehicle usage. Beneficially, the system ensures the creation of robust digital keys, with encryption mechanisms adding an extra layer of security against unauthorized access. Beneficially, the system facilitates secure transmission of digital keys which ensures the data integrity and privacy. Moreover, the system supports dynamic key management which allows the users to revoke access remotely, thereby ensures controlled and time-sensitive sharing of the digital key. Additionally, the system the secures execution of instructions embedded in the digital keys, thereby maintaining operational efficiency.
In accordance with second aspect of the present disclosure, there is provided a method of access control of vehicle. The method comprises registering at least one user device and at least one buddy device, pairing securely the vehicle with the at least one user device or the at least one buddy device, sharing at least one digital key from the at least one user device to the at least one buddy device via a secured communication protocol.
Additional aspects, advantages, features and objects of the present disclosure would be made apparent from the drawings and the detailed description of the illustrative embodiments constructed in conjunction with the appended claims that follow.
It will be appreciated that features of the present disclosure are susceptible to being combined in various combinations without departing from the scope of the present disclosure as defined by the appended claims.
BRIEF DESCRIPTION OF DRAWINGS
The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
FIG. 1 illustrates a block diagram of a vehicle access control system, in accordance with an aspect of the present disclosure.
FIG. 2 illustrates a flow chart of access control of vehicle, in accordance with another aspect of the present disclosure.
In the accompanying drawings, an underlined number is employed to represent an item over which the underlined number is positioned or an item to which the underlined number is adjacent. A non-underlined number relates to an item identified by a line linking the non-underlined number to the item. When a number is non-underlined and accompanied by an associated arrow, the non-underlined number is used to identify a general item at which the arrow is pointing.
DETAILED DESCRIPTION
The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognise that other embodiments for carrying out or practising the present disclosure are also possible.
The description set forth below in connection with the appended drawings is intended as a description of certain embodiments of a vehicle access control system to represent the only forms that may be developed or utilised. The description sets forth the various structures and/or functions in connection with the illustrated embodiments; however, it is to be understood that the disclosed embodiments are merely exemplary of the disclosure that may be embodied in various and alternative forms. The figures are not necessarily to scale; some features may be exaggerated or minimised to show details of particular components. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the present invention.
While the disclosure is susceptible to various modifications and alternative forms, specific embodiment thereof has been shown by way of example in the drawings and will be described in detail below. It should be understood, however, that it is not intended to limit the disclosure to the particular forms disclosed, but on the contrary, the disclosure is to cover all modifications, equivalents, and alternatives falling within the scope of the disclosure.
The terms “comprise”, “comprises”, “comprising”, “include(s)”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a setup, system that comprises a list of components or steps does not include only those components or steps but may include other components or steps not expressly listed or inherent to such setup or system. In other words, one or more elements in a system or apparatus preceded by “comprises... a” does not, without more constraints, preclude the existence of other elements or additional elements in the system or apparatus.
In the following detailed description of the embodiments of the disclosure, reference is made to the accompanying drawings and which are shown by way of illustration specific embodiments in which the disclosure may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the disclosure, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present disclosure. The following description is, therefore, not to be taken in a limiting sense.
The present disclosure will be described herein below with reference to the accompanying drawings. In the following description, well known functions or constructions are not described in detail since they would obscure the description with unnecessary detail.
As used herein, the terms “vehicle” refers to any mode of transportation equipped with a control system capable of interacting with electronic or digital access mechanisms. This includes, but is not limited to, motorized vehicles such as cars, trucks, motorcycles, buses, and electric vehicles (EVs), as well as non-motorized vehicles like bicycles, provided they are equipped with electronic access systems. The vehicle further encompasses autonomous or semi-autonomous vehicles, fleet vehicles, and any other transportation apparatus.
As used herein, the term “vehicle access control system” and “system” are used interchangeably and refer to a system designed to manage, regulate, and secure access to a vehicle by enabling the registration, authentication, sharing, and management of digital keys associated with one or more user devices. The system ensures authorized entry and control of the vehicle by leveraging secure communication protocols, encryption mechanisms, and dynamic key management features. The system encompasses hardware and software modules, including but not limited to registration, authentication, key sharing, key generation, communication, storage, decryption, and termination modules, to facilitate controlled, secure, and flexible vehicle access for primary and shared users.
As used herein, the terms “registration module” refers to a component of the vehicle access control system configured to enable the registration of one or more devices, including a user device and a buddy device. The registration module is designed to establish a unique identification for each registered device and securely associate with the vehicle system, facilitating the subsequent pairing, communication, and management of digital keys.
As used herein, the term “at least one user device” and “user device” are used interchangeably and refer to any electronic device, including but not limited to smartphones, tablets, smartwatches, or similar portable devices, that is capable of interacting with the vehicle access control system. The user device is configured to perform functions such as registration, pairing, storage, sharing, or termination of digital keys, and communicates with the vehicle access control system via wired or wireless communication protocols, such as Bluetooth, Wi-Fi, NFC, or other equivalent technologies. The user device serves as a primary interface for the user to access, control, and manage the functionalities of the vehicle access system. The user device may be associated with the user (owner) of the vehicle.
As used herein, the term “at least one buddy device” and “buddy device” are used interchangeably and refer to an electronic device, other than the primary user device, that is registered with the vehicle access control system and is capable of securely receiving, storing, and utilizing a shared digital key. The buddy device is configured to perform predefined vehicle access or control functions as authorized by the user device, enabling shared access to the vehicle. The buddy device may include, but are not limited to, smartphones, smartwatches, tablets, key fobs, or other compatible communication-enabled devices.
As used herein, the term “authentication module” refers to a component configured to establish a secure and verified connection between the vehicle and at least one user device or buddy device. The authentication module ensures the legitimacy of the pairing process by validating the credentials of the connecting device using encryption techniques, algorithms, or other security protocols.
As used herein, the term “key sharing module” refers to a functional unit of the vehicle access control system configured to enable the transfer of at least one digital key from a registered user device to at least one buddy device. The key sharing module ensures the secure sharing of the digital key by employing a secured communication protocol, which may include encryption, authentication, and data integrity verification techniques.
As used herein, the term “at least one digital key” and “digital key” are used interchangeably and refer to an electronic credential comprising encoded data or instructions that facilitate secure access, control, or operation of a vehicle. The digital key may include authentication data, access permissions, or execution commands, and it is generated, encrypted, stored, transmitted, and utilized by the vehicle access control system. The digital key can be uniquely associated with a user device, a buddy device, or both, and is designed to operate within a secure communication protocol to prevent unauthorized access or manipulation.
As used herein, the term “secured communication protocol” refers to a set of rules and procedures used to establish a secure and encrypted communication channel between devices within the vehicle access control system. The secured communication protocol ensures the confidentiality, integrity, and authenticity of data exchanged between the user device, buddy device, and vehicle by employing encryption techniques, authentication measures, and secure data transmission methods. The secured communication protocol protects against unauthorized access, tampering, or interception of sensitive information, such as digital keys and instructions, while facilitating safe and reliable interaction between the system components.
As used herein, the term “key generation module” refers to a component of the vehicle access control system, configured to generate at least one digital key for secure pairing and authentication of user and buddy devices with a vehicle. The key generation module utilizes a cryptographic process to create the digital key, ensuring its uniqueness and security. The digital key may also include encryption capabilities to safeguard the key during its creation, providing protection against unauthorized access or tampering. The generated digital key contains instructions that are specific to the paired vehicle and can be used to grant or manage access control, enabling secure and controlled interaction between the devices and the vehicle.
As used herein, the term “at least one instruction” and “instruction” are used interchangeably and refer to a command, directive, or set of actions encoded within the digital key, which is to be executed by the vehicle system upon receiving the digital key from an authenticated user device or buddy device. The instruction may include, but is not limited to, functions such as unlocking or locking the vehicle, enabling or disabling specific vehicle features, granting temporary access to other users, initiating vehicle start procedures, or any other operational task associated with controlling the vehicle's access or functionality.
As used herein, the term “communication module” refers to a component of the vehicle access control system configured to facilitate secure data transmission between the user device, buddy device, and the vehicle. The communication module is responsible for enforcing a secured communication protocol to ensure the integrity and confidentiality of the exchanged information. The communication module supports the transmission of digital keys and instructions, enabling secure pairing, key sharing, and command execution between the paired devices and the vehicle, while preventing unauthorized access or tampering during the communication process.
As used herein, the term “key storage module” refers to a component of the vehicle access control system that is configured to securely store the at least one digital key. The digital key which may associated with the user device or the buddy device is securely stored in the key storage module and ensures that the key is securely retained within the respective device. The key storage module is responsible for protecting the digital key from unauthorized access, ensuring its integrity, and enabling the retrieval of the digital key when required to perform access control functions.
As used herein, the term “decryption module” refers to a component of the vehicle access control system configured to securely decrypt a digital key received from a paired user device or buddy device. Upon receiving the encrypted digital key, the decryption module utilizes appropriate cryptographic algorithms to reverse the encryption process, thereby extracting the instructions or data stored within the digital key. The decrypted instructions are then made available to be executed by the corresponding vehicle system, enabling authorized access or triggering specific actions in the vehicle.
As used herein, the term “key termination module” refers to a component of the vehicle access control system that is configured to manage the revocation or termination of digital keys shared with user devices or buddy devices. The key termination module receives termination instructions from the user device and subsequently communicates these instructions to the key storage module. Upon receiving the termination instructions, the key storage module is responsible for deleting the corresponding digital key from the relevant devices, effectively disabling access to the paired vehicle.
As used herein, the term “at least one termination instruction” refers to a command or directive issued by the at least one user device to instruct the system to invalidate or revoke a previously shared digital key. The at least one termination instruction may be transmitted to the key storage module to trigger the deletion or deactivation of the digital key on the at least one buddy device, thereby terminating access to the associated vehicle.
Figure 1, in accordance with an embodiment describes a vehicle access control system 100. The system 100 comprises a registration module 102 configured to register at least one user device 104 and at least one buddy device 106, an authentication module 108 configured to securely pair the vehicle with the at least one user device 104 or the at least one buddy device 106, a key sharing module 110, wherein the key sharing module 110 is configured to share at least one digital key from the at least one user device 104 to the at least one buddy device 106 via a secured communication protocol.
The present disclosure provides the vehicle access control system 100. The vehicle access control system 100 as disclosed by present disclosure is advantageous in terms of providing enhanced security and user convenience for vehicle owners and users. Beneficially, the system 100 ensures the communication protocol remains tamper-proof, thereby reduces the risks of potential security breaches or key theft. Beneficially, the system 100 integrates the at least one user device 104 and the at least one buddy device 106 for secure pairing and key sharing which ensures vehicle access to be managed easily between multiple users. Beneficially, the registration module 102 registers the at least one user device 104 and the at least one buddy device 106 to establish a unique identification for each registered device and securely associate with the vehicle system, facilitating the subsequent pairing, communication, and management of digital key. Furthermore, the authentication module 108 as disclosed by present disclosure beneficially authenticates the at least one user device 104 and the at least one buddy device 106 for secure pairing of both the devices. Furthermore, the key sharing module 110 as disclosed by present disclosure beneficially provides a robust mechanism for secure communication between the user device 104 and the buddy device 106, thereby prevents the unauthorized access. Beneficially, the ability of system 100 to store digital keys securely in a key storage module 116 on both the user device 104 and the buddy device 106 ensures the access is quickly granted or revoked as needed, thereby providing flexibility in managing multiple users. Furthermore, the inclusion of a key generation module 112 as disclosed in present disclosure is advantageously improves the security by ensuring the digital key which are uniquely generated and protected from unauthorized decryption. Moreover, the key termination module 120 enables the termination of shared digital keys, which significantly offers an additional layer of security and control to the vehicle. Additionally, the system is able to send termination instructions from the user device 106 to the key storage module 116 ensures the access control is dynamically managed without requiring physical intervention. Overall, the system 100 delivers a seamless, secure, and flexible solution for vehicle access management, which ensures that only authorized users are able to access the vehicle, while maintaining ease of use and high standards of digital security.
In an embodiment, the system 100 comprises a key generation module 112 configured to generate the at least one digital key. The key generation module 112 may be configured to produce a unique digital key for each of the at least one user device 104 and the at least one buddy device 106 associated with the system 100, which ensures the access to the vehicle is only granted to the authorized users. Beneficially, the key generation module 112 provides a secure and efficient method of generating the digital key tailored for each of the user device 104 and the buddy device 106, thereby enhancing the overall security and integrity of the vehicle access control system 100.
In an embodiment, the key generation module 112 is configured to encrypt the generated at least one digital key. The digital key generated by the key generation module 112 may be cryptographically secure, and the key generation module 112 incorporates the encryption mechanisms to protect the key from unauthorized access or tampering. Beneficially, the encryption mechanism enhances the overall security of the vehicle access control system 100 and mitigating potential risks associated with digital key theft or unauthorized duplication.
In an embodiment, the digital key comprises at least one instruction to be executed at the corresponding vehicle paired with the at least one user device 104 or the at least one buddy device 106. The instructions embedded within the digital key may encompass various operational commands, such as enabling or disabling the vehicle ignition system, locking or unlocking the vehicle, starting or stopping the vehicle engine, or adjusting vehicle settings such as climate control, seat positioning, or entertainment preferences. Upon receiving the digital key, the paired vehicle interprets and executes the at least one instruction, thereby allowing the authorized user (either the primary user or the buddy) to control specific vehicle functions remotely. Beneficially, the incorporation of the digital key facilitates seamless vehicle access and control through secure communication channels, thereby providing both convenience and security for the vehicle owner and the other authorized users.
In an embodiment, the system 100 comprises a communication module 114 configured to enforce the secured communication protocol. The communication module 114 plays a critical role in ensuring all communications between the user device 104, the buddy device 106 and the vehicle which are transmitted through encrypted and secure channels. Moreover, the communication module 114 may be responsible for initiating and managing the secure communication process, which includes encryption protocols, device verification identities, and ensures the data integrity during communication. Beneficially, the presence of the communication module 114 in the system 100 is vital for maintaining the overall security, which significantly ensures the digital key sharing process, vehicle control instructions, and access management without exposure to potential security threats.
In an embodiment, the system 100 comprises a key storage module 116 configured to store the generated at least one digital key in the at least one user device 104 and the at least one buddy device 106. The key storage module 116 may be functions as a dedicated storage area within the user device 104 and the buddy device 106 where digital keys are encrypted and securely held. When the digital key is generated by the key generation module 112, the digital key may be encrypted and transmitted to the key storage module 116 for safe storage in both the user device 104 and the buddy device 106. Beneficially, the key storage module 116 securely stores the digital key and make the digital key readily accessible for authorized use. Additionally, the key storage module 116 allows for seamless interconnection between the user device 104, the buddy device 106 and the vehicle which ensures only authorized devices with the proper digital key may interact with the vehicle.
In an embodiment, the system 100 comprises a decryption module 118 configured to decrypt the at least one digital key to execute the at least one instruction stored in the digital key. The decryption module 118 plays a critical role for ensuring that only authorized users, such as the user device 104 or the buddy device 106, may be able to access and execute the instructions embedded in the digital key. Upon receiving the encrypted digital key, the decryption module 118 utilizes a secure decryption algorithm to decode the digital key which makes the digital key usable for performing the at least one instruction associated with the vehicle. The at least one instruction may include a variety of commands, such as locking and unlocking the vehicle doors, starting the vehicle, adjusting settings within the vehicle, or other functions related to vehicle access control. Beneficially, the decryption process ensures the integrity of the digital key and prevents the any tampering with the key data. Furthermore, the decryption module 118 ensures that only trusted devices are able to decrypt and execute the at least one instruction, thereby minimizing the potential for unauthorized access.
In an embodiment, the system 100 comprises a key termination module 120 configured to terminate the at least one digital key shared with the at least one buddy device 106. The key termination module 120 may be designed to receive at least one termination instruction from the at least one user device 104. Moreover, the key termination module 120 provides a critical function in the management of vehicle access control by allowing the vehicle owner or authorized user to revoke access to the vehicle that was previously granted to the buddy device 106. Beneficially, the functionality of the key termination module 120 adds an additional layer of security to the vehicle access control system 100.
In an embodiment, the key termination module 120 is configured to receive at least one termination instruction from the at least one user device 104 and communicate the received at least one termination instruction to the key storage module 116. The termination instruction may be initiated by the user through the user device 104, such as a smartphone or another portable electronic device registered within the system 100. The termination instruction may be sent to the key termination module 120, which acts as a central component responsible for managing the validity of the digital key within the system 100. Beneficially, the key termination module 120 allows for the efficient and secure management of the digital key access and provides the user with full control over the vehicle to grant or revoke the access. Additionally, by leveraging secure communication protocols between the key termination module 120 and the key storage module 116, the system 100 ensures that the digital key may not be misused once terminated, thereby reinforcing the overall security of the vehicle access control system 100.
In an embodiment, the key storage module 116, upon receiving the at least one termination instruction, deletes the at least one terminated digital key from the at least one buddy device 106. The termination instruction for the digital key may be initiated by the user device 104, which communicates with the key storage module 116 via a secured communication protocol. The termination instruction may be triggered by various events, such as the revocation of access or the expiration of a predefined access period. After receiving the instruction, the key storage module 116 ensures that the key data is deleted from the buddy device 106, thereby preventing the digital key from being used at a later time. Beneficially, the deletion of the terminated key is carried out in such a way that no residual data remains on the buddy device 106, thereby ensures the complete removal of access privileges.
In an embodiment, the system 100 comprises the registration module 102 configured to register the at least one user device 104 and the at least one buddy device 106, the authentication module 108 configured to securely pair the vehicle with the at least one user device 104 or the at least one buddy device 106, the key sharing module 110, wherein the key sharing module 110 is configured to share the at least one digital key from the at least one user device 104 to the at least one buddy device 106 via the secured communication protocol. Furthermore, the system 100 comprises the key generation module 112 configured to generate the at least one digital key. Furthermore, the key generation module 112 is configured to encrypt the generated the at least one digital key. Furthermore, the digital key comprises the at least one instruction to be executed at the corresponding vehicle paired with the at least one user device 104 or the at least one buddy device 106. Furthermore, the system 100 comprises the communication module 114 configured to enforce the secured communication protocol. Furthermore, the system 100 comprises the key storage module 116 configured to store the generated the at least one digital key in the at least one user device 104 and the at least one buddy device 106. Furthermore, the system 100 comprises the decryption module 118 configured to decrypt the at least one digital key to execute the at least one instruction stored in the digital key. Furthermore, the system 100 comprises the key termination module 120 configured to terminate the at least one digital key shared with the at least one buddy device 106. Furthermore, the key termination module 120 is configured to receive at least one termination instruction from the at least one user device 104 and communicate the received at least one termination instruction to the key storage module 116. Furthermore, the key storage module 116, upon receiving the at least one termination instruction, deletes the at least one terminated digital key from the at least one buddy device 106.
Figure 2, describes a method 200 of access control of vehicle. The method 200 starts at step 202 and completes at step 206. At step 202, the method 200 comprises registering at least one user device 104 and at least one buddy device 106. At step 204, the method 200 comprises pairing securely the vehicle with the at least one user device 104 or the at least one buddy device 106. At step 206, sharing at least one digital key from the at least one user device 104 to the at least one buddy device 106 via a secured communication protocol.
It would be appreciated that all the explanations and embodiments of the portable device 100 also applies mutatis-mutandis to the method 200.
In the description of the present invention, it is also to be noted that, unless otherwise explicitly specified or limited, the terms “disposed,” “mounted,” and “connected” are to be construed broadly, and may for example be fixedly connected, detachably connected, or integrally connected, either mechanically or electrically. They may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present invention can be understood in specific cases to those skilled in the art.
Modifications to embodiments and combination of different embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as “including”, “comprising”, “incorporating”, “have”, “is” used to describe and claim the present disclosure are intended to be construed in a non- exclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural where appropriate.
Although embodiments have been described with reference to a number of illustrative embodiments thereof, it should be understood that numerous other modifications and embodiments can be devised by those skilled in the art that will fall within the spirit and scope of the principles of this disclosure. More particularly, various variations and modifications are possible in the component parts and/or arrangements of the subject combination arrangement within the scope of the present disclosure, the drawings and the appended claims. In addition to variations and modifications in the component parts and/or arrangements, alternative uses will also be apparent to those skilled in the art.
,CLAIMS:WE CLAIM:
1. A vehicle access control system (100), wherein the system (100) comprises:
- a registration module (102) configured to register at least one user device (104) and at least one buddy device (106);
- an authentication module (108) configured to securely pair the vehicle with the at least one user device (104) or the at least one buddy device (106);
- a key sharing module (110),
wherein the key sharing module (110) is configured to share at least one digital key from the at least one user device (104) to the at least one buddy device (106) via a secured communication protocol.
2. The system (100) as claimed in claim 1, wherein the system (100) comprises a key generation module (112) configured to generate the at least one digital key.
3. The system (100) as claimed in claim 2, wherein the key generation module (112) is configured to encrypt the generated at least one digital key.
4. The system (100) as claimed in claim 1, wherein the digital key comprises at least one instruction to be executed at the corresponding vehicle paired with the at least one user device (104) or the at least one buddy device (106).
5. The system (100) as claimed in claim 1, wherein the system (100) comprises a communication module (114) configured to enforce the secured communication protocol.
6. The system (100) as claimed in claim 1, wherein the system (100) comprises a key storage module (116) configured to store the generated at least one digital key in the at least one user device (104) and the at least one buddy device (106).
7. The system (100) as claimed in claim 1, wherein the system (100) comprises a decryption module (118) configured to decrypt the at least one digital key to execute the at least one instruction stored in the digital key.
8. The system (100) as claimed in claim 1, wherein the system (100) comprises a key termination module (120) configured to terminate the at least one digital key shared with the at least one buddy device (106).
9. The system (100) as claimed in claim 8, wherein the key termination module (120) is configured to receive at least one termination instruction from the at least one user device (104) and communicate the received at least one termination instruction to the key storage module (116).
10. The system (100) as claimed in claim 9, wherein the key storage module (116), upon receiving the at least one termination instruction, deletes the at least one terminated digital key from the at least one buddy device (106).
11. A method (200) of access control of vehicle, wherein the method (200) comprises:
- registering at least one user device (104) and at least one buddy device (106);
- pairing securely the vehicle with the at least one user device (104) or the at least one buddy device (106);
- sharing at least one digital key from the at least one user device (104) to the at least one buddy device (106) via a secured communication protocol.

Documents

Application Documents

# Name Date
1 202421002056-PROVISIONAL SPECIFICATION [11-01-2024(online)].pdf 2024-01-11
2 202421002056-POWER OF AUTHORITY [11-01-2024(online)].pdf 2024-01-11
3 202421002056-FORM FOR SMALL ENTITY(FORM-28) [11-01-2024(online)].pdf 2024-01-11
4 202421002056-FORM 1 [11-01-2024(online)].pdf 2024-01-11
5 202421002056-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [11-01-2024(online)].pdf 2024-01-11
6 202421002056-DRAWINGS [11-01-2024(online)].pdf 2024-01-11
7 202421002056-DECLARATION OF INVENTORSHIP (FORM 5) [11-01-2024(online)].pdf 2024-01-11
8 202421002056-FORM-5 [08-01-2025(online)].pdf 2025-01-08
9 202421002056-FORM 3 [08-01-2025(online)].pdf 2025-01-08
10 202421002056-DRAWING [08-01-2025(online)].pdf 2025-01-08
11 202421002056-COMPLETE SPECIFICATION [08-01-2025(online)].pdf 2025-01-08
12 202421002056-FORM-9 [15-01-2025(online)].pdf 2025-01-15
13 Abstract.jpg 2025-02-05
14 202421002056-FORM-26 [29-07-2025(online)].pdf 2025-07-29
15 202421002056-Proof of Right [22-09-2025(online)].pdf 2025-09-22