Sign In to Follow Application
View All Documents & Correspondence

A System For Accessing A Vehicle And A Method Thereof

Abstract: ABSTRACT A SYSTEM FOR ACCESSING A VEHICLE AND A METHOD THEREOF The present invention relates to a system (100) and method (200) for accessing a vehicle. The system comprises a first control unit (122) and a second control unit (130). The second control unit (130) is configured to receive a command indicative of a first user input from the first control unit (122), transmit a first encrypted unique identification number to the first control unit (122), receive a first response to the first encrypted unique identification number, authenticate first user input based on the first response, execute the command indicative of first user input based on the authentication, transmit a second encrypted unique identification number to first control unit (122) without receipt of a command indicative of a second user input from first control unit (122), receive a second response to second encrypted unique identification number and execute the command indicative of second user input without authentication of second response. Reference Figure 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
01 March 2024
Publication Number
36/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

TVS MOTOR COMPANY LIMITED
“Chaitanya” No.12 Khader Nawaz Khan Road, Nungambakkam Chennai-600 006, Tamil Nadu India

Inventors

1. AJAYKUMAR VASU
TVS Motor Company Limited “Chaitanya” No 12 Khader Nawaz Khan Road, Nungambakkam Chennai-600 006, Tamil Nadu India
2. SATAKSHI ROY
TVS Motor Company Limited “Chaitanya” No 12 Khader Nawaz Khan Road, Nungambakkam Chennai-600 006, Tamil Nadu India
3. BALAGANESH SELVARAJAN
TVS Motor Company Limited “Chaitanya” No 12 Khader Nawaz Khan Road, Nungambakkam Chennai-600 006, Tamil Nadu India

Specification

Description:FIELD OF THE INVENTION
[001] The present invention relates to a vehicle. More particularly, the present invention relates to a system for accessing a vehicle.

BACKGROUND OF THE INVENTION
[002] In recent years, the integration of wireless communication systems into vehicle control systems has become increasingly prevalent. One significant application of this technology is in remote keyless entry (RKE) systems, where wireless transmitters/receivers are utilized for functions such as locking/unlocking doors, trunk access, and activating alarm systems of the vehicle. These systems have evolved further to include Passive Entry and Passive Start (PEPS) systems, offering enhanced convenience and safety features for vehicle users.
[003] These systems typically involve a portable communication device, such as a key fob or card, which communicates with a module within the vehicle to perform various functions like door lock/unlock and engine start. One key aspect of these systems is the bidirectional communication between the vehicle's electronic control module (ECU) and the portable device. Upon receiving a request for action, the vehicle's transceiver broadcasts an interrogating signal, to which the portable communication device responds with an encrypted code, thus enabling the desired operation.
[004] However, existing keyless entry systems for automobiles face significant challenges, including issues related to data transmission efficiency and security. Additionally, remote keyless entry systems encounter data communication inefficiencies, particularly during the encryption process due to unforeseen circumstances. Further, the current keyless entry systems lack a comprehensive and secure ranging method that combines proximity detection with cryptographic challenge/response mechanisms. This leads to insufficient security measures and unauthorized access to vehicle systems, potentially leading to vehicle theft or unauthorized access. Despite the adoption of various authentication methods, reauthenticated communication remains a persistent problem in keyless entry systems. This leads to latency issues and the potential interruptions during the encryption process, results in compromised user experience and security vulnerabilities. Moreover, reauthentication leads excessive data consumed during communication, which not only impacts system efficiency but also contributes to higher power consumption over time resulting in reduced battery life and increased operational costs for vehicle owners.
[005] In view of the foregoing, it is desirable to overcome a least the above-mentioned disadvantages of the prior art.

SUMMARY OF THE INVENTION
[006] In one aspect of the invention, a system for accessing a vehicle is disclosed. The system has a first control unit provided in a portable electronic device and a second control unit provided in the vehicle. The second control unit configured to be communicatively coupled to the first control unit. The second control unit is configured to receive a command indicative of a first user input from the first control unit and transmit a first encrypted unique identification number to the first control unit. The second control unit is further configured to receive a first response to the first encrypted unique identification number from the first control unit and authenticate the first user input based on the first response received from the first control unit. The second control unit is configured to execute the command indicative of the first user input based on the authentication and transmit a second encrypted unique identification number to the first control unit without receipt of a command indicative of a second user input from the first control unit. The second control unit is further configured to receive a second response to the second encrypted unique identification number from the first control unit and execute the command indicative of the second user input without authentication of the second response.
[007] In an embodiment, the first control unit is configured to compute the first response to the first encrypted unique identification number and the second response to the second encrypted unique identification number received from the second control unit.
[008] In an embodiment, the first control unit is configured to embed the command indicative of the first user input with the first response, the first user input received from a user on the portable electronic device.
[009] In an embodiment, the command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.
[010] In an embodiment, the first control unit is configured to embed the command indicative of the second user input with the second response, the second user input received from a user on the portable electronic device.
[011] In an embodiment, the command indicative of the second user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.
[012] In an embodiment, the second encrypted unique identification number transmitted from the second control unit is active for a predetermined time period.
[013] In an embodiment, the portable electronic device is a key fob.
[014] In an embodiment, the second control unit is configured to transmit the second encrypted unique identification number via a server upon wireless communication being established with the first control unit.
[015] In another aspect of the present invention, a method for accessing a vehicle is disclosed. The method has a step of receiving by a second control unit, a command indicative of a first user input from the first control unit. The second control unit provided in the vehicle and configured to be communicatively coupled to the first control unit. The method further has a step of transmitting a first encrypted unique identification number to the first control unit. The step of transmitting is performed by the second control unit. The method further has a step of receiving, a first response to the first encrypted unique identification number from the first control unit. The step of receiving the first response is performed by the second control unit. The method further has a step of authenticating the first user input based on the first response received from the first control unit. The step of authenticating the first response is performed by the second control unit. The method further has a step of executing the command indicative of the first user input based on the authentication. The step of executing is performed by the second control unit. The method further has a step of transmitting a second encrypted unique identification number to the first control unit without receipt of a command indicative of a second user input from the first control unit. The step of transmitting is performed by the second control unit. The method further has a step of receiving a second response to the second encrypted unique identification number from the first control unit. The step of transmitting is performed by the second control unit. The method further has a step of executing the command indicative of the second user input without authentication of the second response. The step of executing is performed by the second control unit.
[016] In an embodiment, the method has the step of computing, by the first control unit, the first response to the first encrypted unique identification number and the second response to the second encrypted unique identification number received from the second control unit.
[017] In an embodiment, the method has the step of embedding, by the first control unit, the command indicative of the first user input with the first response, the first user input received from a user on the portable electronic device.
[018] In an embodiment, the command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.
[019] In an embodiment, the method has the step of embedding, by the first control unit, the command indicative of the second user input with the second response, the second user input received from a user on the portable electronic device.
[020] In an embodiment, the command indicative of the second user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.
[021] In an embodiment, the second encrypted unique identification number transmitted from the second control unit is active for a predetermined time period.
[022] In an embodiment, the portable electronic device is a key fob.
[023] In an embodiment, the method has the step of transmitting, by the second control unit, the second encrypted unique identification number via a server upon wireless communication being established with the first control unit.

BRIEF DESCRIPTION OF THE DRAWINGS
[024] Reference will be made to embodiments of the invention, examples of which may be illustrated in accompanying figures. These figures are intended to be illustrative, not limiting. Although the invention is generally described in context of these embodiments, it should be understood that it is not intended to limit the scope of the invention to these particular embodiments.
Figure 1 illustrates a block diagram of a system for accessing a vehicle, in accordance with an embodiment of the present invention.
Figure 2 illustrates a block diagram of a system for accessing a vehicle, in accordance with an embodiment of the present invention. Figure 3 illustrates a flow diagram of a method for accessing a vehicle, in accordance with an embodiment of the present invention.
Figure 4 illustrates a flow diagram of a method for accessing a vehicle, in accordance with an embodiment of the present invention.

DETAILED DESCRIPTION OF THE INVENTION
[025] Various features and embodiments of the present invention here will be discernible from the following further description thereof, set out hereunder.
[026] For the purpose of the present invention, the term “vehicle” includes bicycles, scooters, trikes, motorcycles, rickshaws, lorries, cars, trucks, buses etc. The term “vehicle” also includes electric vehicles, hybrid vehicles and conventional internal combustion engine vehicles.
[027] Figure 1 illustrates a block diagram of a system for accessing a vehicle, in accordance with an embodiment of the present invention. As shown in Figure 1, the system 100 comprises a first control unit 122 and a second control unit 130. The first control unit 122 provided in a portable electronic device 120. The second control unit 130 provided in the vehicle 132. The second control unit 130 configured to be communicatively coupled to the first control unit 122. The second control unit 130 is also referred to as vehicle control unit. In an embodiment, the first control unit 122 communicates wirelessly with the second control unit 130. In a non-limiting example, the wireless communication may be one of Bluetooth, Wi-Fi, ZigBee, ANT, Ultra-wideband (UWB), Near-field communication (NFC), Radio Frequency (RF) and Low Frequency (LF). In a non-limiting example, the portable electronic device 120 can be a key fob configured to be communicatively coupled with the second control unit 130. In another non-limiting example, the portable electronic device 120 can be one of a personal digital assistant, a smartphone, a smartwatch, a smart glove and a smart ring of a user of vehicle 132, such as an owner or a rider, configured to be communicatively coupled with the second control unit 130. These examples should not be construed as limiting and the other now known or later developed portable electronic device 120 capable of providing user input indicative of a command for the vehicle 132 are well within the scope of the present invention. A first user input is received from the user on the portable electronic device 120. The first control unit 122 is configured to transmit a command indicative of a first user input to the second control unit 130. The first control unit 122 is configured to embed the command indicative of the first user input with the first response. The command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap. The first control unit 122 is configured to receive a first encrypted unique identification number from the second control unit 130. The first control unit 122 is configured to compute the first response to the first encrypted unique identification number. In a non-limiting example, the method of encryption can be asymmetrical or symmetrical encryption.
[028] The portable electronic device 120 further comprises a wireless transceiver 124 and a security module 126. The wireless transceiver 124 of the portable electronic device 120 is configured to facilitate communication between the second control unit 130 of the vehicle 132 and the portable electronic device 120 via radio frequency (RF) signals. In an example, when a user presses a button on the key fob to perform a specific action, such as unlocking the vehicle's doors, the wireless transceiver 124 sends a radio frequency signal containing the corresponding command. This signal is transmitted wirelessly and received by the second control unit 130 of vehicle 132. The security module 126 is configured to encode and decode encrypted unique identification number, helping to maintain the security of the system of the vehicle 132.
[029] As shown in Figure 1, the system 100 comprises the second control unit 130. The second control unit 130 provided in the vehicle 132. The second control unit 130 is configured to receive a command indicative of a first user input from the first control unit 122. In an embodiment, the vehicle 132 comprises a wireless transceiver 134 to facilitate communication between the second control unit 130 of the vehicle 132 and the portable electronic device 120. The command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap. In an embodiment, a vehicle bus communication unit 136 manages communication between the second control unit 130, a vehicle mobility controller 150 and the various vehicle components 140. In an embodiment, the communication between the second control unit 130 and the various vehicle components 140 is a wired communication. The various vehicle components 140 comprises a seat lock, a fuel cap, a door lock, an ignition system and a rear hatch lock. The first control unit 122 being configured to embed the command indicative of the first user input with the first response, the first user input received from a user on the portable electronic device 120.
[030] The second control unit 130 is configured to transmit a first encrypted unique identification number to the first control unit 122. The first control unit 122 is configured to compute the first response to the first encrypted unique identification number. The second control unit 130 is configured to receive a first response to the first encrypted unique identification number from the first control unit 122. In an example, the encrypted unique identification number is a unique authentication key used to authenticate the key fob thus ensuring that only authorized key fobs can interact with the vehicle's electronic control module (ECU). Each key fob is assigned a unique identification number by the vehicle manufacturer.
[031] The second control unit 130 is configured to authenticate the first user input based on the first response received from the first control unit 122. In an embodiment, the security module 138 of the vehicle 132 is configured to encode and decode encrypted unique identification number, helping to maintain the security of the system of the vehicle 132. In an example, the second control unit 130 of the vehicle 132 transmits the encrypted identification number as part of the communication signal to the first control unit 122 of the portable communication unit 120. Upon receiving the signal, the second control unit 130 decrypts the transmitted identification number using the appropriate decryption key. If the decrypted identification number matches the one stored in the memory of the second control unit 130 for authorized portable communication unit 120, the second control unit 130 authenticates the portable communication unit 120.
[032] The second control unit 130 is further configured to execute the command indicative of the first user input based on the authentication. In an example, if the command indicative of the first user input is unlocking the vehicle door, upon authentication the second control unit 130 send a signal to unlock the vehicle door.
[033] The second control unit 130 is configured to transmit a second encrypted unique identification number to the first control unit 122 without receipt of a command indicative of a second user input from the first control unit 122. The second encrypted unique identification number transmitted from the second control unit 130 is active for a predetermined time period. For example, the second control unit 130 transmits the second encrypted unique identification number to the first control unit 122 in advance for the next session. Thereby, the present invention reduces the number of connections between the second control unit 130 of the vehicle 132 and first control unit 122 of the portable electronic device 120, and therefore decreases the boot-up time of the vehicle 132, data and power consumed.
[034] The first control unit 122 is configured to compute a second response to the second encrypted unique identification number. The first control unit 122 is configured to embed the command indicative of the second user input with the second response. The command indicative of the second user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap. The second control unit 130 is configured to receive the second response to the second encrypted unique identification number from the first control unit 122. The second control unit 130 is configured to execute the command indicative of the second user input without authentication of the second response. For example, the second control unit 130 of the vehicle 132 transmits another encrypted identification number as part of the communication signal to the first control unit 122 of the portable communication unit 120. Upon receiving a signal from the first control unit 122 in response, the second control unit 130 sends a signal to execute the command indicative of the second user input without authentication.
[035] Thereby, the present invention eliminates the need for reauthentication between the portable electronic device 120 and the vehicle 132 reducing signal latency which otherwise exist in conventional keyless entry system. Further, the present invention reduces data and power consumption.
[036] Figure 2 illustrates a block diagram of a system for accessing a vehicle, in accordance with an embodiment of the present invention. In an embodiment, the second control unit 130 is configured to transmit the second encrypted unique identification number via a server 160 upon wireless communication being established with the first control unit 122. In an example, the second control unit 130 can post the encrypted unique identification number to a common server and the portable electronic device 120 can fetch the encrypted unique identification number from the server 160 and prepare the response in advance. In example, the communication between the portable electronic device 120 and the server 160 is long range wireless communication. In another example, the communication between the portable electronic device 120 and the second control unit 130 is short range wireless communication. In yet another example, the communication between the second control unit 130 and the server 160 is long range wireless communication.
[037] Figure 3 illustrates a flow diagram of a method for accessing a vehicle, in accordance with an embodiment of the present invention.
[038] As shown, the method 200 comprises a step 202 of receiving a command indicative of a first user input from a first control unit 122. The step 202 of receiving is performed by a second control unit 130. The first control unit 122 provided in a portable electronic device 120. The second control unit 130 provided in the vehicle 132. The second control unit 130 configured to be communicatively coupled to the first control unit 122. In a non-limiting example, the portable electronic device 120 can be a key fob configured to be communicatively coupled with the second control unit 130. These examples should not be construed as limiting and the other now known or later developed devices capable of providing user input indicative of a command with respect to the vehicle 132 are well within the scope of the present invention. The command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.
[039] The method 200 further comprises step 204 of transmitting a first encrypted unique identification number to the first control unit 122. The step 204 of transmitting is performed by the second control unit 130. The unique identification number is non-repeatable and unique for every session.
[040] The method 200 further comprises step 206 of receiving a first response to the first encrypted unique identification number from the first control unit 122. The step 206 of receiving is performed by the second control unit 130. In a non-limiting example, the first control unit 122 sends the same non-repeatable and encrypted unique identification number back to the second control unit 130 to successfully be validated. However, these examples should not be construed as limiting as different variations of the encrypted unique identification number can be defined by the manufacturer of the vehicle.
[041] The method further comprises step 208 of authenticating the first user input based on the first response received from the first control unit 122. The step 206 of authenticating is performed by the second control unit 130. In an example, the first response is processed to authenticate such that the second control unit 130 determines if the first response matches the expected encrypted unique identification number.
[042] The method further comprises step 210 of executing the command indicative of the first user input based on the authentication. The step 210 of executing is performed by the second control unit 130.
[043] The method further comprises step 212 of transmitting a second encrypted unique identification number to the first control unit 122 without receipt of a command indicative of a second user input from the first control unit 122. The step 212 of transmitting is performed by the second control unit 130. For example, the second control unit 130 transmits the second encrypted unique identification number to the first control unit 122 in advance for the next session. Thereby, the present invention reduces the number of connections between the second control unit 130 of the vehicle 132 and first control unit 122 of the portable electronic device 120, and therefore decreases the boot-up time of the vehicle 132, data and power consumed.
[044] The method further comprises a step 214 of receiving a second response to the second encrypted unique identification number from the first control unit 122. The step 214 of receiving is performed by the second control unit 130.
[045] The method further comprises step 216 of executing the command indicative of the second user input without authentication of the second response. The step 216 of executing is performed by the second control unit 130. For example, the second control unit 130 of the vehicle 132 transmits another encrypted identification number as part of the communication signal to the first control unit 122 of the portable communication unit 120. Upon receiving a signal from the first control unit 122 in response, the second control unit 130 sends a signal to execute the command indicative of the second user input without authentication. Thereby, the present invention eliminates the need for reauthentication between the portable electronic device 120 and the vehicle 132 reducing signal latency which otherwise exist in conventional keyless entry system. Further, the present invention reduces data and power consumption.
[046] Figure 4 illustrates a flow diagram of a method for accessing a vehicle, in accordance with an embodiment of the present invention. As shown, the method 300 comprises a step 302 of wireless connection between the portable electronic device 120 and the vehicle control unit 130. The wireless communication channel between the portable electronic device 120 and the vehicle control unit 130 may be established via Bluetooth, Wi-Fi, infrared, cellular network, and other forms of wireless communication media. At step 304, a first user input is received from the user on the portable electronic device 120. The first control unit 122 is configured to transmit a command indicative of a first user input to the vehicle control unit 130. At step 306, if the command indicative of the first user input is received for the first time, the step moves to 308. At step 308, the vehicle control unit 130 transmits a first encrypted unique identification number. At step 310, the first control unit 122 of the portable electronic device 120 receives the first encrypted unique identification number and computes a first response. Upon receiving the first response and authenticating the first response, at step 312, the vehicle control unit 130 executes the command indicative of the first user input. At step 306, if the command indicative of the first user input is not received for the first time, the step moves to 314. At step 314, the vehicle control unit 130 transmits a second encrypted unique identification number in advance for the next session in the same session. At step 316, the first control unit 122 of the portable electronic device 120 receives the second encrypted unique identification number and computes a second response in advance. Upon receiving the second response, at step 318, the vehicle control unit 130 executes the command indicative of the second user input without authentication. In the present invention, encrypted unique identification number is sent in advance during the same session, thus minimizing signal latency, power consumption and data consumption.
[047] The claimed features/method steps of the present invention as discussed above are not routine, conventional, or well understood in the art, as the claimed features/steps enable the following solutions to the existing problems in conventional technologies.
[048] By reducing the overall time taken for vehicle access, the present invention enhances the vehicle's performance, allowing users to access their vehicle quickly and seamlessly. Specifically, the present invention provides a streamlined process by eliminating reauthentication required for vehicle access compared to traditional keyless entry systems, thereby enhancing overall efficiency and user experience. By reducing the number of connections between the vehicle control unit (VCU) and the portable unit, the present invention enhances vehicle security and minimizes the risk of hacking or unauthorized access attempts. In the present invention, encrypted unique identification number is sent in advance during the same session, thus minimizing power consumption and extending the battery life of portable units. Further, the reduced number of connections between the control unit of the vehicle and the portable electronic device 120 decreases the vehicle's boot-up time.
[049] In the present invention, an auxiliary power unit is formed integrally with anti-theft device. In case of disabling or tampering with the main power unit of the vehicle, the anti-theft device will be powered by the auxiliary power unit and an alert will be generated.
[050] The present invention eliminates the need for reauthentication between the portable electronic device and the vehicle reducing signal latency which otherwise exist in conventional keyless entry system. Further, the present invention reduces data and power consumption.
[051] While the present invention has been described with respect to certain embodiments, it will be apparent to those skilled in the art that various changes and modification may be made without departing from the scope of the invention as defined in the following claims.

List of Reference Numerals

100- System for Accessing a Vehicle
120- Portable Electronic Device
122- First Control Unit
124- Wireless Transceiver of Portable Electronic Device
126- Security Module of Portable Electronic Device
130- Second Control Unit
132- Vehicle
134- Wireless Transceiver of Vehicle
136- Vehicle Bus Communication Unit
138- Security Module of Vehicle
140-Vehicle Components
150- Vehicle Mobility Controller
160-Server
200, 300- Method for Accessing a Vehicle
, Claims:WE CLAIM:

1. A system (100) for accessing a vehicle (132), the system (100) comprising:
a first control unit (122), the first control unit (122) provided in a portable electronic device (120); and
a second control unit (130), the second control unit (130) provided in the vehicle (132) and configured to be communicatively coupled to the first control unit (122), the second control unit (130) configured to:
- receive, a command indicative of a first user input from the first control unit (122);
- transmit, a first encrypted unique identification number to the first control unit (122);
- receive, from the first control unit (122), a first response to the first encrypted unique identification number;
- authenticate, based on the first response received from the first control unit (122), the first user input;
- execute, based on the authentication, the command indicative of the first user input;
- transmit, a second encrypted unique identification number to the first control unit (122) without receipt of a command indicative of a second user input from the first control unit (122);
- receive, from the first control unit (122), a second response to the second encrypted unique identification number; and
- execute, the command indicative of the second user input without authentication of the second response.

2. The system (100) as claimed in claim 1, wherein the first control unit (122) being configured to compute the first response to the first encrypted unique identification number and the second response to the second encrypted unique identification number received from the second control unit (130).

3. The system (100) as claimed in claim 1, wherein the first control unit (122) being configured to embed the command indicative of the first user input with the first response, the first user input received from a user on the portable electronic device (120).

4. The system (100) as claimed in claim 3, wherein the command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.

5. The system (100) as claimed in claim 1, wherein the first control unit (122) being configured to embed the command indicative of the second user input with the second response, the second user input received from a user on the portable electronic device (120).

6. The system (100) as claimed in claim 5, wherein the command indicative of the second user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.

7. The system (100) as claimed in claim 1, wherein the second encrypted unique identification number transmitted from the second control unit (130) being active for a predetermined time period.

8. The system (100) as claimed in claim 1, wherein the portable electronic device (120) being a key fob.

9. The system (100) as claimed in claim 1, wherein the second control unit (130) being configured to transmit the second encrypted unique identification number via a server (160) upon wireless communication being established with the first control unit (122).

10. A method (200) for accessing a vehicle (132), the first control unit (122) provided in a portable electronic device (120), the method (200) comprising the steps of:
- receiving, by a second control unit (130), a command indicative of a first user input from the first control unit (122), the second control unit (130) provided in the vehicle (132) and configured to be communicatively coupled to the first control unit (122);
- transmitting, by the second control unit (130), a first encrypted unique identification number to the first control unit (122);
- receiving, by the second control unit (130), a first response to the first encrypted unique identification number from the first control unit (122);
- authenticating, by the second control unit (130), the first user input based on the first response received from the first control unit (122);
- executing, by the second control unit (130), the command indicative of the first user input based on the authentication;
- transmitting, by the second control unit (130), a second encrypted unique identification number to the first control unit (122) without receipt of a command indicative of a second user input from the first control unit (122);
- receiving, by the second control unit (130), a second response to the second encrypted unique identification number from the first control unit (122); and
- executing, by the second control unit (130), the command indicative of the second user input without authentication of the second response.

11. The method (200) as claimed in claim 10, wherein method (200) comprising the step of computing, by the first control unit (122), the first response to the first encrypted unique identification number and the second response to the second encrypted unique identification number received from the second control unit (130).

12. The method (200) as claimed in claim 10, wherein the method (200) comprising the step of embedding, by the first control unit (122), the command indicative of the first user input with the first response, the first user input received from a user on the portable electronic device (120).

13. The method (200) as claimed in claim 12, wherein the command indicative of the first user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.

14. The method (200) as claimed in claim 10, wherein the method (200) comprising the step of embedding, by the first control unit (122), the command indicative of the second user input with the second response, the second user input received from a user on the portable electronic device (120).

15. The method (200) as claimed in claim 14, wherein the command indicative of the second user input being one of: unlocking a vehicle door, locking a vehicle door, opening a vehicle door, starting a vehicle engine, unlocking a trunk, unlocking a rear hatch, unlocking seat and unlocking fuel cap.

16. The method (200) as claimed in claim 10, wherein the second encrypted unique identification number transmitted from the second control unit (130) being active for a predetermined time period.

17. The method (200) as claimed in claim 10, wherein the portable electronic device (120) being a key fob.

18. The method (200) as claimed in claim 10, wherein the method (200) comprising the step of transmitting, by the second control unit (130), the second encrypted unique identification number via a server (160) upon wireless communication being established with the first control unit (122).

Dated this 01st day of March 2024

TVS MOTOR COMPANY LIMITED
By their Agent & Attorney

(Nikhil Ranjan)
of Khaitan & Co
Reg No IN/PA-1471

Documents

Application Documents

# Name Date
1 202441015457-STATEMENT OF UNDERTAKING (FORM 3) [01-03-2024(online)].pdf 2024-03-01
2 202441015457-REQUEST FOR EXAMINATION (FORM-18) [01-03-2024(online)].pdf 2024-03-01
3 202441015457-PROOF OF RIGHT [01-03-2024(online)].pdf 2024-03-01
4 202441015457-POWER OF AUTHORITY [01-03-2024(online)].pdf 2024-03-01
5 202441015457-FORM 18 [01-03-2024(online)].pdf 2024-03-01
6 202441015457-FORM 1 [01-03-2024(online)].pdf 2024-03-01
7 202441015457-FIGURE OF ABSTRACT [01-03-2024(online)].pdf 2024-03-01
8 202441015457-DRAWINGS [01-03-2024(online)].pdf 2024-03-01
9 202441015457-DECLARATION OF INVENTORSHIP (FORM 5) [01-03-2024(online)].pdf 2024-03-01
10 202441015457-COMPLETE SPECIFICATION [01-03-2024(online)].pdf 2024-03-01
11 202441015457-Covering Letter [04-03-2025(online)].pdf 2025-03-04