Abstract: A SYSTEM AND METHOD FOR VEHICLE SAFETY The present subject matter provides a method and system for unlocking a vehicle (100) involve several sequential steps. Initially, the control unit (104) receives a lock-unlock signal from the user digital device. Subsequently, it 5 checks at least one battery parameter to ensure proper functionality. The control unit (104) then determines whether a security unit (106) parameter has reached a predetermined value before sending a signal for the security unit (106) operation. Verification is conducted to confirm whether the user digital device is an authorized device associated with the vehicle. 10 Additionally, the control unit (104) checks the status of the lock-unlock signal from the user digital device. Finally, based on the lock-unlock signal status, the control unit (104) enables or disables the ignition unit (108). This technical process ensures controlled access to the vehicle's ignition system based on the authentication of the user digital device and the vehicle's 15 operational parameters.
Description:A SYSTEM AND METHOD FOR VEHICLE SAFETY
TECHNICAL FIELD
[0001] The present subject matter generally relates to system and method for a vehicle. More particularly, but not exclusively to a system and method 5 for vehicle safety.
BACKGROUND
[0002] In the realm of automotive technology, ensuring the security and safety of vehicles has always been a paramount concern. Traditional methods of vehicle access and security, such as mechanical keys and simple remote 10 keyless entry systems, have become increasingly vulnerable to sophisticated theft techniques. As a result, there has been a growing need for more robust and technologically advanced solutions to protect vehicles from unauthorized access and theft.
[0003] One technical problem that the claimed subject matter addresses is the 15 vulnerability of traditional key-based entry systems to theft and unauthorized access. Mechanical keys can be easily duplicated or stolen, providing unauthorized individuals with access to the vehicle. Likewise, simple remote keyless entry systems can be compromised using signal relay attacks or brute force methods, allowing thieves to unlock and steal vehicles without 20 detection.
[0004] Another technical challenge is the need for improved authentication methods to verify the legitimacy of the user attempting to unlock the vehicle. Traditional key fobs or remote entry systems lack robust authentication mechanisms, making them susceptible to unauthorized use. There is a need 25 for more sophisticated authentication techniques, such as encryption keys or biometric verification, to ensure that only authorized users can access the vehicle.
[0005] Furthermore, the reliance on battery-powered components within 30 modern vehicles presents additional technical hurdles. Battery parameters, such as voltage levels, temperature, and state of charge, can fluctuate and
3
impact the reliability and functionality of electronic systems within the vehicle. It is crucial to monitor these parameters and implement appropriate safeguards to prevent system failures or malfunctions due to battery issues.
[0006] Moreover, ensuring the security of the vehicle's ignition system is 5 essential for preventing theft and unauthorized use. Traditional ignition systems may lack adequate security measures, allowing thieves to start the engine and drive away with the vehicle. There is a need for a more comprehensive approach to controlling the ignition system, which includes enabling or disabling the ignition unit based on the status of signals received 10 from authenticated user devices.
[0007] Conventional methods for addressing the security challenges in vehicle access typically involve utilizing physical keys for entry or basic remote keyless entry systems operated via key fobs, alongside immobilizer systems. However, relying solely on physical keys poses risks of duplication 15 or theft, enabling unauthorized access to vehicles. Despite the convenience of remote keyless entry systems, they are vulnerable to relay attacks and lack robust authentication mechanisms, leaving them open to unauthorized access. Immobilizer systems, while effective in preventing engine start-up without a valid key or fob, often overlook vulnerabilities related to door access and can 20 still be circumvented through key cloning techniques. Despite providing some level of security, these conventional methods fail to effectively address modern security threats such as relay attacks, hacking, and unauthorized access. Consequently, there's a pressing need for more sophisticated solutions integrating multiple security layers, advanced authentication methods, and 25 real-time monitoring capabilities to enhance vehicle security and thwart theft or unauthorized access effectively.
[0008] Thus, there is a need in the art for a method and a system for a system and method for vehicle safety which addresses at least the aforementioned problems and other problems of known art. 30
[0009] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through
4
comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.
SUMMARY OF THE SUBJECT MATTER 5
[00010] The present disclosure describes a method and system designed for vehicle security. The system comprises three main components: a control unit, a user digital device, an ignition unit and a security unit, all interconnected to facilitate secure vehicle access. The control receives lock-unlock signals from the user digital device, indicating the user's intention to 10 unlock the vehicle. The control unit is responsible for monitoring at least one battery parameter, such as voltage level, temperature, or state of charge, to ensure the proper functionality of the vehicle's electronic systems. Additionally, it determines whether a security unit parameter has reached a predetermined value, ensured the operational readiness of the security unit, 15 before sending a signal to initiate security unit operation. Authentication of the user digital device is a crucial step, and the control unit verifies whether it is an authorized device associated with the vehicle, employing authentication techniques like encryption keys or biometric verification. Furthermore, the status of the lock-unlock signal from the user digital device 20 is checked to determine the user's authorization level. Based on this status, the control unit enables or disables the ignition unit, thereby controlling the vehicle's engine start-up. In an embodiment the user digital device may include a smartphone or key fob, serves as the interface for the user to send the lock-unlock signal to the vehicle's control unit. The security unit receives 25 signals from the user digital device, executes security measures, and ensures the vehicle's safety. Battery monitoring is essential within this system, as it continuously monitors battery parameters to maintain optimal performance and prevent system failures. Through the utilization of authentication techniques and precise control over the ignition unit, this comprehensive 30 system enhances security against unauthorized access while providing efficient vehicle access and start-up control.
5
[00011] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the subject matter, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS 5
[00012] The details are described with reference to an embodiment of a system and method for vehicle security along with the accompanying diagrams. The same numbers are used throughout the drawings to reference similar features and components.
[00013] Figure 1 exemplarily illustrates an environment diagram in 10 accordance with an embodiment of the present disclosure.
[00014] Figure 2 exemplarily illustrates a flowchart of method of system and method for vehicle security in accordance with an embodiment of the present disclosure.
15
DETAILED DESCRIPTION
[00015] Exemplary embodiments are described with reference to the accompanying drawings. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, 20 modifications, adaptations, and other implementations are possible without departing from the spirit and scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope and spirit being indicated by the following claims.
[00016] An objective of the present subject matter is to provide enhanced 25 security measures for vehicles, thereby reducing the risk of unauthorized access and theft. By incorporating advanced authentication techniques and real-time monitoring capabilities, the subject matter aims to significantly improve the overall security of vehicles.
6
[00017] An objective of the present subject matter is to provide users a convenient and user-friendly method for accessing their vehicles. By utilizing digital devices such as smartphones or key fobs, users can easily unlock their vehicles without the need for physical keys or complicated procedures.
[00018] An objective of the present subject matter is to enhance the overall 5 user experience by offering a seamless and intuitive vehicle access system. By streamlining the unlocking process and integrating advanced features such as biometric verification, the subject matter aims to provide users with a more efficient and enjoyable experience.
[00019] An objective of the present subject matter is to provide 10 comprehensive control over vehicle access and ignition start-up. By enabling the control unit to monitor battery parameters, verify user digital device authenticity, and control the ignition unit based on the lock-unlock signal status, the subject matter ensures a high level of control and security for vehicle owners. 15
[00020] An objective of the present subject matter is to prevent unauthorized use of vehicles by unauthorized individuals. By implementing robust authentication methods and real-time monitoring of user digital devices, the subject matter aims to deter potential thieves and unauthorized users from gaining access to vehicles without proper authorization. 20
[00021] An objective of the present subject matter is to enhance the safety of vehicles and their occupants by ensuring that only authorized users can access and start the vehicle. By controlling the ignition unit based on the status of the lock-unlock signal, the subject matter helps prevent accidental or unauthorized engine start-up, reducing the risk of accidents or theft-related 25 incidents.
[00022] In view of the above, the claimed limitations as discussed above are not routine, conventional, or well understood in the art, as the claimed limitations enable the above solutions to the existing problems in conventional technologies. 30
7
[00023] The present subject matter is described using a system and method for a vehicle safety which is used in a vehicle, whereas the claimed subject matter can be used in any other type of application employing above-mentioned system and amehtod, with required changes and without deviating from the scope of subject matter. Further, it is intended that the disclosure and 5 examples given herein be considered as exemplary only.
[00024] The terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some embodiments”, and “one embodiment” mean “one or more (but not all) embodiments of the subject matter(s)” unless expressly specified otherwise. 10 The terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless expressly specified otherwise. The terms “a”, “an” and “the” mean “one or more”, unless expressly specified otherwise.
[00025] The embodiments of the present subject matter will now be described 15 in detail with reference to the accompanying drawings. However, the present subject matter is not limited to the present embodiments. The present subject matter is further described with reference to accompanying figures. It should be noted that the description and figures merely illustrate principles of the present subject matter. Various arrangements may be devised that, although 20 not explicitly described or shown herein, encompass the principles of the present subject matter. Moreover, all statements herein reciting principles, aspects, and examples of the present subject matter, as well as specific examples thereof, are intended to encompass equivalents thereof.
[00026] Figure 1 exemplarily illustrates an environment diagram in 25 accordance with an embodiment of the present disclosure. The present disclosure describes a system for vehicle security, which comprises of a control unit (104), a user digital device (102), a security unit (106) and an ignition unit (108). The control unit (104) coordinates various functions to ensure secure access and operation. The control unit (104) encompasses a 30 plurality of components, which may include microcontrollers, sensors,
8
processors, and communication modules. The microcontrollers execute programmed algorithms governing authentication, authorization, and ignition control. Sensors integrated within the control unit (104) monitor crucial vehicle parameters such as battery voltage, temperature, and system status. The control unit (104) employs wireless communication protocols which may 5 include Bluetooth, Wi-Fi, or NFC (Near Field Communication) to interface with the user digital device (102). Additionally, wired connections like CAN (Controller Area Network) bus or LIN (Local Interconnect Network) enable seamless communication with the security unit (106) and ignition unit (108). This hybrid communication architecture ensures robust and reliable data 10 exchange within the vehicle security system.
The control unit (104) communicates with the user digital devices, which serve as primary interface for users to interact with the vehicle security system, sending lock-unlock signals, receiving authentication prompts, and providing status updates. The control unit (102) allows the security system to adapt to diverse user 15 preferences and technological advancements, ensuring seamless user experience and future-proof. [00027]
The user digital device (102) may include but not limited to smartphones, tablets, smartwatches, key fobs, and even specialized vehicle companion apps installed on wearable devices or embedded systems. These 20 devices serve as the primary means for users to initiate and authorize vehicle access remotely. The user digital device (102) equipped with dedicated applications or integrated vehicle control features, offer an interface for interacting with the vehicle security system. Users can send lock-unlock signals, receive authentication prompts, and monitor vehicle status in real-25 time through intuitive graphical interfaces. The user digital device (102) encompassing emerging technologies such as wearable devices and embedded vehicle control systems. Wearable devices equipped with NFC or Bluetooth capabilities can serve as proximity keys, automatically unlocking the vehicle when in close proximity. Embedded vehicle control systems, 30 integrated into smart home automation platforms or IoT (Internet of Things) ecosystems, enable seamless integration with home security systems and
9
remote access functionalities.
The user digital device (102) represents a diverse array of consumer electronics and emerging technologies, serving as the primary interface for users to interact with the vehicle security system. [00028] Figure 2 exemplarily illustrates a flowchart of method of system and method for vehicle security in accordance with an embodiment of the present 5 disclosure. The method starts at step 200 and proceeds to step 202 where the control unit (104) receives a lock-unlock signal from a user digital device (102). The step then proceeds to step 204 where the control unit (104) checks at least one battery parameter. In step 204, the control unit (104) engages in a critical assessment of at least one battery parameter to ascertain the 10 operational integrity of the vehicle's power source. These parameters include voltage, denoting the battery's charge state, and temperature, a pivotal factor in its electrochemical processes. Additionally, the evaluation encompasses the battery's capacity, representing its charge storage capacity, and the state of charge (SOC), indicating the remaining available charge percentage. 15 Moreover, battery health, reflective of its overall condition and longevity, and internal resistance, impacting power delivery efficiency, are scrutinized. Predetermined thresholds are established for these parameters to detect deviations from optimal operating conditions, thereby triggering appropriate responses such as warnings or remedial actions like recharging or 20 replacement. If the battery parameters are not below the predetermined value then the step proceeds to step 206 where the vehicle unlocks normally and begins to function. If the battery parameters are below a predetermined value then the step proceeds to step 208 where the control unit checks whether the security unit parameter has reached a predetermined value. The 25 predetermined value may include voltage input specifications, delineating optimal voltage levels necessary for sustained functionality, and current consumption limits to prevent undue strain on the electrical subsystems. Once the control unit (104) has verified whether the security system has reached the predetermined values for the security unit parameters the step proceeds to 30 step 210 where the control unit (104) sends a signal for a security unit (106) operation. The step then proceeds to 212 where the control unit (104) verifies
10
whether the user digital device is an authorized device associated with the vehicle (100). In step 212, the control unit (104) engages in a verification process to determine whether the user digital device attempting to interact with the vehicle (100) is indeed an authorized device associated with the vehicle. This verification serves as a critical security measure aimed at 5 ensuring that only approved digital devices can access and interact with the vehicle's systems. The verification process typically involves comparing the digital signature or unique identifier transmitted by the user digital device with a list of authorized devices stored within the control unit's memory. This list may include devices that have been previously paired or registered with 10 the vehicle, typically through a secure authentication process. If the digital signature or identifier matches one of the entries in the list of authorized devices, the control unit (104) confirms that the user digital device (102) is legitimate and permitted to access the vehicle's functions. However, if there is no match or if the device is not found on the list of authorized devices, the 15 control unit (104) will deny access and prevent further interaction with the vehicle. By verifying the authenticity of the user digital device (102), the control unit (104) helps safeguard the vehicle (100) against unauthorized access and potential security breaches. This ensures that only authorized users with approved digital devices can control and operate the vehicle, enhancing 20 overall security and protecting against potential threats such as theft or unauthorized tampering. The step then proceeds to 214 where the control unit (104)checks the status of the lock-unlock signal from the user digital device(102). The step 214 is provided to verify whether the user prefers the vehicleto be unlocked. If the signal from the user digital device is for unlocking the 25 vehicle, then the step proceeds to step 218, if not the step flows to 216 where the vehicle will be in locked condition. At step 218 the control unit (104) enables or disables the ignition unit (108) based on the lock-unlock signal status. [00029] For further clarity the present subject matter shall be explained with 30 a working example. Let's consider a detailed working example of the claimed invention in action, addressing the conventional problems and achieving the
11
objectives stated earlier. In this scenario, we'll focus on a vehicle equipped with the claimed unlocking system:
Scenario: Enhancing Vehicle Security and Access Control
Example Parameters:
Vehicle: Fictional vehicle equipped with the claimed unlocking 5 system.
User Digital Device: Smartphone with a dedicated mobile app for vehicle access.
Control Unit: Central processing unit within the vehicle responsible for coordinating unlocking process and security measures. 10
Security Unit: Immobilizer unit integrated into the vehicle's security system.
Example Steps:
User Initiates Unlocking Process:
User approaches the vehicle and opens the mobile app on their 15 smartphone. User selects the option to unlock the vehicle.
Control Unit Receives Signal:
The control unit within the vehicle receives the lock-unlock signal from the user's smartphone via Bluetooth or Wi-Fi.
Battery Parameter Check: 20
The control unit checks the battery parameters to ensure proper functionality of the vehicle's electronic systems. Example values: Battery voltage at 12.6 volts, battery temperature at 25°C, state of charge at 90%.
Security Unit Parameter Determination:
The control unit checks the voltage supplied to the security unit to ensure 25 it's within the predetermined range. Example value: Voltage supplied to the security unit is at 12.8 volts.
Security Unit Operation Signal:
12
Since the security unit parameter is within the acceptable range, no additional operation signal is required.
User Digital Device Verification:
The control unit verifies the authenticity of the user's smartphone using encryption keys stored in the security unit. User's smartphone 5 successfully authenticated.
Lock-Unlock Signal Status Check:
The control unit confirms the status of the lock-unlock signal from the user's smartphone. Signal indicates the user's intent to unlock the vehicle. 10
Ignition Unit Control:
The control unit enables the ignition unit, allowing the user to start the vehicle's engine if desired. User can now enter the vehicle, start the engine, and drive away.
[00030] A person with ordinary skills in the art will appreciate that the 15 systems, modules, and sub-modules have been illustrated and explained to serve as examples and should not be considered limiting in any manner. It will be further appreciated that the variants of the above disclosed system elements, modules, and other features and functions, or alternatives thereof, may be combined to create other different systems or applications. 20
[00031] The present subject matter offers several technical advantages over conventional vehicle unlocking and security systems. One of the primary technical advantages is the integration of advanced security measures. By incorporating authentication techniques such as encryption keys or biometric verification, the subject matter provides a higher level of security compared 25 to traditional mechanical keys or basic remote keyless entry systems. This helps prevent unauthorized access and reduces the risk of vehicle theft. The subject matter includes real-time monitoring capabilities for various parameters, such as battery voltage, temperature, and state of charge. This allows the system to detect and respond to potential issues promptly, ensuring 30
13
optimal performance and reliability of the vehicle's electronic systems. Unlike conventional systems that may only focus on door access, the claimed subject matter provides comprehensive control over vehicle access and ignition start-up. It verifies the legitimacy of the user digital device, checks the status of the lock-unlock signal, and enables or disables the ignition unit 5 accordingly. This ensures that only authorized users can access and start the vehicle, enhancing security. The subject matter offers users a convenient and user-friendly method for accessing their vehicles. By using digital devices such as smartphones or key fobs, users can easily unlock their vehicles without the need for physical keys. This improves the overall user experience 10 and eliminates the inconvenience associated with traditional key-based entry systems. Through its advanced authentication methods and real-time monitoring capabilities, the subject matter effectively prevents unauthorized use of vehicles by unauthorized individuals. This helps protect the vehicle from theft and ensures that only authorized users can operate the vehicle, 15 enhancing safety and security. The claimed subject matter can be adapted and integrated into various vehicle models and electronic systems. Whether it's a new vehicle or a retrofit for an existing one, the system can be customized to meet specific requirements and seamlessly integrate with the vehicle's infrastructure. Overall, the technical advantages of the claimed invention 20 include enhanced security measures, real-time monitoring capabilities, comprehensive control over vehicle access, improved user convenience, prevention of unauthorized use, and adaptability for integration into different vehicle systems. [00032] In light of the above mentioned advantages and the technical 25 advancements provided by the disclosed method and system, the claimed steps as discussed above are not routine, conventional, or well understood in the art, as the claimed steps enable the following solutions to the existing problems in conventional technologies. Further, the claimed steps clearly bring an improvement in the functioning of the configuration itself as the 30 claimed steps provide a technical solution to a technical problem.
14
[00033] A description of an embodiment with several components in communication with another does not imply that all such components are required, On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the subject matter.
[00034] Finally, the language used in the specification has been principally 5 selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter and is therefore intended that the scope of the subject matter be limited not by this detailed description, but rather by any claims that issue on an application based here on. Accordingly, the embodiments of the present subject matter 10 are intended to be illustrative, but not limiting, of the scope of the subject matter, which is set forth in the following claims.
[00035] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of 15 illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
[00036] While the present disclosure has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made, and equivalents may be substituted without 20 departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from its scope. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed, but that the present disclosure will include 25 all embodiments falling within the scope of the appended claims. , Claims:I/We Claim:
1.A method of unlocking a vehicle (100), the method comprising:
Receiving by a control unit (104) a lock-unlock signal from a 5 user digital device;
Checking by the control unit (104) at least one battery parameter;
Determining by the control unit (104) whether a security unit (106)parameter has reached a predetermined value;10
Sending by the control unit (104) a signal for a security unit(106)operation;
Verifying by the control unit (104) whether the user digitaldevice is an authorized device associated to the vehicle (100);
Checking by the control unit (104) the status of the lock-15 unlock signal from the user digital device;
Enabling or disabling the ignition unit (108) by the control unit(104)based on the lock-unlock signal status.
2.The method of unlocking the vehicle (100) as claimed in claim 1,wherein the at least one battery parameter comprises at least one of a20 voltage level of the battery, a temperature of the battery, or a state ofcharge of the battery.
3.The method of unlocking the vehicle (100) as claimed in claim 1,wherein the security unit (106) parameter comprises monitoring avoltage supplied to the security unit (106).25
4.The method of unlocking the vehicle (100) as claimed in claim 1,wherein verifying the user digital device includes authenticating thedevice through encryption keys or biometric verification.
5.The method of unlocking the vehicle (100) as claimed in claim 1,wherein enabling or disabling the ignition unit (108) includes30 preventing engine start-up or allowing engine start-up based on thestatus of the lock-unlock signal.
16
6.The method of unlocking the vehicle (100) as claimed in claim 1,wherein the user digital device is authenticated based on a comparisonof transmitted encryption keys with stored authorization data withinthe security unit (106).
7.A vehicle (100)unlocking system comprising:5
8.a control unit (104) configured to:
a user digital device, the user digital device is in communication with a security unit (106), wherein the user digital device configured to send a lock unlock signal to the security unit (106), 10
a control unit, the control unit (104) configure to enable or disable an ignition unit (108) upon
receiving the lock-unlock signal from a user digital device,
checking by the control unit (104) at least one battery parameter, 15
determining by the control unit (104) whether the security unit (106)parameter has reached a predetermined value,
sending by the control unit (104) a signal for the security unit(106)operation;
verifying by the control unit (104) whether the user digital20 device is an authorized device associated to the vehicle (100);
checking by the control unit (104) the status of the lock-unlocksignal from the user digital device;
enabling or disabling the ignition unit (108) by the control unit(104)based on the lock-unlock signal status.25
9.The vehicle (100) unlocking system of claim 8, wherein the at leastone battery parameter includes at least one of a voltage level of thebattery, a temperature of the battery, or a state of charge of the battery.
10.The vehicle (100) unlocking system of claim 8, wherein the security30 unit (106) parameter comprises monitoring a voltage supplied to thesecurity unit (106).
17
5
10
11.The vehicle (100) unlocking system of claim 8, wherein verifying the user digital device includes authenticating the device through encryption keys or biometric verification.12.The vehicle (100) unlocking system of claim 10, wherein enabling or disabling the ignition unit (108) includes preventing engine start-up or allowing engine start-up based on the status of the lock-unlock signal.13.The vehicle (100) unlocking system of claim 8, wherein the security unit (106) is an immobilizer unit configured to receive the signal from the user digital device and perform security measures based on the received signal.
| # | Name | Date |
|---|---|---|
| 1 | 202441024538-STATEMENT OF UNDERTAKING (FORM 3) [27-03-2024(online)].pdf | 2024-03-27 |
| 2 | 202441024538-REQUEST FOR EXAMINATION (FORM-18) [27-03-2024(online)].pdf | 2024-03-27 |
| 3 | 202441024538-FORM 18 [27-03-2024(online)].pdf | 2024-03-27 |
| 4 | 202441024538-FORM 1 [27-03-2024(online)].pdf | 2024-03-27 |
| 5 | 202441024538-FIGURE OF ABSTRACT [27-03-2024(online)].pdf | 2024-03-27 |
| 6 | 202441024538-DRAWINGS [27-03-2024(online)].pdf | 2024-03-27 |
| 7 | 202441024538-COMPLETE SPECIFICATION [27-03-2024(online)].pdf | 2024-03-27 |
| 8 | 202441024538-Proof of Right [21-06-2024(online)].pdf | 2024-06-21 |