Abstract: SYSTEM AND METHOD OF AUTHORIZING A USER OF A VEHICLE The present invention discloses a vehicle (100) which comprises of a control unit (104), an ignition unit (108), and a user digital device (102). The user digital device (102) communicates with both the control unit (104) and a 5 remote storage device (106). The control unit (104) authorizes a user by providing a first set of credentials to the user digital device (102). It verifies these credentials' association with the vehicle owner. If confirmed, the device gains access to input a second set of credentials. Once entered, the device verifies their availability in the remote storage unit (104). If found, it retrieves 10 associated secondary user information and sends it to the remote storage. Upon receiving a verification signal linked to either set of credentials, the control unit (104) grants access to operate the vehicle (100).
Description:SYSTEM AND METHOD OF AUTHORIZING A USER OF A VEHICLE
TECHNICAL FIELD
[0001] The field of invention describes a method and system of a vehicle 5 authorize users to access the vehicle. More particularly the present invention pertains to methods and systems for allowing access to and operation of a vehicle based on the verification of credentials provided by a owner of the vehicle.
BACKGROUND 10
[0002] Traditional methods of vehicle access and operation authorization have predominantly relied on physical keys or key fobs. While effective to a certain extent, these methods have faced several challenges in terms of security, convenience, and flexibility. As technology has advanced, there has been a growing need for more sophisticated and secure means of authorizing 15 vehicle access and operation, particularly in the context of increasing digitization and connectivity in automotive systems.
[0003] Conventionally it is observed that physical keys and key fobs can be lost, stolen, or duplicated, posing security risks for vehicle owners. Additionally, traditional key-based systems may be susceptible to 20 unauthorized access through techniques such as lock picking or key cloning.
[0004] Generally, with conventional key-based systems, granting temporary access to others, such as family members, friends, or service personnel, often involves physically providing them with a spare key or key fob. This process is cumbersome and may not be suitable for situations where immediate or 25 temporary access is required.
[0005] Generally, physical keys do not provide granular control over who can access and operate the vehicle. Once a key is provided, the user has unrestricted access until the key is returned. Users expect seamless integration of their digital devices with other aspects of their lives, including their 30 vehicles. There is a growing demand for vehicle access and operation
3
authorization systems that can leverage the capabilities of smartphones, wearables, and other digital devices. Vehicle owners may need to grant access to their vehicles remotely, such as when authorizing someone to use their vehicle while they are away. Traditional key-based systems do not offer convenient remote management capabilities. With the increasing prevalence 5 of biometric authentication and other advanced security measures in digital devices, there is a need for vehicle access systems that can leverage these technologies to enhance authentication and authorization processes. [0006] Traditional vehicle access and operation authorization rely on physical keys or key fobs. Physical keys can be lost, stolen, or duplicated, 10 leading to unauthorized access. Sharing keys or key fobs with others requires physical handover and may not be suitable for granting temporary access. Once a key is provided, the user has unrestricted access until the key is returned, increasing the risk of unauthorized use.
[0007] Conventionally Vehicles equipped with centralized locking systems 15 allow users to lock and unlock doors remotely using a key fob or smartphone app. While effective for securing vehicle doors, centralized locking systems do not address access to the vehicle's ignition system or other operation controls. Key fobs can be stolen or lost, potentially granting unauthorized access to the vehicle if not promptly reported. 20
[0008] Some vehicles allow users to input a password or PIN directly into the vehicle's interface to authorize access and operation. Passwords or PINs entered manually can be observed by others, compromising security. Manually entering passwords or PINs can be time-consuming and inconvenient, especially in situations where quick access is needed. 25
[0009] Advanced vehicles may offer biometric authentication methods such as fingerprint scanners or facial recognition systems. Biometric authentication systems are not yet widely available in all vehicles. Biometric systems may face technical challenges such as false positives or false negatives, impacting reliability. Implementing biometric authentication can 30 add significant cost to vehicle manufacturing.
4
[00010] Thus, there is a need in the art for a method and a system for a system and method for authorizing user of a vehicle which addresses at least the aforementioned problems and other problems of known art.
[00011] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through 5 comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.
[00012]
SUMMARY OF THE INVENTION 10
[00013] According to embodiments illustrated herein, the present invention provides a method of authorizing a user of a vehicle is implemented by providing a first set of credentials to a user digital device and verifying by the user digital device that the first set of credentials is associated with the owner of the vehicle. Access to an interface for inputting a second set of credentials 15 is allowed by the user digital device. The second set of credentials is then provided to the user digital device, and it is verified whether the second set of credentials is available in a remote storage unit. A secondary user information associated with the second set of credentials is provided to the user digital device, which subsequently sends the secondary user information to the 20 remote storage unit. Upon detection of a verification signal associated with at least one of the first set of credentials and the second set of credentials, authorization for the secondary user to access vehicle operation is granted by a control unit. In an embodiment, the remote storage unit stores the first set of credentials, and the second set of credentials is stored in association with a 25 vehicle identification number. The first set of credentials includes at least one of an owner mobile number, owner mailing information, owner specific password, owner specific serial number, owner specific pin-code, and biometric information of the owner. Similarly, the second set of credentials includes at least one of a secondary user mobile number, secondary user 30 mailing information, secondary user specific password, secondary user
5
specific serial number, secondary user specific pin-code, and biometric information of the secondary user. The user digital device may comprise a handheld digital device, a personal computer, a wearable digital device, or an interfacing device with the vehicle. The remote storage unit is typically a remote server, and the control unit is associated with a vehicle security system 5 or a vehicle control unit. [00014] According to embodiments illustrated herein, the present invention provides a vehicle which comprises of a control unit and an ignition unit, along with a user digital device configured to communicate with both the control unit and a remote storage device. The control unit is configured to 10 authorize a user of the vehicle by following a series of steps. Initially, the control unit provides a first set of credentials to the user digital device, which then verifies whether these credentials are associated with the owner of the vehicle. Upon successful verification, the user digital device is granted access to an interface for inputting a second set of credentials. Subsequently, the user 15 digital device receives the second set of credentials and verifies their availability in the remote storage unit. Upon confirmation, the user digital device receives secondary user information associated with the second set of credentials, which is then sent to the remote storage unit. The control unit then authorizes access to vehicle operation upon detecting a verification 20 signal associated with either the first set of credentials or the second set of credentials. In an embodiment, access to vehicle operation involves enabling or disabling the ignition unit. In an embodiment, the user digital device can communicate with the control unit and the remote storage device through various communication methods including Bluetooth, Wi-Fi, cellular, 25 satellite, NFC, and radio frequency communication.
[00015] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
30
6
BRIEF DESCRIPTION OF THE DRAWINGS
[00016] The details are described with reference to an embodiment of a system and method for authorizing a user of a vehicle along with the accompanying diagrams. The same numbers are used throughout the drawings to reference similar features and components. 5
[00017] Figure 1 exemplarily illustrates an environmental diagram in accordance with an embodiment of the present disclosure.
[00018] Figure 2 exemplarily illustrates a flowchart of method and system for authorizing a user of a vehicle in accordance with an embodiment of the present disclosure. 10
DETAILED DESCRIPTION
[00019] Exemplary embodiments are described with reference to the accompanying drawings. Wherever convenient, the same reference numbers 15 are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the spirit and scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary 20 only, with the true scope and spirit being indicated by the following claims.
[00020] An objective of the present subject matter is to enhance the security of vehicle access and operation authorization. By leveraging digital credentials and advanced authentication techniques, the invention aims to reduce the risk of unauthorized access, key theft, and vehicle theft. 25
[00021] An objective of the present subject matter is to provide vehicle owners with greater flexibility in managing access to their vehicles. The invention enables owners to grant temporary access to secondary users
7
without the need for physical keys or key handovers, improving convenience and control. [00022] An objective of the present subject matter is to align with modern users' digital lifestyles by leveraging digital devices such as smartphones, computers, and wearables. By enabling seamless integration between these 5 devices and vehicle access systems, the invention enhances user experience and convenience.
[00023] An objective of the present subject matter is to manage access to their vehicles remotely is another objective. The invention allows owners to grant or revoke access privileges from anywhere, enhancing flexibility and 10 convenience, particularly in scenarios such as car sharing or remote vehicle monitoring.
[00024] An objective of the present subject matter is to provide granular control over access permissions, allowing owners to specify different levels of access for different users. This granularity reduces the risk of unauthorized 15 use and enhances security.
[00025] An objective of the present subject matter is to provide reliable and efficient communication between digital devices, remote storage units, and vehicle control units is a key objective. The invention aims to employ various communication protocols to facilitate seamless data exchange, minimizing 20 latency and ensuring responsiveness.
[00026] An objective of the invention is designed to be scalable and compatible with a wide range of vehicles and digital devices. Whether it's a fleet vehicle, or a shared transportation service, the invention aims to provide a versatile solution that can be easily adapted to different use cases and 25 vehicle types.
[00027] In view of the above, the claimed limitations as discussed above are not routine, conventional, or well understood in the art, as the claimed limitations enable the above solutions to the existing problems in conventional technologies. 30
8
[00028] The present subject matter is described using a method and system for authorizing a user of a vehicle, whereas the claimed subject matter can be used in any other type of application employing above-mentioned method and system, with required changes and without deviating from the scope of invention. Further, it is intended that the disclosure and examples given herein 5 be considered as exemplary only.
[00029] The terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some embodiments”, and “one embodiment” mean “one or more (but not all) embodiments of the invention(s)” unless expressly specified otherwise. The 10 terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless expressly specified otherwise. The terms “a”, “an” and “the” mean “one or more”, unless expressly specified otherwise.
[00030] The embodiments of the present invention will now be described in 15 detail with reference to the accompanying drawings. However, the present invention is not limited to the present embodiments. The present subject matter is further described with reference to accompanying figures. It should be noted that the description and figures merely illustrate principles of the present subject matter. Various arrangements may be devised that, although 20 not explicitly described or shown herein, encompass the principles of the present subject matter. Moreover, all statements herein reciting principles, aspects, and examples of the present subject matter, as well as specific examples thereof, are intended to encompass equivalents thereof.
[00031] Figure 1 exemplarily illustrates an environmental diagram in 25 accordance with an embodiment of the present disclosure. The present disclosure describes a vehicle (100) which comprises of a control unit (104), an ignition unit (108), a user digital device (102), and a remote storage unit (106). In an embodiment the user digital device (102) configured to communicate with the control unit (104) and a remote storage unit (106). The 30 user digital device (102) facilitating communication with both the control unit
9
(104)and a remote storage device (106). In an embodiment the user digitaldevice (102) communicate with the control unit (104) and a remote storagedevice (106) through at least one of a Bluetooth communication, a Wi-Ficommunication, a cellular communication, a satellite communication, anNFC, and a Radio frequency communication. The user digital device (102)5 may include smartphones, tablets, laptops, desktop computers, smartwatches,fitness trackers, VR/AR headsets, drones, wearable health monitors, andinfotainment systems. The remote storage unit (106) may include cloudstorage services, network-attached storage (NAS) devices located in datacentres, or storage servers hosted by third-party providers. 10 [00032] Figure 2 illustrates a procedural flow for authorizing a user of a vehicle, according to one embodiment. The process begins with step 200, initializing the procedure. Subsequently, at step 202, a user digital device (102)is provided with a first set of credentials, which typically include uniqueidentifiers or authentication keys associated with the vehicle owner (100). 15 These credentials could encompass a username and password, cryptographic keys, an owner mobile number, an owner mailing information, an owner specific password, an owner specific serial number, an owner specific pin-code, and biometric information of the owner. Moving to step 204, the user digital device (102) verifies these credentials to ensure they correspond to the 20 authorized owner of the vehicle (100). This verification process may involve cryptographic operations, biometric matching, or communication with a central authentication server. If the verification succeeds, the process advances to step 206, allowing access to an interface where a second set of credentials can be inputted via the user digital device (102). This interface 25 could manifest as a touchscreen display, a mobile application, a keypad, or any other interactive means for user input. The second set of credentials typically pertains to the secondary user seeking authorization to access the vehicle (100). In an embodiment, the second set of credential comprises of at least one of a secondary user mobile number, a secondary user mailing 30 information, a secondary user specific password, a secondary user specific serial number, a secondary user specific pin-code, and biometric information
10
of the secondary user. These credentials may include similar types of information as the first set, tailored to the secondary user's identity and authentication requirements. Continuing to step 208, a second set of credentials is provided to the user digital device (102), which could be transmitted via a wireless communication protocol, such as Bluetooth or 5 NFC, or manually entered by the secondary user. In an embodiment, the second set of credentials is stored in association with a vehicle (100) identification number. Step 210 involves the user digital device (102) verifying these credentials to ascertain their availability within a remote storage unit (104), which could be a cloud-based authentication service, a 10 vehicle-based authentication module, or any other centralized repository of user authentication data. If the credentials are not found in the remote storage unit (104), step 210a provides secondary user information linked to the second set of credentials to the user digital device (102). This information could include additional identity verification details or authorization tokens. 15 In an embodiment, the remote storage unit (104) stores the first set of credentials, and the second set of credentials is stored in association with a vehicle (100) identification number. Following this, in step 212, the secondary user information is transmitted from the user digital device (102) to the remote storage unit (104), typically through encrypted communication 20 channels to ensure data security and integrity. Upon confirming the presence of the second set of credentials in the remote storage unit (104) or after transmitting the secondary user information, the process proceeds to step 214. [00033] At this stage, authorization for the secondary user to operate the vehicle (100) is granted by a control unit (104) upon detecting a verification 25 signal associated with either the first set of credentials or the second set of credentials. This verification signal could take various forms, such as cryptographic signatures, biometric confirmations, or unique authorization tokens exchanged between the user digital device (102) and the control unit (104). In an embodiment, the control unit (104) is associated with at least one 30 of a vehicle security system and a vehicle control unit.
11
[00034] Finally, the process concludes at step 216, with the secondary user successfully authorized to access and operate the vehicle (100) as per the established authentication protocol.
[00035] Additionally, the procedure further comprises a lane change function and a course change function. In an embodiment, the lane change function 5 initiates upon receiving a short press input from a user through a user interface integrated into a vehicle control system, while a course change function is initiated upon receiving a long press input from a user through a user interface integrated into a vehicle control system.
[00036] The present disclosure can be further explained through a detailed 10 working example. The detailed example is as provided below:
Let's consider a scenario where Alice owns a vehicle equipped with the claimed invention's authorization system. Alice frequently lends her vehicle to her friend Bob, but she wants to ensure that only Bob can access and operate the vehicle when needed. 15
Initialization: Alice sets up the authorization system through the vehicle's interface, linking her digital device (smartphone) to the vehicle's control unit and the remote storage unit (a cloud-based server). Alice's digital device is registered as the primary user, and she provides her mobile number (555-1234) as the first set of credentials. 20
Granting Access to Bob: Alice decides to grant access to Bob, a secondary user, through the system. She accesses the system's interface on her digital device and inputs Bob's mobile number (555-5678) as the second set of credentials.
Verification Process: Alice's digital device verifies her primary credentials 25 (mobile number 555-1234) to confirm her identity as the vehicle owner. Once verified, the system allows Alice to input the second set of credentials (Bob's mobile number 555-5678).
Remote Storage Verification: Alice's digital device sends a request to the remote storage unit to verify Bob's credentials. The remote storage unit 30
12
checks its database and confirms that Bob's mobile number (555-5678) is associated with the secondary user information previously provided by Alice.
Secondary User Information Exchange: Upon successful verification, the remote storage unit retrieves Bob's secondary user information, including his name and a temporary access code. This information is sent back to Alice's 5 digital device.
Authorization by Control Unit: When Bob needs to use the vehicle, he approaches it with his smartphone, which is also registered with the authorization system. Bob's digital device sends a verification signal containing his credentials (mobile number 555-5678) to the vehicle's control 10 unit. The control unit receives the signal and verifies Bob's credentials against the stored data. Upon successful verification, the control unit authorizes vehicle operation, enabling Bob to start the engine and drive the car.
Usage and Monitoring: Alice can monitor Bob's usage of the vehicle remotely through the system's interface on her digital device. She receives notifications 15 when Bob starts and stops the engine, providing her with real-time information about the vehicle's usage.
[00037] The present disclosure provides several advantages over the conventional system and method for authorizing a user for a vehicle. The use of digital credentials and advanced authentication techniques improves 20 security by reducing the risk of unauthorized access, key theft, and vehicle theft compared to traditional physical key-based systems. Multi-step verification processes add layers of security, making it more difficult for unauthorized users to gain access to the vehicle.
[00038] Leveraging digital devices such as smartphones, computers, and 25 wearables enhances user experience and convenience by aligning with modern digital lifestyles. Users can seamlessly interact with the vehicle's access and operation authorization system through familiar digital interfaces, improving usability.
[00039] Vehicle owners can manage access to their vehicles remotely, 30 allowing them to grant or revoke access privileges from anywhere, at any
13
time. This capability is particularly useful for scenarios such as car sharing, remote vehicle monitoring, and emergency access management. [00040] The invention provides granular control over access permissions, allowing owners to specify different levels of access for different users based on their roles or relationship with the vehicle owner. This granularity reduces 5 the risk of unauthorized use and enhances security by ensuring that only authorized users have access to specific vehicle functions.
[00041] Reliable and efficient communication between digital devices, remote storage units, and vehicle control units ensures responsive and seamless operation. The invention employs various communication protocols 10 such as Bluetooth, Wi-Fi, cellular, satellite, NFC, or radio frequency to facilitate fast and reliable data exchange.
[00042] The invention is designed to be scalable and compatible with a wide range of vehicles and digital devices, making it suitable for different use cases and vehicle types. Whether it's a personal car, a fleet vehicle, or a shared 15 transportation service, the invention provides a versatile solution that can be easily adapted to different environments and requirements.
[00043] A person with ordinary skills in the art will appreciate that the systems, modules, and sub-modules have been illustrated and explained to serve as examples and should not be considered limiting in any manner. It 20 will be further appreciated that the variants of the above disclosed system elements, modules, and other features and functions, or alternatives thereof, may be combined to create other different systems or applications.
[00044] In light of the above-mentioned advantages and the technical advancements provided by the disclosed method and system, the claimed 25 steps as discussed above are not routine, conventional, or well understood in the art, as the claimed steps enable the following solutions to the existing problems in conventional technologies. Further, the claimed steps clearly bring an improvement in the functioning of the configuration itself as the claimed steps provide a technical solution to a technical problem. 30
14
[00045] A description of an embodiment with several components in communication with another does not imply that all such components are required, On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the invention.
[00046] Finally, the language used in the specification has been principally 5 selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter and is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based here on. Accordingly, the embodiments of the present invention are 10 intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
[00047] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of 15 illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
[00048] While the present disclosure has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made, and equivalents may be substituted without 20 departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from its scope. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed, but that the present disclosure will include 25 all embodiments falling within the scope of the appended claims. , Claims:I/We Claim:
1.A method of authorizing a user of a vehicle (100), the methodcomprising:
providing to a user digital device (102) a first set of credentials; 5
verifying by the user digital device (102) the first set of credentials is associated with the owner of the vehicle (100);
allowing access by the user digital device (102) to an interface for inputting a second set of credentials;
providing to a user digital device (102) the second set of 10 credentials;
verifying by the user digital device (102) whether the second set of credentials is available in a remote storage unit (104);
providing to the user digital device (102) a secondary user information associated to the second set of credentials; 15
sending by the user digital device (102) the secondary user information to the remote storage unit (104); and
authorizing by a control unit (104) the secondary user to access a vehicle (100) operation upon detection of a verification signal associated to at least one of the first set of credentials and the 20 second set of credentials.
2.The method of authorizing a user of a vehicle (100) as claimed inclaim 1, wherein the remote storage unit (104) stores the first set ofcredentials, and the second set of credentials is stored in associationto a vehicle identification number.25
3.The method of authorizing a user of a vehicle (100) as claimed inclaim 1, wherein the first set of credential comprises of at least one ofan owner mobile number, an owner mailing information, an ownerspecific password, an owner specific serial number, an owner specificpin-code and a biometric information of the owner.30
4.The method of authorizing a user of a vehicle (100) as claimed inclaim 1, wherein the second set of credential comprises of at least one
16
of a secondary user mobile number, a secondary user mailing information, a secondary user specific password, a secondary user specific serial number, a secondary user specific pin-code and a biometric information of the secondary user. 5.The method of authorizing a user of a vehicle (100) as claimed in 5 claim 1, wherein the user digital device (102) comprises at least one of a handheld digital device, a personal computer, a wearable digital device, and an interfacing device with the vehicle (100).
6.The method of authorizing a user of a vehicle (100) as claimed inclaim 1, wherein remote storage unit (104) is a remote server.10
7.The method of authorizing a user of a vehicle (100) as claimed inclaim 1, wherein the control unit (104) is associated with at least oneof a vehicle (100) security system and a vehicle (100) control unit(104).
8.The method of authorizing a user of a vehicle (100) as claimed in15 claim 1, further comprises of a lane change function and a coursechange function,
wherein the lane change function initiates upon receiving a short press input from a user through a user interface integrated into a vehicle control system, 20
wherein a course change function is initiated upon receiving a long press input from a user through a user interface integrated into a vehicle control system.
9.A vehicle (100) comprising:
a control unit (104); 25
an ignition unit (108);
a user digital device (102), the user digital device (102) configured to communicate with the control unit (104) and a remote storage device (106),
Wherein the control unit (104) configured to authorize 30 a user of a vehicle (100) upon:
17
providing to the user digital device (102) a first set of credentials;
verifying by the user digital device (102) the first set of credentials is associated with the owner of the vehicle (100); 5
allowing access by the user digital device (102) to an interface for inputting a second set of credentials;
providing to the user digital device (102) the second set of credentials;
verifying by the user digital device (102) whether the 10 second set of credentials is available in the remote storage unit (104);
providing to the user digital device (102) a secondary user information associated to the second set of credentials; 15
sending by the user digital device (102) the secondary user information to the remote storage unit (104); and
authorizing by the control unit (104) access to a vehicle (100) operation upon detection of a verification signal associated to at least one of the first 20 set of credentials and the second set of credentials.
10.The vehicle (100) as claimed in claim 9, wherein the access to avehicle (100) operation is associated to enabling or disabling of theignition unit (108).
11.The vehicle (100) as claimed in claim 9, wherein the user digital25 device (102) communicate with the control unit (104) and a remotestorage device through at least one of a Bluetooth communication, aWi-Fi communication, a cellular communication, a satellitecommunication, an NFC and a Radio frequency communication.
12.The vehicle (100) as claimed in claim 9, further comprise30 functionalities such as a lane change function and a course changefunction, wherein the lane change function initiates upon receiving a
18
short press input from a user through a user interface integrated into a vehicle control system, and wherein a course change function is initiated upon receiving a long press input from a user through a user interface integrated into a vehicle control system.
| # | Name | Date |
|---|---|---|
| 1 | 202441025892-STATEMENT OF UNDERTAKING (FORM 3) [29-03-2024(online)].pdf | 2024-03-29 |
| 2 | 202441025892-REQUEST FOR EXAMINATION (FORM-18) [29-03-2024(online)].pdf | 2024-03-29 |
| 3 | 202441025892-FORM 18 [29-03-2024(online)].pdf | 2024-03-29 |
| 4 | 202441025892-FORM 1 [29-03-2024(online)].pdf | 2024-03-29 |
| 5 | 202441025892-FIGURE OF ABSTRACT [29-03-2024(online)].pdf | 2024-03-29 |
| 6 | 202441025892-DRAWINGS [29-03-2024(online)].pdf | 2024-03-29 |
| 7 | 202441025892-COMPLETE SPECIFICATION [29-03-2024(online)].pdf | 2024-03-29 |
| 8 | 202441025892-Proof of Right [21-06-2024(online)].pdf | 2024-06-21 |