Abstract: A SYSTEM FOR VEHICLE AUTHENTICATION AND A METHOD THEREOF The present subject matter relates to a system (100) for vehicle authentication and a method (200) thereof. The system (100) for vehicle authentication comprises a first electronic device 5 (104)of a vehicle (102) and a second electronic device (106) of one or more users. The firstelectronic device (104) generates a first access code while the second electronic device (106) generates a second access code. Upon mapping of the first access code with the second access code vehicle access is authenticated by the disclosed system (100) and method (200). The present subject matter accorded protection over malicious cybersecurity attacks as well as brute 10 force attacks extracting vehicle authentication credentials.
Description:FIELD OF THE INVENTION
[0001] The present subject matter is related, in general to a vehicle, and more particularly, but not exclusively to a system for vehicle authentication and method thereof.
BACKGROUND OF THE INVENTION
[0002] Vehicle authentication and security systems are a vital component in anti-theft systems 5 and safety driving assist system. Since time immemorial, the anti-theft aspects of vehicle have been under constant scrutiny and development. In traditional car security systems operational by a mechanical key, focus on the car key’s security and ignore the user who is operating the car.
[0003] The rapid integration of vehicles and information technology has led to the rapid rise 10 of connected cars, and cars have moved from being independent and closed to being interconnected and open. The increase in open interfaces brings attack risks to the in-vehicle network by malicious attackers. With the rapid development of the Internet of Vehicles, there has been an associated increase in vehicle functional requirements leading to increase in complex electronic networks and in vehicle communication protocols. A large number of 15 communication protocols focus on the addition of safety mechanisms, and there is a lack of general protocol formal modelling and security assessment. In addition, many protocols are designed without considering key updates and transmission, ECUs maintenance, etc.
[0004] Popular vehicle authentication procedures typically are of two variants – a first variant whereby possession of a mechanical key grants access to a vehicle and a second variant of 20 keyless entry whereby a key fob may wirelessly communicate with the vehicle for authenticating access. The limitations of the popular variants of vehicle access are yet limited to possession of a physical key by a user, which will operatively connect with components of
3
the vehicle to grant access. The dependency on limited quantity of physical key makes the vehicle susceptible to theft by mere extortion of the physical key. [0005] In other vehicle authentication methods, facial recognition tools are deployed in the vehicle. In facial recognition-based vehicle authentication systems, the vehicle is provided with image sensors and a network of processors configured to map a user’s facial expressions with
5 an authentication facial profile. The disadvantages associated with facial recognition-based vehicle authentication systems pertain to privacy concern, where not every user may consent to capturing of his or her facial features. Further, in other sovereign functions of the state where authentication is based on biometrics and facial recognition, any manipulation in the vehicle system may avail an intruder a tool to hack into the user’s social security profile. An additional 10 disadvantage with facial recognition-based vehicle authentication systems is the dependency on a network of image sensors and processors, which complicates the overall authentication process whilst adding to the cost of deployment and maintenance. Additionally, the precision of the image sensors in capturing facial data is dependent on weather conditions such as fog, rain, ambient light, refraction by dust particles making the overall reliability on image sensors 15 dubious.
[0006] In known arts of vehicle authentication concerning an immobilizer unit where via a registered personal digital assistant of the user, the vehicle access is authenticated. However, a limitation associated with personal digital assistant being that only registered personal digital assistants can communicate with the immobilizer unit, and any loss of the personal digital 20 assistant will deem the authentication system non-operational. Further, the dependency on a network strength is critical. In low strength network areas, vehicle authentication would be compromised.
[0007] Similarly for pin based or passcode-based vehicle authentication methods, dependency on a network strength is imperative and further in the event the passcode entered by a user is 25
4
collected by malicious attackers using high-definition cameras deployed in vehicle vicinity, the overall security of the vehicle is compromised. Even the usage of randomized keyboard with reference to the pin based or passcode-based vehicle authentication methods would be fruitless, since high-definition cameras can effectively cover the entire passcode or pin. [0008] In other known arts, concerning usage of Radio Frequency Identification (RFID) based
5 techniques for vehicle authentication, the wireless RFID system comprises two components: a RFID tag and a RFID reader. The vehicle is equipped with a RFID tag while the authorized user is provided with a RFID reader. The RFID based techniques for vehicle authentication involve provision of additional components and is again dependent on a fixed set of RFID readers linking with the RFID tag. 10
[0009] In all the above known methods, developing a shareability feat of the vehicle such as in fleet operations, where multiple authorized users may authenticate the vehicle is absent.
[00010] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and 15 with reference to the drawings.
SUMMARY
[00011] According to embodiments illustrated herein, the present subject matter relates to a system for vehicle authentication. The system comprises a first electronic device provided in a vehicle. The first electronic device is configured to generate a first access code associated with 20 a pre-set code of the vehicle and one or more dynamic parameters and store the first access code for a first instant of time. The system further comprises a second electronic device of one or more users configured to generate a second access code. The second access code is associated with a transient code and the one or more dynamic parameters. In an aspect, the
transient code is associated with the pre-set code and the second electronic device is configured to read the transient code. In an aspect, upon provision of the second access code on the first electronic device by one or more users and the second access code mapping with the first access code, the access to the vehicle is authenticated in at least one of one or more levels by the first electronic device. 5 [00012] According to embodiments illustrated herein, the present subject matter additionally discloses a
method for vehicle authentication. The method comprises steps of generating by the first electronic device a first access code stored in the first electronic device. In an aspect, the first access code is associated with the pre-set code of the vehicle and one or more dynamic parameters. The method further comprises the step of providing a transient code associated 10 with the pre-set code to a primary user of one or more users of the vehicle by the first electronic device. In an aspect, the second electronic device of the primary user is configured to read the transient code. The method further comprises the step of generating by the second electronic device a second access code upon successful reading by the second electronic device. In an aspect, the second access code is associated with a transient code and the one or more dynamic 15 parameters. The method for vehicle authentication authenticates access to the vehicle on at least one of one or more levels by the first electronic device upon the second access code provided by the one or more users mapping with the first access code of the first electronic device.
[00013] The foregoing summary is illustrative only and is not intended to be in any way 20
limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description. BRIEF DESCRIPTION OF THE DRAWINGS 5
6
[00014] The present invention will become more fully understood from the detailed description given herein below and the accompanying drawings which are given by way of illustration only, and thus are not limitative of the present invention.
[00015] Figure 1 illustrates a block diagram indicating one or more elements of the system for vehicle authentication in accordance with some embodiments of the present disclosure. 5
[00016] Figure 2 illustrates a method for vehicle authentication in accordance with some other embodiments of the present disclosure.
[00017] Figure 3 illustrates an exemplary embodiment of a process flow of the vehicle authentication system in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION OF THE DRAWINGS 10
[00018] The present disclosure may be best understood with reference to the detailed figures and description set forth herein. Various embodiments are discussed below with reference to the figures. However, those skilled in the art will readily appreciate that the detailed descriptions given herein with respect to the figures are simply for explanatory purposes as the system may extend beyond the described embodiments. For example, the teachings presented, 15 and the needs of a particular application may yield multiple alternative and suitable approaches to implement the functionality of any detail described herein. Therefore, any approach may extend beyond the particular implementation choices in the following embodiments described and shown.
[00019] References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one 20 example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a particular feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that particular
7
feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment” does not necessarily refer to the same embodiment. [00020] The present invention now will be described more fully hereinafter with different embodiments. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather those embodiments are
5 provided so that this disclosure will be thorough and complete, and fully convey the scope of the invention to those skilled in the art.
[00021] The present invention is illustrated with a system and method for vehicle authentication applicable on a vehicle level. However, a person skilled in the art would appreciate that the present invention is not limited to a vehicle and certain features, aspects and 10 advantages of embodiments of the present invention can be used with other applications requiring an authentication system and method.
[00022] The object of the present subject matter is to provide a secure authentication system for a vehicle.
[00023] To this end, the first electronic device of the vehicle is flashed with a pre-set code 15 during vehicle initialization phases whereby the first electronic device shall associatively generate the first access code. The authentication system further comprises a second electronic device of one or more users, whereby the second electronic device belongs to a primary user or owner of the vehicle. The second electronic device reads a transient code related to the pre-set code to generate second access codes. Since the configuration of the first electronic device 20 and the second electronic device to dynamically change the respective access code, the present authentication system is secure against brute forces.
[00024] Further, since the generation of the first access code and the second access code occurs simultaneously yet independently the present authentication system is invincible against hacking or data theft procedures.
[00025] It is an additional object of the present subject matter to address issues of server maintenance and network latency pertinent in other known methods of remote or wireless 5 vehicle authentication.
[00026] While known arts are dependent on maintenance of a server for generation of access codes as well as establishment of a communication channel between the vehicle and the personal digital assistant of the user, the present invention eliminates the dependency on externally maintained server thereby further improving the integrity of the present 10 authentication system.
[00027] It is another object of the present subject matter to improve fleet management or vehicle sharing services by way of a vehicle authentication.
[00028] In vehicle operations there are two segments of users – a first or primary segment referred to as owners use the vehicle for personal use and are entitled to every feature provided 15 in the vehicle. The secondary segment refers to leasers or renters or vicarious users, who merely borrow or rent or share the vehicle with the primary users without undertaking any responsibility of the vehicle. In fleet management or vehicle sharing services, the owner is conventionally hesitant to accord control over all vehicle operations to the secondary users. The present disclosure addresses this exact whitespace present in known technology by 20
modulating the vehicle operation aspects based on assessment whether the user is a primary user or a secondary user of the vehicle. [00029] In an embodiment, the primary user or owner of the vehicle is additionally provided with a master code during initial vehicle initialization at the factory level, mapping the owner’s 8
profile with the vehicle. A combined usage of the master code in conjunction with the second access code would warrant or sufficiently indicate usage of the vehicle by a primary user, thereby permitting control over all the vehicle operations. On the other hand, the secondary user may use the second access code provided by the primary user via the second electronic device to access a limited set of vehicle operations.
5 [00030] It is an additional object of the present subject matter to provide a cost-effective authentication method without involving major revamping of core manufacturing processes.
[00031] The present disclosure shall address the requirement of a secure digital framework of vehicle authentication without involving a power and cost exhaustive complicated electronic network with storage of personal information. 10
[00032] To this end, the present disclosure utilizes the first electronic device already available in the vehicle by way of an instrument cluster, in conjunction with a second electronic device such as a personal digital assistant of the user. The first electronic device and the second electronic device operate independently in generation of the respective first access code and the second access code. The elimination of a communication channel between the first 15 electronic device and the second electronic device further increases the overall reliability of the authentication system as hackers typically attack the communication or data transmission channels. Only upon the second access code provided by one or more users onto the first electronic device, and mapping of the second access code with the first access code, the vehicle authentication is provided. Thereby, the present configuration utilizes available vehicle 20
components in providing the vehicle authentication system. [00033] Known methods of vehicle authentication involving mechanical keys, or key fobs remotes enabling access to the vehicle employ cumbersome signalling networks which increases overall vehicle cost for deployment of transceivers, receivers and signalling 9
10
components. The present configuration employs already deployed vehicular and personal electronic devices which enable secure vehicle access by way of a dynamic offline tool of authentication. [00034] Figure 1 illustrates a block diagram indicating one or more elements of the system for vehicle authentication in accordance with some embodiments of the present disclosure.
5
[00035] With reference to Figure 1, 100 denotes a system for vehicle authentication, 102 denotes a vehicle, 104 denotes a first electronic device, 106 denotes a second electronic device and 108 denotes one or more vehicle controllers.
[00036] In an aspect, the vehicle authentication system 100 comprises a vehicle 102 and a second electronic device 106. In another aspect, the vehicle 102 comprises a first electronic 10 device 104 and one or more vehicle controllers 108. The first electronic device 104 is communicatively connected to one or more vehicle controllers 108. In another aspect, the second electronic device 106 belongs to a user of the vehicle authentication system 100 and operates independently and simultaneously to the first electronic device 104 of the vehicle 102.
[00037] The vehicle 102 relates to any form of propulsion sustaining mobility of one or more 15 passengers, cargo or any other form of commodity. The vehicle 102 may comprise a prime mover (not shown) configured to convert one form of energy to usable work for sustaining the function of propulsion of the vehicle 102. The vehicle 102 may refer to an internal combustion engine driven vehicle, an electric vehicle or a hybrid vehicle. The vehicle 102 shall not be construed to be limitative to a two-wheeled vehicle or three-wheeled vehicle, and the system 20 for vehicle authentication 100 implementable in the vehicle 102 as per the present disclosure is applicable to multi-axle vehicles as well. The vehicle 102 may comprise a plurality of lighting units such as brake lamp, indicator lamps, fog lamps and the alike. The vehicle 102 may additionally comprise seating structures, a motor or transmission unit connecting the prime
mover to one or more wheels, paddles, or other actuators. The vehicle 102 may additionally comprise one or more control units operational in conjunction with a plurality of sensors to further enhance performance of the vehicle 102 and operation of auxiliary vehicle components such as collision avoidance systems, advanced driver assistance systems, vehicle telematics, vehicle communication systems, in-vehicle entertainment system and the alike.
5 [00038] In an aspect, the first electronic device 104 is a display unit of the vehicle 102. The first electronic device 104 serves as a vehicle-user interface or communication medium configured to receive user inputs by way of a keypad, a touch-screen based medium or a joystick for navigation purposes on the interface of the first electronic device 104. In an embodiment, the first electronic device 104 is an instrument cluster of the vehicle 102.
10
[00039] In an aspect, the first electronic device 104 is configured to display vehicle operating parameters indicative of vehicle speed, prime mover speed, prime mover temperature, cruise control status, riding mode status, indicator lamps operations, tyre pressure indication and operational parameters of other auxiliary vehicle components. Further, the first electronic device 104 may include a graphic engine configured to display information to one or more 15 users via graphic icons, alphanumeric data and other known graphic elements. In an aspect, the first electronic device 104 is communicatively connected to one or more vehicle controllers 108.The communication between the first electronic device and the one or more vehiclecontroller 108 is established via wired as well as wireless communication mediums.
[00040] In an aspect, the first electronic device 104 provided in the vehicle 102 is configured 20 to generate a first access code associated with a pre-set code of the vehicle 102 and one or more dynamic parameters. The first electronic device 104 further stores the generated first access code for a first instant of time. 11
12
[00041] As a working example, the one or more dynamic parameters may be set as a local time zone of the first electronic device 104 and the second electronic device 106 presuming that both the first electronic device 104 and the second electronic device 106 are in the same time zone. For instance, if the time zone pertinent to India is represented as 1600 hrs, the same shall be indicated in the first electronic device 104 and the second electronic device 106. The time
5 zone may also represent a second reading for further ensuring security in embedded communication of the one or more dynamic parameters. The alphanumeric combination indicative of the time zone would be periodically changing in view of representing the correct time zone. Accordingly, the first access code and the second access code being a function of the local time zone changes periodically. 10
[00042] In an alternate embodiment, the one or more dynamic parameters is a moment of initialization of the second electronic device 106 with the transient code. The moment of initialization of the second electronic device 106 with the transient code is representative of the first instant where the owner of the vehicle is granted access to the vehicle 102. The alternate embodiment is illustrative of a scenario in a dealership paradigm where the transient code 15 stored in a confidential pathway, such as but not limited to the user manual, is provided to the vehicle owner having the second electronic device 106. The moment of initialization represents a user/owner specific time zone whereon the second electronic device 106 generates its own time zone specific to the vehicle 102 and to the owner. For instance, the moment of initialization may have a local time zone of 1600 hours, but the second access code being 20 generated an hour later would not be a function of 1700 hours (representing the local time zone) but would be of 0100 hours. The second access code’s ingrained function may be further contained to a second reading. However, the sanctity of the system 100 in generation of the first access code and the second access code further improves in the event the one or more dynamic parameters being set as the moment of initialization, as an owner-vehicle specific time 25
paradigm is created. The generation of the first access code and the second access code periodically is based on the seconds count following the moment of initialization. [00043] In an aspect, the one or more vehicle controllers 108 of the vehicle 102 are communicatively and operatively connected to a plurality of sensors disposed in the vehicle and one or more vehicle components. In an embodiment, the one or more vehicle controllers
5 108 may include a telematics control unit, a body control unit, an engine management system electronic control unit, a vehicle control unit, a communication control unit. In a preferred embodiment, the one or more vehicle controllers 108 refers to a vehicle control unit which is communicatively connected to the prime mover, the first electronic device 104 and other control units disposed in the vehicle 102. In an aspect, the one or more vehicle controllers 108 10 is configured to control one or more vehicle operations. The one or more vehicle operations comprises at least vehicle propulsion, powering one or more auxiliary units, and configuring vehicle settings via the first electronic device 104.
[00044] In an aspect, during the vehicle 102 initialization phase the one or more vehicle controllers 108 is flashed with a pre-set code. In an embodiment, the pre-set code may be an 15 alphanumeric code, a bar code or a quick response code. In an aspect, the pre-set code comprises at least a product code, a brand code and a first instant of time. In an embodiment, the pre-set code is a secret key or a hash key flashed onto during vehicle initialization.
[00045] In an aspect the second electronic device 106 refers to a personal digital assistant of one or more users. The second electronic device 106 refers to a user accessible device 20
configured to read or scan transient codes and generate authenticated second access codes. In an aspect, the second electronic device 106 may be an offline tool. [00046] In an aspect, the second electronic device 106 is configured to generate a second access code. The second access code is associated with a transient code and the one or more dynamic 13
parameters. In another aspect, the transient code is associated with the pre-set code and the second electronic device 106 is configured to read the transient code. In an aspect, the transient code is generated from the pre-set code, since the pre-set code is a secret hash key exclusively applicable to the vehicle 102, to maintain the integrity of the overall vehicle authentication system 100 the pre-set code is transformed to a transient code. The transient code is provided
5 exclusively to the user by way of vehicle-user registration or in the user manual of the vehicle 102. [00047] In an aspect, during vehicle-user registration at a factory level, the first electronic device 104 displays the transient code (and not the pre-set code), the second electronic device 106 of the one or more users reads the transient code via an authenticator application.
10
[00048] For instance, the transient code may be displayed as:
“otpauth://totp/"+issuer+":"+displayUsername+"?secret="+secretKey+"&issuer="+issuer+"&period="+timeStep”
Where, issuer = brand name.
displayUsername = registered customer under whose name the vehicle is bought. 15 secretKey = a functional or embedded version of the pre-set code.
timestep = first instant of time or frequency at which the access code shall change.
[00049] The access of the transient code by the second electronic device 106 designates the second electronic device 106 to belong to a primary user. In an embodiment, the second electronic device 106 uses available authenticator applications. In an alternate embodiment, the 20
one or more users may scan the transient code available in the user manual and authorize themselves as primary users of the vehicle. [00050] In an aspect, the first electronic device 104 and the second electronic device 106 operate independently in the generation of the first access code and the second access code 14
15
respectively. The transient code and transient code both contain the first instant of time which is indicative of the frequency of generation of the first access code and the second access code. The first electronic device 104 and the second electronic device 106 generate the respective access codes based on one or more dynamic parameters. The one or more dynamic parameters is at least one of a local time zone of the first electronic device 104 and the second electronic
5 device 106 and a moment of initialization of the second electronic device 106 with the transient code. In an embodiment, the one or more dynamic parameters is at least one of the local time zone of the first electronic device 104 and the second electronic device 106. [00051] In an aspect, the first electronic device 104 is configured to generate the first access code upon completion of the first instant of time, based on the pre-set code and the one or more
10 dynamic parameters. Simultaneously, the second electronic device 106 is configured to generate the second access code upon completion of the first instant of time, based on the transient code and the one or more dynamic parameters. Thereby, second access code is always associated with the first access code.
[00052] In an embodiment, the first electronic device 104 and the second electronic device 106 15 comprises an internal real time clock operational at local time zones. Thereby, the first electronic device 104 and the second electronic device 106 upon the passage of the first instant of time as determined by the respective internal real time clocks, generates the new first access code and the second access code. Consequently, the old first access code and the second access code are discarded from the first electronic device’s 104 and the second electronic device’s 106 20 memory.
[00053] In operation, upon provision of the second access code on the first electronic device 104 by one or more users and the second access code mapping with the first access code, the access to the vehicle 102 is authenticated in at least one of one or more levels by the first electronic device 104. 25
[00054] In an embodiment, the access to the vehicle 102 is authenticated by the first electronic device 104 in the event the second access code matches the first access code. In another embodiment, the second access code generated by the second electronic device 106 is a pre-set function of the first access code encompassing elements of the one or more dynamic parameters and the first instant of time, thereby access to the vehicle 102 is authenticated when the second
5 access code matches the pre-set function of the first access code. The disclosed configuration further maintains the sanctity of the vehicle authentication system 100 as the first access code is never revealed.
[00055] In an aspect, the first electronic device 104 is configured to authenticate access to the vehicle 102 in one or more levels comprising at least a first level and a second level. In a first 10 level of vehicle access the one or more users are provided a complete control over the one or more vehicle operations. The first level of vehicle access validates that the vehicle 102 is operated by the primary user of the one or more user. In an aspect, the second level of vehicle access to the one or more users provides control over only vehicle propulsion and access to one or more auxiliary units. 15
[00056] In an embodiment, the first level of vehicle access is provided by the one or more vehicle controllers 108 when the first electronic device 104 receives the second access code in conjunction with a master code. In an aspect, the master code is exclusively provided to a primary user of the one or more users of the vehicle 102. In another aspect, the master code is provided to the primary user during vehicle-user registration or in the user manual. 20
[00057] In another embodiment, the second level of vehicle access is provided by the one or more vehicle controllers 108 when the first electronic device 104 receives only the second access code. The one or more vehicle controllers 108 thereon classifies the one or more users employing the second access code alone as a secondary user of the vehicle 102. 16
17
[00058] In an aspect, the vehicle propulsion may comprise at least aspects of control over vehicle ride mode, traction control of the vehicle anti-lock braking system and the advanced rider assistance system. The vehicle propulsion being a sub-set of the aforementioned systems, provides a restricted or limited provision of vehicle functionality based on the pre-set configuration by the primary user or owner of the vehicle. For instance, in the event a first level
5 of vehicle access is to be warranted to the user, the user would have complete control over ride mode selection, traction, the anti-lock braking system and the advanced rider assistance system. In an instant that a second level of vehicle access is to be warranted to the user, the user may have the ride mode limited to economy mode and the anti-lock braking system being active. Aspects of functionality of the advanced rider assistance system may be limited. 10
[00059] In another aspect, the access to one or more auxiliary units in a first level may comprise communication and data transfer being initiated between the first electronic device 104 being an instrument cluster and the second electronic device 106 being a personal digital assistant. The disclosed configuration of first level access provides the user to connected services of multimedia display and operation, utilizing the navigation functionality and take-a-call feature 15 of the vehicle. In another instance, the access to one or more auxiliary units in a second level may be limited to the operation of control switches for operating turn signal lamps, hazard lamps and instrument cluster display features. In the restricted access level any form of communication medium being established between the user’s personal digital assistant and the vehicle’s instrument cluster may best be avoided. 20
[00060] In an alternate embodiment, the primary user of the vehicle 102 after authentication via the second access code and the master code, sets a default passcode on the first electronic device. The default passcode is applicable for a first instant of time being the designated time period of sharing, whereby the secondary user may possess the second level of vehicle access by merely using the default passcode alone. 25
18
[00061] In another embodiment, in the event the second electronic device 106 is drained of charge and unable to provide the second access code to the primary user, the user may employ the master code in unlocking limited features of the vehicle 102 such as to support vehicle propulsion and operation of requisite vehicle operations such as indicator usage, usage of horn, hazard lamps, etc. Thereby, once the second electronic device 106 is deemed operational again,
5 the primary user may gain the first level of access to the vehicle.
[00062] In operation, the first electronic device 104 independently keeps on generating the first access code at a frequency linked to the first instant of time. The second electronic device 106 in the possession of the primary user also keeps on generating the second access code at the frequency linked to the first instant of time. In the event a secondary user intends to use the 10 vehicle 102, the second access code is transmitted to the secondary user via a call, or a text message. Whereby, the secondary user upon entering the second access code onto the first electronic device gains a second level of access to the vehicle 102. While the generation of the second access code is independent of network strength, the transmission of the second access code externally to the secondary user is dependent on network, however the same is protected 15 against malicious attacks. Thereby, for instance, the first instant of time may be set to 10 mins to permit enough time to the secondary user to extract the second access code.
[00063] In an embodiment, at least one of the first electronic device 104 and the second electronic device 106 comprises an internal control unit. The control units of the first electronic device 104 and the second electronic device 106 in some embodiments may include one or 20 more additional components such as, but not limited to, a memory, an input - output module, an input port, transceiver, a processing unit, etc. In yet another embodiment, the control units of the first electronic device 104 and the second electronic device 106 may include more than one of same or similar control units or controllers. In an aspect, the processing unit of the
19
control units
may be communicatively coupled to the memory, the transceiver, and the input/output unit, input port. [00064]
In another embodiment, the control units of the first electronic device 104 and the second electronic device 106 may include only a processor which may be required to process the received instructions / signals from one or more inputs device like control switches, a user 5 interface configured to receive a user input and process the same. In an aspect, the processing unit of the control units may include suitable logic, circuitry, interfaces, and/or code that may be configured to execute a set of instructions stored in the memory. The processing unit may be implemented based on a number of processor technologies known in the art. The processor unit may work in coordination with the transceiver, the input/output unit including the input 10 port to receive one or more vehicle parameters, an audio file as well as a user input. Examples of the processor unit include, but not limited to, an X86-based processor, a Reduced Instruction Set Computing (RISC) processor, an Application-Specific Integrated Circuit (ASIC) processor, a Complex Instruction Set Computing (CIBC) processor, and/or other processor.
[00065] In yet another embodiment, the control units of the first electronic device 104 and the 15 second electronic device 106 may be in communication with an analytic module which is configured to perform additional analysis of the communication information received from the user input.
[00066] The transceiver of the control units of the first electronic device 104 and the second electronic device 106 may include suitable logic, circuitry, interfaces, and/or code that may be 20 configured to transmit and receive a user input indicative of desired riding mode of the vehicle and transmit a processed graphic image. The transceiver may implement one or more known technologies to support wired or wireless communication with the communication network. In an embodiment, the transceiver may include, but is not limited to, an antenna, a radio frequency (RF) transceiver, one or more amplifiers, a tuner, one or more oscillators, a digital signal 25
20
processor, a Universal Serial Bus (USB) device, a coder-decoder (CODEC) chipset, a subscriber identity module (SIM) card, and/or a local buffer. The transceiver may communicate via wireless communication with networks, such as but not limited to the Internet, an Intranet and/or a wireless network, such as a cellular telephone network, a wireless local area network (LAN) and/or a metropolitan area network (MAN). The wireless communication may use any 5 of a plurality of communication standards, protocols and technologies, such as: Global System for Mobile Communications (GSM), Enhanced Data GSM Environment (EDGE), wideband code division multiple access (W-CDMA), code division multiple access (CDMA), time division multiple access (TDMA), Bluetooth, Wireless Fidelity (Wi-Fi) (e,g., IEEE 802.11a, IEEE 802.11b, IEEE 802.11g and/or IEEE 802.11n), voice over Internet Protocol (VoIP), Wi-10 MAX.
[00067]
In some embodiments, the memory in communication with the control units of the first electronic device 104 and the second electronic device 106 is capable of storing machine executable instructions. Further, the control units are capable of executing the machine executable instructions to perform the functions described herein. The control units are in 15 communication with components such as the processing unit and the analytic module. In another embodiment, the control units are embodied as a multi-core processor, a single core processor, or a combination of one or more multi-core processors and one or more single core processors. For example, the control units of the first electronic device 104 and the second electronic device 106 is embodied as one or more of various processing devices, such as a 20 coprocessor, a microprocessor, a controller, a digital signal processor (DSP), a processing circuitry with or without an accompanying DSP, or various other processing devices including integrated circuits such as, for example, an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a microcontroller unit (MCU), a hardware accelerator, a special-purpose computer chip, or the like. In yet another embodiment, the control units are 25
21
configured to execute hard-coded functionality. In still another embodiment, the
control units are embodied as an executor of instructions, where the instructions are specifically configured to the control unitsto perform the steps or operations described herein for controlling display on a display unit of the vehicle 102 or the second electronic device 106 of one or more users. [00068]
The control units of the first electronic device 104 and the second electronic device 5 106 may be configured to include suitable logic, circuitry, interfaces, and/or code that may be configured to store the set of instructions, which are executed by a processor of the control units. In an embodiment, the memory may be configured to store one or more programs, routines, or scripts that may be executed in coordination with the processor. The memory may be implemented based on a Random Access Memory (RAM), a Read-Only Memory (ROM), 10 a Hard Disk Drive (HDD), a storage server, and/or a Secure Digital (SD) card for storing various one or more cell related parameters. The control units may additionally comprise one or more processor units configured to enable arithmetic and logical applications.
[00069] Furthermore, the memory of the control units of the first electronic device 104 and the second electronic device 106 may comprise one or more computer-readable storage media 15 which may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments 20 described herein. The term “computer-readable storage medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, non-volatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any
22
other known physical storage media”. In a preferred embodiment the memory is a dynamic memory.
[00070] Figure 2 illustrates a method for vehicle authentication in accordance with some other embodiments of the present disclosure.
[00071] The method 200 starts at step 202 and proceeds to step 204. At step 204, a pre-set code 5 is flashed onto one or more vehicle controllers 108 of the vehicle 102. The vehicle 102 is provided with a first electronic device 104 which is communicatively connected to the one or more vehicle controllers 108. The step 204 serves the purpose of vehicle initialization at a factory level with the pre-set code. In an aspect, the first electronic device 104 is a display unit of the vehicle 102 communicatively connected to one or more vehicle controllers 108. In an 10 aspect, the one or more vehicle controllers 108 are configured to control one or more vehicle operations comprising at least vehicle propulsion, powering one or more auxiliary units, and configuring vehicle settings via the first electronic device 104. The method 200 then proceeds to step 206. In an aspect, step 204 reflects a one time activity of vehicle initialization, such that on consequent vehicle usages the method 200 may directly proceed to step 206 from step 202. 15
[00072] At step 206, the first electronic device 104 generates a first access code and the same is stored in the first electronic device 104. The first access code is associated with the pre-set code of the vehicle 102 and one or more dynamic parameters. The method 200 then proceeds to step 208.
[00073] At step 208, a transient code associated with the pre-set code is provided to a primary 20 user of one or more users of the vehicle 102 by the first electronic device 204. In an aspect, during vehicle initialization after the flashing 204 of the pre-set code, the first electronic device 204 displays a transient code which is provided to the primary user during vehicle-user registration. A second electronic device 106 belonging to the primary user is configured to read
or scan the transient code to generate second access codes for the future implementation purposes. The transient code may also be provided in a user manual of the vehicle 102, wherefrom the second electronic device 106 of the primary user may read the transient code. In an aspect,
the reading of the transient code by the second electronic device 106 is permitted only upon vehicle initialization via flashing 204. In an aspect, the one or more dynamic 5 parameters being at least one of a local time zone of the first electronic device 104 and the second electronic device 106, and a moment of initialization of the second electronic device 106 with the transient code. The method 200 then proceeds to step 210. [00074] At step 210, the second electronic device 106 generates a second access code after successful reading of the transient code by the second electronic device at step 208. The second
10 access code is associated with the transient code and one or more dynamic parameters.
[00075] In an aspect, the pre-set code comprising at least a product code, a brand code and a first instant of time. The first instant of time is a frequency of generation of the first access code and the second access code. The method 200 then proceeds to step 212.
[00076] At step 212, the first electronic device 104 is configured to authenticate access to the 15 vehicle 102 on at least one of one or more levels upon the second access code provided by the one or more users mapping with the first access code generated by the first electronic device 104.In an embodiment, the first electronic device 104 is communicatively connected to one ormore vehicle controllers 108 which may contain a control unit configured to compare the mapping of the second access code with the first access code. 20
[00077] In an aspect of the present disclosure, the one or more levels of vehicle authentication comprises at least a first level and a second level. In the first level of vehicle access the primary user is provided a complete control over the one or more vehicle operations. In a second level 23
24
of vehicle access the secondary user of the one or more users is provided control over only vehicle propulsion and access to one or more auxiliary units. [00078] In an aspect, the first level of vehicle access is provided by the one or more vehicle controllers 108 when the first electronic device 104 receives the second access code in conjunction with a master code. The master code being provided to the primary user of the
5 vehicle 102. In another aspect, the second level of vehicle access is provided by the one or more vehicle controllers 108 when the first electronic device 104 receives only the second access code. The one or more vehicle controllers 108 is configured to classify the one or more users as the secondary user of the vehicle 102 which undertake the second level of vehicle access. The method 200 ends at step 214. 10
[00079] In an aspect, post vehicle-user registration at the vehicle initialization phase, the primary user is provided to modulate the constraints in vehicle operations accorded to secondary users of the vehicle 102. The disclosed configuration further empowers the primary user to actively modulate the usage of the vehicle 102 and maintain the sanctity of the preferred vehicular settings. 15
[00080] In an aspect, the first level of vehicle access may be indicative of no vehicle functions or operations being disabled, while in a second level of vehicle access a pre-set user configurable category of vehicle operations being limited. Similarly, the primary user may further categorize multiple levels of vehicle access by creating a first set of enabled functions and a second set of disabled function and a third set of restrictive functions. 20
[00081] In a non-limiting example, the primary user of the vehicle provides the following categories of vehicle access.
1.A first level: In the first level of vehicle access warranted to the user of the vehicle, thefollowing vehicle functions shall be classified as enabled, disabled and restrictive. The
25
first level of vehicle access is indicative of a scenario where a primary user of the vehicle 102 is operating the vehicle 102.
Enabled Functions
Disabled Functions
Restrictive Functions
•Advanced rider assistancesystem
•Control switch operations foroperation of hazard lamps,turn signal lamps.
•Ride mode selection betweeneconomy, sport mode.
•Access to navigation systemsinbuilt in vehicle.
•Control over voice assistfeature of vehicle.
•Establishment of a securecommunication mediumbetween instrument clusterand personal digital assistant
•Control over to vehicle in-built music system
•Access to vehicle diagnosticsdata
•Control over acceptance andrejection of vehicle sub-system updates uponOEM/Dealer/Vehiclemanufacturer authorization
•Customizing instrumentcluster based on userpreference.
None
•Automatic over theair update ofsoftware subsystemswithout authorizationofOEM/Dealer/Vehiclemanufacturer.
26
•Customizing sub-set ofenabled, disabled andrestrictive functions based onlevel of access warranted
•Control over anti-lockbraking system
2.A second level: In the second level of vehicle access warranted to the user of thevehicle, the following vehicle functions shall be classified as enabled, disabled andrestrictive. The second level of vehicle access is indicative of a scenario where specificfeatures similar to the first level of vehicle access be entrusted upon the secondary user5 reflective of a higher trusting relationship between the primary user and the secondaryuser. The below-table illustrates the vehicle functions applicable to the secondary userhaving the second level of vehicle access.
Enabled Function
Disabled Function
Restrictive Function
•Control switch operations for operation of hazard lamps, turn signal lamps.
•Ride mode selectionbetween economyand sport mode.
•Access to navigationsystems inbuilt invehicle.
•Automatic over theair update ofsoftware subsystemswithout authorizationofOEM/Dealer/Vehiclemanufacturer.
•Access to vehiclediagnostics data
•Advanced Rider assistance systems
•Control over acceptance and rejection of vehicle sub-system updates upon OEM/Dealer/Vehicle manufacturer authorization.
•Customizinginstrument cluster
27
•Control over to voiceassist feature ofvehicle.
•Establishment of asecurecommunicationmedium betweeninstrument clusterand personal digitalassistant
•Control over vehiclein-built music system
•Control over anti-lock braking system
based on user preference.
•Customizing sub-setof enabled, disabledand restrictivefunctions based onlevel of accesswarranted
3.A third level: In the third level of vehicle access warranted to the user of the vehicle,the following vehicle functions shall be classified as enabled, disabled and restrictive.The third level of vehicle access is indicative of a scenario where a primary user of thevehicle 102 is involved in fleet management and the third level of access reflects the5 vehicle controls accorded to a middleman or the operations handling officer betweenthe primary user (substituted for owner of the fleet management business) and the enduser of the vehicle 102. The below-table illustrates the vehicle functions applicable tothe middleman or operations handling officer using the vehicle 102.
Enabled Function
Disabled Function
Restrictive Function
•Control switch operations for operation of hazard
•Advanced Rider assistance systems
•Customizing sub-setof enabled, disabled
•Control over acceptance and rejection of vehicle sub-system updates
28
lamps, turn signal lamps.
•Ride mode selectionbetween economyand sport mode.
•Access to navigationsystems inbuilt invehicle.
•Control over anti-lock braking system
•Control over vehiclein-built music system
•Access to vehiclediagnostics data
and restrictive functions based on level of access warranted
•Control over to voiceassist feature ofvehicle.
upon OEM/Dealer/Vehicle manufacturer authorization
•Customizinginstrument clusterbased on userpreference.
•Establishment of asecurecommunicationmedium betweeninstrument clusterand personal digitalassistant
4.A fourth level: In the fourth level of vehicle access warranted to the user of the vehicle,the following vehicle functions shall be classified as enabled, disabled and restrictive.The fourth level of vehicle access is indicative of a scenario where the vehicle 102 is apart of a fleet management services or taxi services, with the vehicle 102 being5 bestowed onto an end-user who is using the vehicle 102 on a rental basis. From an end-user of the fleet management service perspective the below table categorizes thevehicle’s applicable functions:
Enabled Function
Disabled Function
Restrictive Function
•Control switch operations for operation of hazard
•Advanced Rider assistance systems
•Control over acceptance and
•Ride mode selectionbetween economyand sport mode. Onlyeconomy mode
29
lamps, turn signal lamps.
•Access to navigationsystems inbuilt invehicle.
•Control over anti-lock braking system
•Control over vehiclein-built music system
rejection of vehicle sub-system updates upon OEM/Dealer/Vehicle manufacturer authorization
•Customizinginstrument clusterbased on userpreference.
•Customizing sub-setof enabled, disabledand restrictivefunctions based onlevel of authorization
•Automatic over theair update of softwaresubsystems withoutauthorization ofOEM/Dealer/Vehiclemanufacturer.
•Establishment of asecurecommunicationmedium betweeninstrument clusterand personal digitalassistant
•Control over to voiceassist feature ofvehicle.
access may be enabled.
•Access to vehiclediagnostics data (forinstance only tirepressure monitoringor component heatingbeing indicated)
[00082] Figure 3 illustrates an exemplary embodiment of a process flow of the vehicle authentication system in accordance with some embodiments of the present disclosure.
[00083] The process flow 300 starts at step 302 and proceeds to step 304. At step 304, the first electronic device 104 generates the first access code. After vehicle initialization as elaborated with reference to Figure 2, the first electronic device 104 is configured to generate first access 5 code after passage of a first instant of time. Simultaneously, the second electronic device 106 generates a second access code. In the event one or more users intends to access the vehicle 102, the one or more users enter a second access code as illustrated in step 306. The second access code is entered into the user interface of the first electronic device 104.
[00084] At step 308, the first electronic device 104 checks whether the second access code 10 provided by the one or more users maps with a function of the first access code. In the event, the second access code maps with the function of the first access code, the process 300 proceeds to step 310. In the event the second access code doesn’t map with a function of the first access code, the process 300 proceeds to step 316 where it stops.
[00085] At step 310 the first electronic device 104 checks whether the master code is provided 15 by the one or more users. The entry of the master code isa voluntary option undertaken by the one or more users. In an aspect, the first electronic device 104 is connected to one or more vehicle controllers 108 configured to control one or more vehicle operations such as vehicle propulsion, powering one or more auxiliary units, and configuring vehicle settings via the first electronic device 104. 20
[00086] In the event the master code is entered by the one or more user, the user is classified as a primary user of the vehicle and the process 300 proceeds to step 314. At step 314 a first level of complete access is provided to the one or more users entering the master code. The 30
primary user is accorded control over all of the one or more vehicle operations undertaken by the one or more vehicle controllers 108. [00087] In the event the one or more user fails to provide the master code, the process 300 proceeds to step 312 where a second level of limited access to the vehicle 102 is provided to the one or more users. Under the second level of access, the one or more users are classified as
5 a secondary user of the vehicle. In an aspect, the second level of vehicle access comprises at least vehicle propulsion and access to one or more auxiliary units of the vehicle 102. The process 300 ends at step 316.
[00088] The present subject matter achieves a comfort oriented and convenient method 200 and system 100 of vehicle authentication. The elimination of ancillary components such as key 10 fobs, transceivers, telematics unit in supporting vehicle authentication, achieves weight reduction as well as part reduction against known convention methods. Consequently, the present configuration is a cost-efficient vehicle authentication system 100. Further, the provision of a server less, simple offline tool for secure vehicle authentication is achieved via the present configuration. The present configuration further ensures temporary access being 15 accorded to secondary users of the vehicle 102. Additionally, as the second access code keeps on periodically changing, the vehicle authentication system 100 is not susceptible to brute force attacks and does not require a smartphone per se.
[00089] The present subject matter addresses issues pertinent to sharing of vehicle from a fleet management or similar application perspective whereby limited access to the vehicle is enabled 20
by the primary user. [00090] In known arts, the access to the vehicle is not classified yet thereby forcing the hesitant primary user to share complete vehicle access with temporary beneficiaries of the vehicle 102. Additionally, while known technologies of vehicle authentication are dependent on network 31
32
strength and establishment of a communication channel between a user’s device and the vehicle, the present disclosure eliminates the susceptible communication channel by enabling independent electronic devices generating access codes. [00091] The combination of classifying the one or more users accessing the vehicle 102 into primary users and secondary users and based on the afore-said classification enabling
5 constrained levels of vehicle access based on specific conditions brings about a technical improvement. The specific conditions, such as usage of a second access code, a master code, and a first access code contribute to bringing about a technical improvement of the claimed invention. Further, establishment of a vehicle authentication system 100 operational with a first electronic device 104 and a second electronic device 106 operating simultaneously yet 10 independently in addressing overall integrity, resistance against malicious attacks and brute force provides an improved technical solution.
[00092] In light of the above-mentioned advantages and the technical advancements provided by the disclosed system, the claimed system as discussed above are not routine, conventional, or well understood in the art, as the claimed system enable the following solutions to the 15 existing problems in conventional technologies. Further, the claimed system clearly brings an improvement in the functioning of the acoustic generating system itself as the claimed system and constructional features provide a technical solution to a technical problem.
[00093] Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or 20 circumscribe the inventive subject matter, and is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based here on. Accordingly, the embodiments of the present invention are intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims. 25
33
[00094] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. A person with ordinary skills in the art will appreciate that the systems, modules, and sub-modules have been illustrated and explained to serve as examples and should not be considered limiting in any manner. It will be further appreciated that the variants of the above disclosed system elements, modules, and other
5 features and functions, or alternatives thereof, may be combined to create other different systems or applications. Those skilled in the art will appreciate that any of the aforementioned system modules may be suitably replaced, reordered, or removed, and additional steps and/or system modules may be inserted, depending on the needs of a particular application.
[00095] While the present disclosure has been described with reference to certain 10 embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from its scope. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed, 15 but that the present disclosure will include all embodiments falling within the scope of the appended claims. , Claims:We Claim:
1.A system (100) for vehicle authentication, the system (100) comprising:
a first electronic device (104), the first electronic device (104) being provided in a vehicle (102), 5
wherein the first electronic device (104) being configured to:
generate a first access code, wherein the first access code being associated with a pre-set code of the vehicle (102) and one or more dynamic parameters; and
store the first access code for a first instant of time; and 10
a second electronic device (106) of one or more users, the second electronic device (106) being configured to generate a second access code,
wherein the second access code being associated with a transient code and the one or more dynamic parameters; and
wherein the transient code being associated with the pre-set code and the 15 second electronic device (106) being configured to read the transient code,
wherein upon provision of the second access code on the first electronic device (104) by one or more users and the second access code mapping with the first access code, the access to the vehicle (102) being authenticated in one of one or more levels by the first electronic device 20 (104).
2.The system (100) for vehicle authentication as claimed in claim 1, wherein the firstelectronic device (104) being a display unit of the vehicle (102) communicativelyconnected to one or more vehicle controllers (108),25
wherein the one or more vehicle controllers (108) being configured to control one or more vehicle operations,
wherein the one or more vehicle operations comprising at least vehicle propulsion, powering one or more auxiliary units, and configuring vehicle settings via the first electronic device (104). 30
35
3.The system (100) for vehicle authentication as claimed in claim 2, wherein the pre-setcode being flashed onto the one or more vehicle controllers (108), wherein the pre-setcode comprising at least a product code, a brand code and the first instant of time.
5
4.The system (100) for vehicle authentication as claimed in claim 1, wherein the one ormore dynamic parameters being at least one of a local time zone of the first electronicdevice (104) and the second electronic device (106), and a moment of initialization ofthe second electronic device (106) with the transient code.
10
5.The system (100) for vehicle authentication as claimed in claim 1, wherein the firstinstant of time being a frequency of generation of the first access code and the secondaccess code;
wherein the first electronic device (104) being configured to generate the first access code upon completion of the first instant of time, based on the pre-set code and 15 the one or more dynamic parameters; and
wherein the second electronic device (106) being configured to generate the second access code upon completion of the first instant of time, based on the transient code and the one or more dynamic parameters.
20
6.The system (100) for vehicle authentication as claimed in claim 1, wherein the one ormore levels of vehicle authentication comprising at least:
a first level of vehicle access wherein the one or more users being provided a complete control over the one or more vehicle operations; and
a second level of vehicle access wherein the one or more users being provided 25 control over at least vehicle propulsion and access to one or more auxiliary units.
7.The system (100) for vehicle authentication as claimed in claim 6, wherein the firstlevel of vehicle access being provided by the one or more vehicle controllers (108)when the first electronic device (104) receiving the second access code in conjunction30 with a master code,
wherein the master code being provided to a primary user of the one or more users of the vehicle (102).
36
8.The system (100) for vehicle authentication as claimed in claim 6, wherein the secondlevel of vehicle access being provided by the one or more vehicle controllers (108)when the first electronic device (104) receiving only the second access code, whereinthe one or more vehicle controllers (108) being configured to classify the one or moreusers as a secondary user of the vehicle (102).5
9.A method (200) for vehicle authentication, the method (200) comprising:
generating (206), by a first electronic device (104), a first access code stored in the first electronic device (104), wherein the first electronic device (104) provided in the vehicle (102) being communicatively connected to the one or more vehicle 10 controllers (108),
wherein the first access code being associated with the pre-set code of the vehicle (102) and one or more dynamic parameters;
providing (208), by the first electronic device (204), a transient code associated with the pre-set code to a primary user of one or more users of the vehicle (102), 15
wherein the transient code being read by a second electronic device (106)of the primary user ;
generating (210), by the second electronic device (106), a second access codeupon successful reading by the second electronic device (106),
wherein the second access code being associated with the transient code 20 and the one or more dynamic parameters; and
authenticating (212), by the first electronic device (104), access to the vehicle (102)on one of one or more levels, upon the second access code provided by the oneor more users mapping with the first access code of the first electronic device (104).
25
10.The method (200) for vehicle authentication as claimed in claim 9, wherein the method(200)comprising flashing (204) a pre-set code onto one or more vehicle controllers(108)of the vehicle (102),
wherein the pre-set code comprising at least a product code, a brand code and afirst instant of time; and 30
wherein the first instant of time being a frequency of generation of the first access code and the second access code.
37
11.The method (200) for vehicle authentication as claimed in claim 9, wherein the firstelectronic device (104) being a display unit of the vehicle (102) communicativelyconnected to one or more vehicle controllers (108),
wherein the one or more vehicle controllers (108) being configured to control 5 one or more vehicle operations,
wherein the one or more vehicle operations comprising at least vehicle propulsion, powering one or more auxiliary units, and configuring vehicle settings via the first electronic device 104.
10
12.The method (200) for vehicle authentication as claimed in claim 9, wherein the readingof the transient code by the second electronic device (106) being permitted only uponvehicle initialization via flashing (204).
15
13.The method (200) for vehicle authentication as claimed in claim 9, wherein the one ormore dynamic parameters being at least one of a local time zone of the first electronicdevice (104) and the second electronic device (106), and a moment of initialization ofthe second electronic device (106) with the transient code.
20
14.The method (200) for vehicle authentication as claimed in claim 11, wherein the one ormore levels of vehicle authentication comprising at least:
a first level of vehicle access wherein the primary user being provided a complete control over the one or more vehicle operations; and
a second level of vehicle access wherein a secondary user of the one or more 25 users being provided control over only vehicle propulsion and access to one or more auxiliary units.
15.The method (200) for vehicle authentication as claimed in claim 14, wherein the firstlevel of vehicle access being provided by the one or more vehicle controllers (108)30 when the first electronic device (104) receiving the second access code in conjunctionwith a master code,
wherein the master code being provided to the primary user of the vehicle (102).
38
16.The method (200) for vehicle authentication as claimed in claim 14, wherein the second5
level of vehicle access being provided by the one or more vehicle controllers (108) when the first electronic device (104) receiving only the second access code, wherein the one or more vehicle controllers (108) being configured to classify the one or more users as the secondary user of the vehicle (102).
| # | Name | Date |
|---|---|---|
| 1 | 202441026491-STATEMENT OF UNDERTAKING (FORM 3) [30-03-2024(online)].pdf | 2024-03-30 |
| 2 | 202441026491-REQUEST FOR EXAMINATION (FORM-18) [30-03-2024(online)].pdf | 2024-03-30 |
| 3 | 202441026491-FORM 18 [30-03-2024(online)].pdf | 2024-03-30 |
| 4 | 202441026491-FORM 1 [30-03-2024(online)].pdf | 2024-03-30 |
| 5 | 202441026491-FIGURE OF ABSTRACT [30-03-2024(online)].pdf | 2024-03-30 |
| 6 | 202441026491-DRAWINGS [30-03-2024(online)].pdf | 2024-03-30 |
| 7 | 202441026491-COMPLETE SPECIFICATION [30-03-2024(online)].pdf | 2024-03-30 |
| 8 | 202441026491-Proof of Right [21-06-2024(online)].pdf | 2024-06-21 |