Sign In to Follow Application
View All Documents & Correspondence

A System And A Method For Protecting A Vehicle From Unauthorized Access

Abstract: A system (104) having a control unit (108) for protecting a vehicle (102) from unauthorized access is disclosed. The control unit (108) receives an input of at least one parameter related to an unlocking of the vehicle (102) and compares the input with an input indicative of at least one predetermined parameter. The control unit (108) determines that the at least one parameter is compromised and communicates a user equipment (116) associated with the vehicle (102) to receive a user input indicative of a two factor authentication, when the at least one parameter is compromised. The control unit (108) is configured to communicate the vehicle (102) to enable a ride, upon determination of a correct received two factor authentication, or to lock and disable the ride, upon determination of an incorrect received two factor authentication.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 April 2024
Publication Number
44/2025
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

Ather Energy Limited
3rd Floor, Tower D, IBC Knowledge Park, #4/1, Bannerghatta Main Road, Bengaluru - 560029, Karnataka, India

Inventors

1. VENKATESWARAN, Shivaram Nellayi
B-506, Raheja Residency Apts., Koramangala 3rd Block, Bangalore – 560034, India
2. ANKALI, Rajashekhar Siddappa
#806, Block-A, Nitesh Hyde Park, Hulimavu, Bannergatta road, Bangalore – 560076, India

Specification

Description:FIELD OF THE INVENTION

[0001] The present disclosure relates to a vehicle, and more particularly, to a system and a method to protect the vehicle from unauthorized access.
BACKGROUND

[0002] A two-wheeled vehicle (referred to as ‘vehicle’) is a preferred mode of transportation that is widely used for different purposes, for example, commutation, carriage, etc. Further, many technical developments have taken place in the vehicle to ensure the comfort and convenience of the rider to use the vehicle. Thus, because of the technical developments, there is an increased demand for the vehicle among users which also, simultaneously, increases the possibility of accessibility of the vehicle by an unauthorized user. Therefore, there is a need to protect the vehicle from the unauthorized user.
[0003] Currently, to ensure the protection of the vehicle, the vehicle is unlocked by a key, where ownership of the key belongs to an authorized user of the vehicle. However, the present configuration where the vehicle is unlocked by the key still has certain limitations. The limitation is that, in a scenario, if the person who is not the authorized user of the vehicle obtains access to the key by any unlawful means, then this again results in the unauthorized access of the vehicle by the person who is not the authorized user of the vehicle.
[0004] Therefore, in view of the above-mentioned problems, it is desirable to provide a system and a method that can eliminate one or more of the above-mentioned problems associated with the existing configuration where the vehicle is unlocked by the key.
SUMMARY

[0005] This summary is provided to introduce a selection of concepts, in a simplified format, that is further described in the detailed description of the invention. This summary is neither intended to identify key or essential inventive concepts of the invention and nor is it intended for determining the scope of the invention.
[0006] In an embodiment, the present disclosure provides a system for protecting a vehicle from unauthorized access. The system includes a control unit communicatively coupled to the vehicle. The control unit is configured to receive an input of at least one parameter related to an unlocking of the vehicle. The control unit is configured to compare the input indicative of the at least one parameter with an input indicative of at least one predetermined parameter, upon receiving the input. The control unit is configured to determine that the at least one parameter is compromised, based on the comparison. The control unit is configured to communicate a user equipment associated with the vehicle to receive a user input indicative of a two factor authentication, when the at least one parameter is compromised. The control unit is configured to communicate the vehicle to enable a ride, upon determination of a correct received two factor authentication, or to lock and disable the ride, upon determination of an incorrect received two factor authentication.
[0007] In another embodiment, a method for protecting a vehicle from unauthorized access. The method includes receiving by a control unit, an input indicative of at least one parameter related to an unlocking of the vehicle. The method includes comparing, by the control unit, the input indicative of the at least one parameter with an input indicative of at least one predetermined parameter, upon receiving the input. The method includes determining, by the control unit, that the at least one parameter is compromised, based on the comparison. The method includes communicating, by the control unit, a user equipment associated with the vehicle to receive a user input indicative of the two factor authentication, when the at least one parameter is compromised. The method includes communicating, by the control unit, the vehicle to enable a ride, upon determination of a correct received two factor authentication, or to lock and disable the ride, upon determination of an incorrect received two factor authentication.
[0008] To further clarify the advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which are illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
BRIEF DESCRIPTION OF THE DRAWINGS

[0009] These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
[0010] Figure 1A illustrates a block diagram of a system for protecting a vehicle from unauthorized access, according to an embodiment of the present disclosure;
[0011] Figure 1B illustrates a detailed block diagram of the vehicle connected with the system, according to an embodiment of the present disclosure;
[0012] Figure 2 illustrates a detailed block diagram of the system, according to an embodiment of the present disclosure;
[0013] Figures 3A-3B illustrate a flowchart depicting an operation of the system, according to an embodiment of the present disclosure; and
[0014] Figure 4 illustrates a flowchart depicting a method for protecting the vehicle from the unauthorized access, according to an embodiment of the present disclosure.
[0015] Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
DETAILED DESCRIPTION OF FIGURES

[0016] For the purpose of promoting an understanding of the principles of the present disclosure, reference will now be made to the various embodiments and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the present disclosure is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the present disclosure as illustrated therein being contemplated as would normally occur to one skilled in the art to which the present disclosure relates.
[0017] It will be understood by those skilled in the art that the foregoing general description and the following detailed description are explanatory of the present disclosure and are not intended to be restrictive thereof.
[0018] Whether or not a certain feature or element was limited to being used only once, it may still be referred to as “one or more features” or “one or more elements” or “at least one feature” or “at least one element.” Furthermore, the use of the terms “one or more” or “at least one” feature or element do not preclude there being none of that feature or element, unless otherwise specified by limiting language including, but not limited to, “there needs to be one or more…” or “one or more elements is required.”
[0019] Reference is made herein to some “embodiments.” It should be understood that an embodiment is an example of a possible implementation of any features and/or elements of the present disclosure. Some embodiments have been described for the purpose of explaining one or more of the potential ways in which the specific features and/or elements of the proposed disclosure fulfill the requirements of uniqueness, utility, and non-obviousness.
[0020] Use of the phrases and/or terms including, but not limited to, “a first embodiment,” “a further embodiment,” “an alternate embodiment,” “one embodiment,” “an embodiment,” “multiple embodiments,” “some embodiments,” “other embodiments,” “further embodiment”, “furthermore embodiment”, “additional embodiment” or other variants thereof do not necessarily refer to the same embodiments. Unless otherwise specified, one or more particular features and/or elements described in connection with one or more embodiments may be found in one embodiment, or may be found in more than one embodiment, or may be found in all embodiments, or may be found in no embodiments. Although one or more features and/or elements may be described herein in the context of only a single embodiment, or in the context of more than one embodiment, or in the context of all embodiments, the features and/or elements may instead be provided separately or in any appropriate combination or not at all. Conversely, any features and/or elements described in the context of separate embodiments may alternatively be realized as existing together in the context of a single embodiment.
[0021] Any particular and all details set forth herein are used in the context of some embodiments and therefore should not necessarily be taken as limiting factors to the proposed disclosure.
[0022] The terms “comprises”, “comprising”, or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by “comprises... a” does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
[0023] Embodiments of the present disclosure will be described below in detail with reference to the accompanying drawings.
[0024] Figure 1A illustrates a block diagram of a system 104 for protecting a vehicle 102 from unauthorized access, according to an embodiment of the present disclosure. Figure 1B illustrates a detailed block diagram of the vehicle 102 connected with the system 104, according to an embodiment of the present disclosure. In an embodiment, the vehicle 102 may be a two-wheeled vehicle which may be unlocked by different parameters, for example, a key, a fob-based wireless key system, without departing from the scope of the present disclosure. In another embodiment, the vehicle 102 may be any vehicle which may be unlocked by different parameters, for example, the key, the fob-based wireless key system, without departing from the scope of the present disclosure.
[0025] In an embodiment, the system 104 may be configured to protect the unauthorized access of the vehicle 102. In such an embodiment, the system 104 may be configured to receive an input from a plurality of components of the vehicle 102, for example, a first electronic module 112, a plurality of switch gears 110 through the first electronic module 112, a second electronic module 114, and a user equipment 116. The system 104 may be configured to receive the input from the plurality of components through various communication means, for example, a Controller Area Network (CAN) communication, without departing from the scope of the present disclosure. In another embodiment, the system 104 may be configured to receive the input from at least one component of the vehicle 102, without departing from the scope of the present disclosure. Further, after receiving the input, the system 104 operates the vehicle 102 accordingly to protect the vehicle 102 from the unauthorized access. The constructional and operational details of the system 104 are explained in detail in subsequent paragraphs.
[0026] In one embodiment, the system 104 may be communicatively coupled with the vehicle 102, without departing from the scope of the present disclosure. In another embodiment, the system 104 may be deployed in the vehicle 102, without departing from the scope of the present disclosure.
[0027] In an embodiment, the system 104 may include, but is not limited to, a control unit 108. The control unit 108 may be configured to protect the vehicle 102 from the unauthorized access based on at least one parameter related to the unlocking of the vehicle 102. The constructional and operational details of the control unit 108 are explained in detail in subsequent paragraphs.
[0028] Figure 2 illustrates a detailed block diagram of the system 104 communicatively coupled with the vehicle 102, according to an embodiment of the present disclosure. Figures 3A-3B illustrate a flowchart depicting an operation of the system 104, according to an embodiment of the present disclosure.
[0029] In an embodiment, the control unit 108 may be communicatively coupled to the vehicle 102. The control unit 108 may include, but is not limited to, memory 202, a processor 204, and module(s) 206.
[0030] The key elements of the control unit 108 typically include communication protocols including, but not limited to, a CAN protocol, Serial Communication Interface (SCI) protocol and so on. The sequence of programmed instructions and data associated therewith may be stored in a non-transitory computer-readable medium such as the memory 202 or a storage device which may be any suitable memory apparatus such as, but not limited to, read-only memory (ROM), programmable read-only memory (PROM), electrically erasable programmable read-only memory (EEPROM), random-access memory (RAM), flash memory, disk drive, and the like. In one or more embodiments of the disclosed subject matter, non-transitory computer-readable storage media may be embodied with a sequence of programmed instructions for monitoring and controlling the operation of different components of the vehicle 102.
[0031] The processor 204 may include any computing system which includes, but is not limited to, a Central Processing Unit (CPU), an Application Processor (AP), a Graphics Processing Unit (GPU), a Visual Processing Unit (VPU), and/or an AI-dedicated processor such as a Neural Processing Unit (NPU). In an embodiment, the processor 204 may be a single processing unit or several units, all of which could include multiple computing units. The processor 204 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions.
[0032] Among other capabilities, the processor 204 may be configured to fetch and execute computer-readable instructions and data stored in the memory 202. The instructions may be compiled from source code instructions provided in accordance with a programming language such as Java, C++, C#.net, or the like. The instructions may also comprise code and data objects provided in accordance with, for example, the Visual Basic™ language, LabVIEW, or another structured or object-oriented programming language. The one or a plurality of processors control the processing of the input data in accordance with a predefined operating rule or artificial intelligence (AI) model stored in the non-volatile memory and the volatile memory. The predefined operating rule or artificial intelligence model is provided through training or learning algorithms which include, but are not limited to, supervised learning, unsupervised learning, semi-supervised learning, or reinforcement learning.
[0033] Furthermore, the modules 206, processes, systems, and devices may be implemented as a single processor or as a distributed processor. Also, the processes, the modules 206, and sub-modules described in the various figures of and for embodiments herein may be distributed across multiple computers or systems or may be co-located in a single processor or system. Further, the modules 206 may be implemented in hardware, instructions executed by the processor 204, or by a combination thereof. A processing unit may comprise a computer, the processor 204, such as the processor 204, a state machine, a logic array, or any other suitable devices capable of processing instructions.
[0034] The processor 204 may be a general-purpose processor that executes instructions to cause the general-purpose processor to perform the required tasks or, the processor 204 may be dedicated to performing the required functions. In another embodiment of the present disclosure, the modules 206 may be machine-readable instructions (software) which, when executed by the processor/processing unit, perform any of the described functionalities. The database serves, amongst other things, as a repository for storing data processed, received, and generated by the modules 206.
[0035] Exemplary structural embodiment alternatives suitable for implementing the modules 206, sections, systems, means, or processes described herein are provided below. In an implementation, the module(s) 206 may include a receiving module 208, a determining module 210, a comparing module 212, a communicating module 214, and an enabling module 216. The receiving module 208, the determining module 210, the comparing module 212, the communicating module 214 and the enabling module 216 may be in communication with each other.
[0036] In the present disclosure, the receiving module 208, the determining module 210, the comparing module 212, the communicating module 214, and the enabling module 216, are configured to perform one or more operations which are explained in subsequent paragraphs.
[0037] In an embodiment, at step 302, the receiving module 208 may be configured to receive an input indicative of the at least one parameter related to the unlocking of the vehicle 102. In an embodiment, the input may be a manual input, without departing from the scope of the present disclosure.
[0038] At step 304, the determining module 210 may be configured to determine whether the received input may be an initial input indicative of the at least one parameter related to the unlocking of the vehicle 102. In an embodiment, the initial input may be an input indicative of the at least one parameter related to the unlocking of the vehicle 102 generated for the first time.
[0039] Further, in an embodiment, when the determining module 210 determines that the received input may be the initial input, then, at step 306, the communicating module 214 may be configured to communicate the user equipment 116 associated with the vehicle 102 to display a dialog box. In an embodiment, the user equipment 116 may be a display device of the vehicle 102, without departing from the scope of the present disclosure. In another embodiment, the user equipment 116 may be a display device of an electronic device communicatively coupled with the vehicle 102, without departing from the scope of the present disclosure.
[0040] At step 308, the receiving module 208 may be configured to receive a user input indicative of a setting of a two factor authentication, when the user equipment 116 displays the dialog box.
[0041] At step 310, the determining module 210 determines whether the received user input indicates the setting of the two factor authentication. If the determining module 210 determines that the received user input is not related to the setting of the two factor authentication in the dialog box, then, at step 312, the communicating module 214 may be configured to communicate to the user, at a predetermined time interval, to set the two factor authentication. In such an embodiment, the communication module 214 may communicate through at least one of an audio message, and a video message, without departing from the scope of the present disclosure. Further, simultaneously, at step 322, the enabling module 216 may be configured to enable a ride of the vehicle 102.
[0042] If the determining module 210 determines that the received user input is related to the setting of the two factor authentication in the dialog box, then, at step 314, the receiving module 208 may be configured to receive another user input indicative of the setting the two-factor authentication using a plurality of input factors associated with the vehicle 102. In an embodiment, the plurality of input factors may be provided by the user equipment 116 in the dialog box. In such an embodiment, the plurality of input factors may be provided as a plurality of options in the dialog box from which the user may select the plurality of input factors in a sequence, in real-time, to set the two factor authentication. In such an embodiment, the plurality of input factors may be dependent on an architecture of the vehicle 102, without departing from the scope of the present disclosure. In an embodiment, the two factor authentication may include at least one of the plurality of input factors and a combination of the plurality of input factors.
[0043] In an embodiment, the plurality of input factors may include, but is not limited to, at least one of a touch based input factor, a plurality of switch gears based input factors, a biometric based input factor, a voice command based input factor, an authentication from another device based input factor, or a combination thereof. In an embodiment, the touch based input factor may be provided when the user equipment 116 supports the touch operation, without departing from the scope of the present disclosure. In an embodiment, the touch based input factor associated with the vehicle 102 may be provided by the user equipment 116 in the dialog box which may be accessed manually by operating the user equipment 116. In such an embodiment, the touch based input factor may be selected by the user by accessing the user equipment 116 in a predefined manner through touch in a real-time period.
[0044] In an embodiment, the plurality of switch gears based input factors may be based on an operation of the plurality of switch gears 110. Further, the plurality of switch gears based input factors may be selected by the user by actuating at least one of the plurality of switch gears 110 in a predetermined manner in a real-time period. An example is provided in a subsequent paragraph to describe the setting of the two factor authentication where the plurality of input factors includes the touch based input factor, and the plurality of switch gears based input factors.
[0045] For example, the touch based input factor may be alphanumeric keys which are visible in the dialog box. The switch gears based input factors may be actuating headlight in an ON/OFF condition, and actuating tail light in an ON/OFF condition which are also visible as an option in the dialog box. Now, the user selects PQR$# from the alphanumeric key and thereafter, selects the option of the actuating headlight in the ON/OFF condition by touching the user equipment 116 in the sequence. In that case, the user subsequently presses a switch gear from the plurality of switch gears 110 which actuates the headlight in the ON/OFF condition. Thus, the user sets the two-factor authentication that is PQR$# followed by pressing the switch gear which actuates the headlight in the ON/OFF condition.
[0046] Further, in an embodiment, when the determining module 210 determines that the received input may not be the initial input, then at step 318, the comparing module 212 may be configured to compare the input indicative of the at least one parameter with an input indicative of at least one predetermined parameter, upon receiving the input. When the determining module 210 determines that the input indicative of the at least one parameter is the same as the input indicative of at least one predetermined parameter, then at step 322, the enabling module 216 may be configured to enable the ride of the vehicle 102.
[0047] Further, when the determining module 210 determines that the input indicative of the at least one parameter is different from the input indicative of at least one predetermined parameter, then, at step 320, the determining module 210 determines that the at least one parameter may be compromised. In an embodiment, the at least one predetermined parameter may include at least one of time dependent parameters associated with the vehicle 102, location dependent parameters associated with the vehicle 102, a biometric authentication based parameters associated with the vehicle 102, a user device authentication based parameters associated with the vehicle 102, an audio command authentication based parameters associated with the vehicle 102, a video command authentication based parameters associated with the vehicle 102, parameters dependent on a state of the vehicle 102, and parameters dependent on an orientation of the vehicle 102.
[0048] In such an embodiment, the time dependent parameters may be defined as a difference between a time of the initial locking of the vehicle 102 and a time of subsequent unlocking of the vehicle 102 with different means, for example, the key, by an authorized user of the vehicle 102. Further, in one embodiment, a time pattern, for a day, may be generated by performing various calculations, for example, median/mean/standard deviation, on the difference as generated. Further, each day may have a different time pattern depending on the locking and subsequent unlocking of the vehicle 102.
[0049] Further, depending on the above-mentioned calculation, the compromised state of the time dependent parameters may be determined. Particularly, when the difference between the time of the locking of the vehicle 102 and the time of subsequent unlocking of the vehicle 102 is greater than the summation of mean and standard deviation of the difference between the time of the locking of the vehicle 102 and the time of the subsequent unlocking of the vehicle 102, then the determining module 210 determines that the time dependent parameters may be compromised.
[0050] Similarly, if the difference between the time of the locking of the vehicle 102 and the time of subsequent unlocking of the vehicle 102 is smaller than the difference between the mean and standard deviation of the difference between the time of the locking of the vehicle 102 and the time of subsequent unlocking of the vehicle 102, then the determining module 210 determines that the time dependent parameters are compromised.
[0051] Further, the location dependent parameters may be Global Positioning System (GPS) location based parameters. The GPS location based parameters may be defined as a difference between a GPS location/coordinates of the initial locking of the vehicle 102 and a GPS location/coordinates of the subsequent unlocking of the vehicle 102 by the authorized user of the vehicle 102. In an embodiment, for optimal location dependent parameters, the difference between the GPS location/coordinates of the initial locking of the vehicle 102 and the GPS location/coordinates of the subsequent unlocking of the vehicle 102 should have a low value (GPS error threshold). In an embodiment, the difference between the GPS location/coordinates of the initial locking of the vehicle 102 and the GPS location/coordinates of the subsequent unlocking of the vehicle 102 may be derived from a cloud server communicatively coupled with the vehicle 102, without departing from the scope of the present disclosure.
[0052] Thus, the compromised state of the time dependent parameters may be determined:
when the difference between the GPS location/coordinates of the initial locking and the GPS location/coordinates of the subsequent unlocking of the vehicle 102 is greater than twice the GPS error threshold;
when the difference between the GPS location/coordinates of the subsequent unlocking of the vehicle 102 and a GPS location/coordinate of the vehicle 102 where a highest time is spent is greater than a first pre-configured threshold value of the difference between the GPS location/coordinates of the subsequent unlocking of the vehicle 102 and the GPS location/coordinates of the vehicle 102 where the highest time is spent; and
when the difference between the GPS location/coordinates of the subsequent unlocking of the vehicle 102 and the GPS location/coordinates of the vehicle 102 where the highest time is spent is greater than a second pre-configured threshold value of the difference between the GPS location/coordinates of the subsequent unlocking of the vehicle 102 and the GPS location/coordinates of the vehicle 102 where the highest time is spent.
[0053] In an embodiment, the biometric authentication based parameters may be defined as a pre-configured biometric detail of the authorized user used for unlocking the vehicle 102. Further, the determining module 210 determines that the biometric authentication based parameters are compromised when a biometric detail as provided during the unlocking of the vehicle 102 is different from the pre-configured biometric detail.
[0054] In an embodiment, the user device authentication based parameters may be defined as a user device, for example, a mobile phone, communicatively coupled with the vehicle 102 generating a pre-configured signal for unlocking the vehicle 102. Further, the determining module 210 determines that the user device authentication based parameters may be compromised when a signal generated by a user device is different from the pre-configured signal.
[0055] In an embodiment, the audio command authentication based parameters may be defined as a pre-configured audio command provided by the authorized user for unlocking the vehicle 102. Further, the determining module 210 determines that the audio command authentication based parameters may be compromised when an audio command as provided for unlocking the vehicle 102 is different from the pre-configured audio command.
[0056] In an embodiment, the video command authentication based parameters may be defined as a pre-configured video command provided by the authorized user for unlocking the vehicle 102. Further, the determining module 210 determines that the video command authentication based parameters may be compromised when a video command as provided for unlocking the vehicle 102 is different from the pre-configured video command.
[0057] In an embodiment, parameters dependent on the state of the vehicle 102 and the orientation of the vehicle 102 may be defined as a pre-configured state and orientation of the vehicle 102 for unlocking the vehicle 102. Further, the determining module 210 determines that parameters dependent on the state and the orientation of the vehicle 102 may be compromised when a state and an orientation of the vehicle 102 for unlocking the vehicle 102 is different from the pre-configured state and orientation of the vehicle 102.
[0058] Further, when the at least one parameter may be compromised, then, at step 324, the communicating module 214 may be configured to communicate the user equipment 116 associated with the vehicle 102 to receive a user input indicative of the two factor authentication, where the two factor authentication is already enabled/set as per steps 302 to 314 as explained in above mentioned paragraphs.
[0059] In an embodiment, at step 326, the determining module 210 may determine whether the received two factor authentication may be correct. When the determining module 210 determines that the received two factor authentication is correct, then the communicating module 214 may be configured to communicate to the vehicle 102 to enable the ride. Further, at step 322, the enabling module 216 may be configured to enable ride of the vehicle 102. When the determining module 210 determines that the received two factor authentication is incorrect, then at step 328, the communicating module 214 may be configured to communicate to the vehicle 102 to lock and disable the ride.
[0060] The present disclosure also relates to a method 400 for protecting the vehicle 102 from the unauthorized access as shown in Figure 4. The order in which the method steps are described below is not intended to be construed as a limitation, and any number of the described method steps may be combined in any appropriate order to execute the method or an alternative method. Additionally, individual steps may be deleted from the method without departing from the spirit and scope of the subject matter described herein.
[0061] The method 400 for protecting the vehicle 102 from the unauthorized access may be performed by using the system 104 as shown in Figures 1-3B.
[0062] The method 400 begins at step 402. At step 402, the method 400 comprises receiving, by the control unit 108, the input indicative of the at least one parameter related to the unlocking of the vehicle 102.
[0063] At step 404, the method 400 includes comparing, by the control unit 108, the input indicative of the at least one parameter with the input indicative of at least one predetermined parameter, upon receiving the input.
[0064] At step 406, the method 400 includes determining, by the control unit 108, that the at least one parameter is compromised, based on the comparison.
[0065] At step 408, the method 400 includes communicating, by the control unit 108, the user equipment 116 associated with the vehicle 102 to receive the user input indicative of the two factor authentication, when the at least one parameter is compromised.
[0066] At step 410, the method 400 includes communicating, by the control unit 108, the vehicle 102 to enable ride, upon determination of the correct received two-factor authentication; or to lock and disable the ride, upon determination of the incorrect received two-factor authentication.
[0067] The method 400 may further include receiving, by the control unit 108, the input indicative of the at least one parameter related to the unlocking of the vehicle 102. The method 400 may further include determining, by the control unit 108, whether the received input may be the initial input indicative of the at least one parameter related to the unlocking of the vehicle 102. In an embodiment, the initial input may be the input indicative of the at least one parameter related to the unlocking of the vehicle 102 generated for the first time. The method 400 may further include communicating, by the control unit 108, the user equipment 116 associated with the vehicle 102 to display the dialog box, based on the determination that the received input is the initial input.
[0068] The method 400 may further include receiving, by the control unit 108, the user input indicative of the setting of the two factor authentication, when the user equipment 116 displays the dialog box. The method 400 may further include receiving, by the control unit 108, another user input indicative of the setting the two-factor authentication using the plurality of input factors associated with the vehicle 102 provided by the user equipment 116 in the dialog box, when the received user input is related to the setting of the two factor authentication in the dialog box.
[0069] In an embodiment, the plurality of input factors includes at least one of the touch based input factor, the plurality of switch gears based input factors, the biometric based input factor, the voice command based input factor, the authentication from another device based input factor, or the combination thereof. The touch based input factor associated with the vehicle 102 may be provided by the user equipment 116 in the dialog box which may be accessed manually by operating the user equipment 116. The touch based input factor may be selected by the user by accessing the user equipment 116 in the predefined manner through touch in the real-time period. Further, the plurality of switch gears based input factors may be based on the operation of the plurality of switch gears 110 of the vehicle 102. The plurality of switch gears based input factors may be selected by the user by actuating at least one of the plurality of switch gears 110 in the predetermined manner in the real-time period.
[0070] The system 104 and the method 400 of the present disclosure ensure protection of the vehicle 102 from the unauthorized access. The system 104 determines the compromised state of the at least one parameter related to the unlocking of the vehicle 102 and thus communicate the user to enter the two factor authentication in the vehicle 102 as set by the user previously. Further, the system 104 determines that if the two factor authentication is correctly entered by the user, then only the system 104 communicates the vehicle 102 to enable the ride, else lock and disable the ride of the vehicle 102. This configuration ensures the protection of the vehicle 102 from the unauthorized access by a stranger in case the stranger has access to the key of the vehicle 102 by unlawful means. Thus, the system 104 protects the vehicle 102 from getting stolen and ensures the comfort of the user, as the user does not have to be always conscious about the safety of the vehicle 102, particularly when the vehicle 102 is in a parking state.
[0071] It will be appreciated that the modules, processes, systems, and devices described above can be implemented in hardware, hardware programmed by software, software instruction stored on a non-transitory computer readable medium or a combination of the above. Embodiments of the methods, processes, modules, devices, and systems (or their sub-components or modules), may be implemented on a general-purpose computer, a special-purpose computer, a programmed microprocessor or microcontroller and peripheral integrated circuit element, an ASIC or other integrated circuit, a digital signal processor, a hardwired electronic or logic circuit such as a discrete element circuit, a programmed logic circuit such as a programmable logic device (PLD), programmable logic array (PLA), field-programmable gate array (FPGA), programmable array logic (PAL) device, or the like. In general, any process capable of implementing the functions or steps described herein may be used to implement embodiments of the methods, systems, or computer program products (software program stored on a non-transitory computer readable medium).
[0072] Furthermore, embodiments of the disclosed methods, processes, modules, devices, systems, and computer program product may be readily implemented, fully or partially, in software using, for example, object or object-oriented software development environments that provide portable source code that may be used on a variety of computer platforms. Alternatively, embodiments of the disclosed methods, processes, modules, devices, systems, and computer program product may be implemented partially or fully in hardware using, for example, standard logic circuits or a very-large-scale integration (VLSI) design. Other hardware or software may be used to implement embodiments depending on the speed and/or efficiency requirements of the systems, the particular function, and/or the particular software or hardware system, microprocessor, or microcomputer being utilized.
[0073] In this application, unless specifically stated otherwise, the use of the singular includes the plural and the use of “or” means “and/or.” Furthermore, use of the terms “including” or “having” is not limiting. Any range described herein will be understood to include the endpoints and all values between the endpoints. Features of the disclosed embodiments may be combined, rearranged, omitted, etc., within the scope of the invention to produce additional embodiments. Furthermore, certain features may sometimes be used to advantage without a corresponding use of other features. , Claims:1. A system (104) for protecting a vehicle (102) from unauthorized access, the system (104) comprising:
a control unit (108) communicatively coupled to the vehicle (102), and configured to:
receive an input indicative of at least one parameter related to an unlocking of the vehicle (102);
compare the input indicative of the at least one parameter with an input indicative of at least one predetermined parameter, upon receiving the input;
determine that the at least one parameter is compromised, based on the comparison;
communicate a user equipment (116) associated with the vehicle (102) to receive a user input indicative of a two factor authentication, when the at least one parameter is compromised; and
communicate the vehicle (102) to:
enable a ride, upon determination of a correct received two factor authentication; or
lock and disable the ride, upon determination of an incorrect received two factor authentication.

2. The system (104) as claimed in claim 1, wherein the input is a manual input.

3. The system (104) as claimed in claim 1, wherein the at least one predetermined parameter includes at least one of time dependent parameters associated with the vehicle (102), location dependent parameters associated with the vehicle (102), a biometric authentication based parameters associated with the vehicle (102), a user device authentication based parameters associated with the vehicle (102), an audio command authentication based parameters associated with the vehicle (102), a video command authentication based parameters associated with the vehicle (102), parameters dependent on a state of the vehicle (102), and parameters dependent on an orientation of the vehicle (102).

4. The system (104) as claimed in claim 1, wherein the control unit (108) is configured to:
receive the input indicative of the at least one parameter related to the unlocking of the vehicle (102);
determine whether the received input is an initial input indicative of the at least one parameter related to the unlocking of the vehicle (102), wherein the initial input is an input indicative of the at least one parameter related to the unlocking of the vehicle (102) generated for a first time;
communicate the user equipment (116) associated with the vehicle (102) to display a dialog box, based on the determination that the received input is the initial input;
receive a user input indicative of a setting of the two factor authentication, when the user equipment (116) displays the dialog box; and
receive another user input indicative of the setting the two-factor authentication using a plurality of input factors associated with the vehicle (102) provided by the user equipment (116) in the dialog box, when the received user input is related to the setting of the two factor authentication in the dialog box.

5. The system (104) as claimed in claim 3, wherein the control unit (108) is configured to enable the ride of the vehicle (102) when the received user input is not related to the setting of the two factor authentication in the dialog box.

6. The system (104) as claimed in claim 4, wherein the two factor authentication comprises at least one of the plurality of input factors and a combination of the plurality of input factors.

7. The system (104) as claimed in claim 6, wherein the plurality of input factors comprises at least one of a touch based input factor, a plurality of switch gears based input factors, a biometric based input factor, a voice command based input factor, an authentication from another device based input factor, or a combination thereof.

8. The system (104) as claimed in claim 7, wherein the touch based input factor associated with the vehicle (102) is provided by the user equipment (116) in the dialog box which is accessed manually by operating the user equipment (116).

9. The system (104) as claimed in claim 8, wherein the touch based input factor is selected by a user by accessing the user equipment (116) in a predefined manner through touch in a real-time period.

10. The system (104) as claimed in claim 7, wherein the plurality of switch gears based input factors is based on an operation of a plurality of switch gears (110) of the vehicle (102).

11. The system (104) as claimed in claim 10, wherein the plurality of switch gears based input factors is selected by a user by actuating at least one of the plurality of switch gears (110) in a predetermined manner in a real-time period.

12. A method (400) for protecting a vehicle (102) from unauthorized access, the method (400) comprising:
receiving (402), by a control unit (108), an input indicative of at least one parameter related to an unlocking of the vehicle (102);
comparing (404), by the control unit (108), the input indicative of the at least one parameter with an input indicative of at least one predetermined parameter, upon receiving the input;
determining (406), by the control unit (108), that the at least one parameter is compromised, based on the comparison;
communicating (408), by the control unit (108), a user equipment (116) associated with the vehicle (102) to receive a user input indicative of the two factor authentication, when the at least one parameter is compromised; and
communicating (410), by the control unit (108), the vehicle (102):
to enable a ride, upon determination of a correct received two-factor authentication; or
to lock and disable the ride, upon determination of an incorrect received two-factor authentication.

13. The method (400) as claimed in claim 12, wherein the method (400) comprises:
receiving, by the control unit (108), the input indicative of the at least one parameter related to the unlocking of the vehicle (102);
determining, by the control unit (108), whether the received input is an initial input indicative of the at least one parameter related to the unlocking of the vehicle (102), wherein the initial input is an input indicative of the at least one parameter related to the unlocking of the vehicle (102) generated for a first time;
communicating, by the control unit (108), the user equipment (116) associated with the vehicle to display a dialog box, based on the determination that the received input is the initial input;
receiving, by the control unit (108), a user input indicative of a setting of the two factor authentication, when the user equipment (116) displays the dialog box; and
receiving, by the control unit (108), another user input indicative of the setting the two-factor authentication using a plurality of input factors associated with the vehicle (102) provided by the user equipment (116) in the dialog box, when the received user input is related to the setting of the two factor authentication in the dialog box.

14. The method (400) as claimed in claim 13, wherein the plurality of input factors comprises at least one of a touch based input factor, a plurality of switch gears based input factors, a biometric based input factor, a voice command based input factor, an authentication from another device based input factor, or a combination thereof.

15. The method (400) as claimed in claim 14, wherein the touch based input factor associated with the vehicle (102) is provided by the user equipment (116) in the dialog box which is accessed manually by operating the user equipment (116).

16. The method (400) as claimed in claim 15, wherein the touch based input factor is selected by a user by accessing the user equipment (116) in a predefined manner through touch in a real-time period.

17. The method (400) as claimed in claim 14, wherein the plurality of switch gears based input factors is based on an operation of a plurality of switch gears (110) of the vehicle (102).

18. The method (400) as claimed in claim 17, wherein the plurality of switch gears based input factors is selected by a user by actuating at least one of the plurality of switch gears (110) in a predetermined manner in a real-time period.

Documents

Application Documents

# Name Date
1 202441034367-TRANSLATIOIN OF PRIOIRTY DOCUMENTS ETC. [30-04-2024(online)].pdf 2024-04-30
2 202441034367-STATEMENT OF UNDERTAKING (FORM 3) [30-04-2024(online)].pdf 2024-04-30
3 202441034367-REQUEST FOR EXAMINATION (FORM-18) [30-04-2024(online)].pdf 2024-04-30
4 202441034367-POWER OF AUTHORITY [30-04-2024(online)].pdf 2024-04-30
5 202441034367-FORM 18 [30-04-2024(online)].pdf 2024-04-30
6 202441034367-FORM 1 [30-04-2024(online)].pdf 2024-04-30
7 202441034367-DRAWINGS [30-04-2024(online)].pdf 2024-04-30
8 202441034367-DECLARATION OF INVENTORSHIP (FORM 5) [30-04-2024(online)].pdf 2024-04-30
9 202441034367-COMPLETE SPECIFICATION [30-04-2024(online)].pdf 2024-04-30
10 202441034367-Proof of Right [08-05-2024(online)].pdf 2024-05-08
11 202441034367-RELEVANT DOCUMENTS [26-09-2024(online)].pdf 2024-09-26
12 202441034367-POA [26-09-2024(online)].pdf 2024-09-26
13 202441034367-FORM 13 [26-09-2024(online)].pdf 2024-09-26