Abstract: VEHICLE ACCESS MANAGEMENT SYSTEM AND METHOD THEREOF The present invention provides a vehicle access management system 5 comprises a vehicle (206), an owner device (202), a user device (204). The owner device (202) is communicably connected with the server (208) and the vehicle (206). The user device (204) is communicably connected with the owner device (202), the server (208), and the vehicle (206). The server (208) generates a dynamic digital key, for the vehicle (206) registered on the server 10 (208), when a request for access to the vehicle (206) is approved by the owner. The request for access is sent by the user device (204) to the owner device (202)and the user receives a response comprising the dynamic digital key forthe request. The vehicle (206) authorizes access to the user based on at leastthe response, the dynamic digital key and an access key. 15
Description:VEHICLE ACCESS MANAGEMENT SYSTEM AND METHOD THEREOF
TECHNICAL FIELD
[0001] The present subject matter generally relates to system and method for a vehicle access management. More particularly, but not exclusively to a system and method of authorizing vehicle access to a user by an owner of the 5 vehicle in an efficient manner.
BACKGROUND
[0002] Managing vehicle access within fleet operations presents unique challenges for fleet owners, compounded by the need for efficient, secure, and remotely managed access control systems. Conventional methods often 10 fall short in meeting the complex requirements of fleet management, leading to operational inefficiencies and security vulnerabilities.
[0003] For individual vehicle owners looking to loan their vehicles to guest users, traditional access control methods present several potential challenges and drawbacks. The requirement for physical handover of keys or access 15 codes can be inconvenient and impractical, leading to logistical difficulties in coordinating exchanges. Moreover, without robust access control measures, owners face the risk of unauthorized access to their vehicles, raising concerns about security and potential misuse. Limited control over access rights and the difficulty in remote management further compound these challenges, 20 hindering owners' ability to enforce personalized access controls or respond promptly to access requests. Additionally, concerns about liability and insurance arise due to the lack of clear documentation and accountability regarding who had access to the vehicle and when, potentially leading to disputes or increased insurance premiums. 25
[0004] One significant challenge faced by fleet owners and owners is the inability to remotely grant access to vehicles for authorized personnel, such as drivers or service technicians. Current systems typically rely on manual processes, requiring physical distribution of keys or access codes, which can
3
be time-consuming and impractical, especially in large-scale fleet operations spanning multiple locations. [0005] Additionally, conventional access control systems lack the flexibility to change the access rights based on changing operational requirements. This inflexibility can lead to delays in granting access or unauthorized vehicle use, 5 resulting in disruptions to fleet operations and potential revenue loss.
[0006] Furthermore, ensuring the security of vehicle access poses a significant concern for fleet owners. Manual key distribution methods are susceptible to theft, loss, or unauthorized duplication, jeopardizing the integrity of the fleet and exposing vehicles to the risk of theft or misuse. 10 Moreover, the lack of robust authentication mechanisms leaves fleet vehicles vulnerable to unauthorized access attempts or fraudulent activities, posing a serious threat to data security and vehicle integrity.
[0007] Traditional access control methods cannot effectively prevent unauthorized use of fleet vehicles. Without authentication mechanisms and 15 monitoring capabilities, fleet owners and vehicle owners are unable to detect and prevent unauthorized access or misuse of vehicles, increasing the risk of theft, unauthorized use for personal purposes, or unauthorized operation by non-authorized personnel.
[0008] In the context of fleet management, the absence of comprehensive bi-20 directional authentication between fleet owners, centralized servers, and individual vehicles exacerbates security risks, leaving fleet operations susceptible to unauthorized access or malicious intrusions.
[0009] Given these challenges, there is a need for an innovative solution that empowers fleet owners with secure, and remotely managed access control 25 capabilities.
[00010] Thus, there is a need in the art for a vehicle access management system and method thereof which addresses at least the aforementioned problems and other problems of known art.
[00011] Further limitations and disadvantages of conventional and traditional 30 approaches will become apparent to one of skill in the art, through comparison of described systems with some aspects of the present disclosure,
4
as set forth in the remainder of the present application and with reference to the drawings.
SUMMARY OF THE INVENTION
[00012] According to embodiments illustrated herein, the present 5 invention provides a vehicle access management system and a method thereof.
[00013] The vehicle access management system comprises a vehicle, an owner device, a user device. The vehicle is communicably connected with a server. The owner device is associated with an owner of the vehicle, and the 10 owner device is communicably connected with the server and the vehicle. The user device is associated with a user of the vehicle. The user device is communicably connected with the owner device, the server, and the vehicle. The server is configured to generate a dynamic digital key, for the vehicle registered on the server, when a request for access to the vehicle is approved 15 by the owner. The request for access is sent by the user device to the owner device. The user device is configured to receive a response for the request for access. This response comprises the dynamic digital key. The vehicle is configured to authorize access to the user based on at least the response, the dynamic digital key and an access key. 20
[00014] The method of vehicle access management, the method comprises steps of by a user requesting access to a vehicle to an owner through a user device. The user device is associated with the user. The request for access to the vehicle is received by an owner device. The owner device is associated with the owner. The owner approves the request for access to the 25 vehicle through the owner device. The server generates a dynamic digital key for the vehicle registered on the server. The user device receives a response for the request for access. The response comprises the dynamic digital key. The vehicle then authorizes access based on at least the response, the dynamic digital key and an access key. 30
5
[00015] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS 5
[00016] The details are described with reference to an embodiment of a vehicle access management system and method thereof along with the accompanying diagrams. The same numbers are used throughout the drawings to reference similar features and components.
[00017] Figure 1 exemplarily illustrates a block diagram for the vehicle 10 access management system in accordance with an embodiment of the present disclosure.
[00018] Figure 2A exemplarily illustrates a sequence diagram for communication owner of the vehicle, the server, and the user of the vehicle in accordance with an embodiment of the present disclosure. 15
[00019] Figure 2B exemplarily further illustrates a sequence diagram for communication owner of the vehicle, the server, and the user of the vehicle in accordance with an embodiment of the present disclosure.
[00020] Figure 2C exemplarily illustrates a sequence diagram for communication owner of the vehicle, the server, the vehicle and the user of 20 the vehicle in accordance with an embodiment of the present disclosure.
[00021] Figure 3A and Figure 3B illustrate illustrates a flowchart diagram for the method of the vehicle access management system in accordance with an embodiment of the present disclosure.
25
DETAILED DESCRIPTION
[00022] Exemplary embodiments are described with reference to the accompanying drawings. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While
6
examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the spirit and scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope and spirit being indicated by the following claims. 5 [00023] An objective of the present subject matter is to provide an efficient vehicle access management system for fleet owners, enabling them to remotely grant and revoke access to vehicles for authorized personnel while ensuring robust security measures are in place.
[00024] An objective of the present subject matter is to offer individual 10 vehicle owners a convenient and secure means of loaning their vehicles to guest users, allowing for seamless remote access provisioning and personalized access control based on individual preferences and requirements.
[00025] An objective of the present subject matter is to enhance the 15 efficiency and flexibility of vehicle access management across various use cases, including fleet operations and individual vehicle sharing, by integrating advanced authentication mechanisms and real-time monitoring capabilities.
[00026] An objective of the present subject matter is to address concerns related to vehicle security, unauthorized access, and liability by implementing 20 comprehensive access control measures, bi-directional authentication protocols, and secure communication channels between vehicle owners, centralized servers, and individual vehicles.
[00027] An objective of the present subject matter is to improve operational efficiency and reduce burdens for fleet owners and individual vehicle owners 25 alike, by automating access provisioning processes, enabling remote access management, and facilitating seamless integration with existing fleet management systems and operational platforms.
[00028] An objective of the present subject matter is to facilitate proper user authorization by generating dynamic digital keys and access tokens that 30 enhance access control within vehicle sharing and fleet management systems. These dynamic keys are uniquely generated for each access request,
7
incorporating user credentials, vehicle identifiers, and personalized access parameters. By employing dynamic key generation algorithms, the system mitigates the risk of unauthorized access through static or easily replicable keys, thereby strengthening security measures. [00029] Furthermore, the dynamic nature of these keys enables real-time 5 adjustments to access permissions, ensuring flexibility and responsiveness in managing access to vehicles.
[00030] This objective aims to enhance overall security, efficiency, and reliability in user authorization processes, reducing the likelihood of unauthorized use, theft, or misuse of vehicles. 10
[00031] The vehicle access management system comprises a vehicle, an owner device, a user device. The vehicle is communicably connected with a server. The owner device is associated with an owner of the vehicle, and the owner device is communicably connected with the server and the vehicle. The user device is associated with a user of the vehicle. The user device is 15 communicably connected with the owner device, the server, and the vehicle. The server is configured to generate a dynamic digital key, for the vehicle registered on the server, when a request for access to the vehicle is approved by the owner. The request for access is sent by the user device to the owner device. The user device is configured to receive a response for the request for 20 access. This response comprises the dynamic digital key. The vehicle is configured to authorize access to the user based on at least the response, the dynamic digital key and an access key. In this embodiment, the server plays a central role by generating dynamic digital keys for vehicle access upon owner approval. These keys are transmitted to the user device for 25 authorization, enabling the vehicle to verify access based on the received response, dynamic digital key, and access key. In an embodiment, the user device can directly get the response from the server.
[00032] As per an aspect of the present subject matter, a registration of the vehicle in the server is executed when the owner of the vehicle sends at least 30 a vehicle identification data and an owner identification data. Upon successful registration, the server is configured to send a registration response to the
8
owner device. The registration response comprises an access key. As an additional feature, vehicle registration on the server involves the submission of vehicle and owner identification data by the owner. Upon successful registration, the server sends a registration response to the owner device, containing an access key. This embodiment ensures proper vehicle ownership 5 verification and secure access key provisioning. [00033] As per an aspect of the present subject matter, the request for access to the vehicle comprises a user identification data, and the vehicle identification data. This embodiment may also incorporate additional data fields or parameters in the access request to provide context or facilitate 10 personalized access control settings.
[00034] As per an aspect of the present subject matter, the owner device is configured to send an authorization request to the server when the request for access to the vehicle is approved. The authorization request comprises the owner identification data, the user identification data and the vehicle 15 identification data. Variations in the authorization request format or content may be included to accommodate different use cases or security requirements.
[00035] As per an aspect of the present subject matter, the server is configured to verify the received authorization request against the registration of the vehicle. The server is configured to send an authorization response upon 20 successful verification to the owner device. The authorization response comprises the dynamic digital key. At least one of the owner device and the server is configured to send the authorization response to the user device. In this embodiment, either the owner device or server forwards the authorization response to the user device for access validation, ensuring seamless and 25 secure communication between all parties involved.
[00036] As per an aspect of the present subject matter, the owner device is configured to send the registration response to the vehicle.
[00037] As per an aspect of the present subject matter, the vehicle is configured to enable input for the response by the user. The response further 30 comprises the user identification data, and the authorization response.
9
[00038] As per an aspect of the present subject matter, the vehicle is configured to verify the response from the user and the registration response from the owner device with the server. The vehicle is configured to authorize access to the vehicle upon successful verification. Furthermore, the system allows for customizable access settings, so that the vehicle owners tailor 5 access permissions based on specific requirements or preferences. In this embodiment, owners can restrict user access to certain vehicle functionalities or features, such as blocking access to specific application widgets or capping the vehicle's speed limit. Additionally, owners may define geographical boundaries within which the vehicle can be operated. This level of 10 customization enhances security and control, enabling owners to mitigate risks associated with unauthorized usage or potential misuse of the vehicle.
[00039] A method of vehicle access management, the method comprises steps of by a user requesting access to a vehicle to an owner through a user device. The user device is associated with the user. The request for access to 15 the vehicle is received by an owner device. The owner device is associated with the owner. The owner approves the request for access to the vehicle through the owner device. The server generates a dynamic digital key for the vehicle registered on the server. The user device receives a response for the request for access. The response comprises the dynamic digital key. The 20 vehicle then authorizes access based on at least the response, the dynamic digital key and an access key.
[00040] As per an aspect of the present subject matter, the method further comprises steps of the owner sending at least a vehicle identification data and an owner identification data through the owner device. The server then 25 executes a registration of the vehicle based on the vehicle identification data and the owner identification data. The server then sends a registration response to the owner device upon successful registration. The registration response comprises an access key. The request for access to the vehicle comprises a user identification data, and the vehicle identification data. 30
10
[00041] As per an aspect of the present subject matter, the method further comprises steps of the owner device sends an authorization request to the server upon the approval of the request for access to the vehicle. The authorization request comprises the owner identification data, the user identification data and the vehicle identification data. 5
[00042] As per an aspect of the present subject matter, the method further comprises steps of the server verifies the received authorization request against the registration of the vehicle. The server then sends an authorization response to the owner device upon successful verification. The authorization response comprises the dynamic digital key, send the authorization response, 10 by at least one of the owner device and the server, to the user device.
[00043] As per an aspect of the present subject matter, the method further comprises steps of the owner device sending the registration response to the vehicle. The user then enters the response by the user. The response further comprises the user identification data. The vehicle verifies the response 15 entered by the user and the registration response from the owner device with the server. The vehicle authorizes access to the user upon successful verification.
[00044] The present subject matter is described using a vehicle access management and method thereof which is used in a vehicle, whereas the 20 claimed subject matter can be used in any other type of application employing above-mentioned a vehicle access management and method thereof, with required changes and without deviating from the scope of invention. Further, it is intended that the disclosure and examples given herein be considered as exemplary only. 25
[00045] The terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some embodiments”, and “one embodiment” mean “one or more (but not all) embodiments of the invention(s)” unless expressly specified otherwise. The terms “including”, “comprising”, “having” and variations thereof mean 30 “including but not limited to”, unless expressly specified otherwise. The
11
terms “a”, “an” and “the” mean “one or more”, unless expressly specified otherwise. [00046]
The embodiments of the present invention will now be described in detail with reference to a vehicle access management and method thereof with the accompanying drawings. However, the present invention is not limited to 5 the present embodiments. The present subject matter is further described with reference to accompanying figures. It should be noted that the description and figures merely illustrate principles of the present subject matter. Various arrangements may be devised that, although not explicitly described or shown herein, encompass the principles of the present subject matter. Moreover, all 10 statements herein reciting principles, aspects, and examples of the present subject matter, as well as specific examples thereof, are intended to encompass equivalents thereof.
[00047] Figure 1 exemplarily illustrates a block diagram for the vehicle access management system in accordance with an embodiment of the present 15 disclosure. The owner device (202), associated with the vehicle owner, communicates with the vehicle (206), server (208), and user device (204). The user device (204), linked to the user, communicates with the owner device (202). The vehicle (206) communicates with both the owner device (202), user device (204), and server (208). The vehicle comprises of a user 20 interface enabling user responses for access requests. The server (208) serves as a centralized hub, managing access control and facilitating communication between the owner device (202), user device (204), and vehicle (206). In an alternative scenario, upon access authorization, the user device (204) can directly receive a response from the server (208), containing both the access 25 key and dynamic digital key. The owner device (202), user device (204), vehicle (206), and server (208) communicate wirelessly, allowing data exchange without physical connections. Through technologies like Bluetooth, Wi-Fi, or cellular networks, the owner device (202) talks to the vehicle (206), server (208), and user device (204) in real-time. In one embodiment, to ensure 30 secure communication, all data exchanged between the owner device (202), user device (204), vehicle (206), and server (208) is encrypted. Each device
12
is equipped with decryption keys, enabling them to decode encrypted messages received from the server or other devices. Additionally, secure communication channels are established to transmit these decryption keys securely between the owner device, user device, vehicle, and server. This ensures that sensitive information such as access keys and dynamic digital 5 keys are protected from interception or unauthorized access. By implementing encryption and secure communication channels, the system enhances data security and confidentiality, safeguarding against potential security threats and unauthorized access attempts. [00048] Figure 2A exemplarily illustrates a sequence diagram for 10 communication owner of the vehicle, the server, and the user of the vehicle in accordance with an embodiment of the present disclosure. Figure 2B exemplarily further illustrates a sequence diagram for communication owner of the vehicle, the server, and the user of the vehicle in accordance with an embodiment of the present disclosure. Figure 2C exemplarily illustrates a 15 sequence diagram for communication owner of the vehicle, the server, the vehicle and the user of the vehicle in accordance with an embodiment of the present disclosure. Figure 3A and Figure 3B illustrate illustrates a flowchart diagram for the method of the vehicle access management system in accordance with an embodiment of the present disclosure. For brevity, the 20 sequence diagram and the flowchart will be explained together.
[00049] The method initiates the process at step 301. At step 302, the owner is required to register their vehicle (206). To do this, the owner sends at least a vehicle identification data and an owner identification data through the owner device (202). This data aids in identification of the vehicle, and register 25 an ownership against it. In another embodiment, further parameters can be sent to make the registration process more efficient. At step 303, the server executes a registration of the vehicle (206) based on the vehicle identification data and the owner identification data. Upon successfully registration, a registration response is sent by the server (208), to the owner device (202). 30 This registration response comprises of an access key. This access key serves as a unique identifier, securely linking the vehicle to its respective owner. It
13
acts as a digital signature, granting authorized access to the vehicle solely to its rightful owner. Through this access key, the system ensures that only the authenticated owner can exercise control over the registered vehicle. Additionally, the access key enhances security measures, as it is uniquely generated and tailored for each registered vehicle-owner pair. 5 [00050] The user is now able to send the request for access to the vehicle (206). At step 305, the user requests access to a vehicle to the owner through a user device (204). The user device is associated with the user. At step 306, the owner device (202) receives receiving the request for access to the vehicle, the owner device is associated with the owner. 10
[00051] At step 307, the owner is enabled to approve or reject the request for access to the vehicle (206) through the owner device (202). Upon rejection, the method terminates, and the access is not granted to the user. Upon approval, the method moves to step 308.
[00052] At step 308, an authorization request is sent by the owner device 15 (202)to the server (208). The server (208), at step 309, verifies the receivedauthorization request against the registration of the vehicle (206). Theauthorization request comprises of essential details: owner, user, and vehicleinformation. This request can include additional features like fingerprintscans or time restrictions for access, enhancing security. By customizing the 20 request, it ensures only authorized individuals gain entry, minimizing the risk of unauthorized use. If the server (208) is unable to verify the details, the request is denied, and the server (208) closes the communication. The owner will must send a new authorization request again which will be verified again. If the authorization request is verified, the method moves to step 310. 25
[00053] At step 310, the server (208) generates a dynamic digital key, for the vehicle (206) registered on the server (208). This dynamic digital key serves as a unique access credential, providing secure entry to the vehicle (206). Unlike traditional keys, the dynamic digital key is not physical but rather a digital code generated by the server (208). Its dynamic nature means that it 30 constantly changes, enhancing security by making it difficult to replicate or
14
guess. Additionally, the digital format enables transmission between devices, allowing for efficient and convenient access management. The dynamic digital key is tailored to each specific access request, ensuring that only authorized users can unlock and operate the vehicle (206). At step 311, an authorization response is sent by the server (208), to the owner device (202) 5 upon successful verification. This authorization response comprising the dynamic digital key. [00054] Once the authorization request is received by the owner device (202), the method moves to step 312.
[00055] At step 312, the authorization response is sent by at least one of the 10 owner device (202) and the server (208), to the user device (204). The dynamic digital key, embedded within the authorization response, serves as a unique access credential for the user. In one embodiment, the user device directly receives the authorization response from the server, enabling seamless and immediate access to the dynamic digital key. Alternatively, the 15 authorization response may first be received by the owner device, which then forwards it to the user device. Regardless of the transmission route, the user device obtains the dynamic digital key, allowing the user to securely access the vehicle. This flexible delivery mechanism ensures efficient distribution of access credentials, facilitating smooth and reliable vehicle access for 20 authorized users.
[00056] At step 313, the user device (204) receives a response for the request for access. The response comprising the dynamic digital key. At step 314, the owner device (202) sends the registration response to the vehicle (206).
[00057] At step 315, the user enters the response by the user. This response 25 further comprises of the user identification data, the dynamic digital key, and the registration response containing the access key.
[00058] At step 316, the vehicle (206) verifies the response from the user and the registration response from the owner device (202) with the server (208).
15
[00059] At step 317, the vehicle (206) granting the authorizing access to the user upon successful verification.
[00060] In a simplified example of the vehicle access management process, the owner initiates registration by sending vehicle and owner identification data through their device to the server, which then executes vehicle 5 registration and sends a registration response containing an access key back to the owner device. Subsequently, the user requests access through their device, which is received by the owner device. Upon approval by the owner, an authorization request is sent to the server, including essential details. The server generates a dynamic digital key for the vehicle and sends an 10 authorization response with this key to the owner device, which then transmits it to the user device. The user enters the response, including their identification data and the dynamic digital key, and the owner device sends the registration response to the vehicle. The vehicle verifies the user response and registration response with the server, ultimately granting access to the 15 user upon successful verification.
[00061] A person with ordinary skills in the art will appreciate that the systems, modules, and sub-modules have been illustrated and explained to serve as examples and should not be considered limiting in any manner. It will be further appreciated that the variants of the above disclosed system 20 elements, modules, and other features and functions, or alternatives thereof, may be combined to create other different systems or applications.
[00062] The present invention aims to enhance security in vehicle access management by providing a dynamic digital key system, which is difficult to replicate or guess, minimizing the risk of unauthorized vehicle access. 25
[00063] The present invention aims to improve convenience and efficiency by enabling seamless communication between the owner device, user device, vehicle, and server, facilitating real-time access management and response.
[00064] The present invention aims to enhance flexibility in access control settings, allowing owners to customize access permissions based on specific 30
16
requirements or preferences, such as time restrictions or geographical boundaries, thereby minimizing unauthorized use. [00065] The present invention aims to streamline the vehicle access process by automating registration and authorization procedures, reducing the time and effort required for manual verification and approval. 5
[00066] The present invention aims to increase accountability and traceability by maintaining comprehensive records of access requests, approvals, and vehicle usage, enabling owners to monitor and track vehicle access activities effectively.
[00067] In light of the above mentioned advantages and the technical 10 advancements provided by the disclosed method and system, the claimed steps as discussed above are not routine, conventional, or well understood in the art, as the claimed steps enable the following solutions to the existing problems in conventional technologies. Further, the claimed steps clearly bring an improvement in the functioning of the configuration itself as the 15 claimed steps provide a technical solution to a technical problem.
[00068] A description of an embodiment with several components in communication with another does not imply that all such components are required, On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the invention. 20
[00069] Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter and is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application 25 based here on. Accordingly, the embodiments of the present invention are intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
[00070] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. 30 The various aspects and embodiments disclosed herein are for purposes of
17
illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims. [00071] While the present disclosure has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made, and equivalents may be substituted without 5 departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from its scope. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed, but that the present disclosure will include 10 all embodiments falling within the scope of the appended claims.
Reference Numerals:
202 – owner device associated with the owner of the vehicle
204 – user device associated with the user of the vehicle
206 – the vehicle
208 – the server , Claims:I/We Claim:
1.A vehicle (206) access management system, the vehicle accessmanagement system comprising:5
a vehicle (206), the vehicle (206) being communicablyconnected with a server (208);
an owner device (202), the owner device (202) beingassociated with an owner of the vehicle (206), the ownerdevice (202) being communicably connected with the server10 (208)and the vehicle (206);
a user device (204), the user device (204) being associatedwith a user of the vehicle (206), the user device (204) beingcommunicably connected with the owner device (202), theserver (208), and the vehicle (206),15
wherein the server (208) being configured to generate a dynamic digital key, for the vehicle (206) registered on the server (208), upon an approval of a request for access to the vehicle (206) by the owner,
wherein the request for access being sent by the user 20 device (204) to the owner device (202),
wherein the user device (204) being configured to receive a response for the request for access, the response comprising the dynamic digital key,
wherein the vehicle (206) being configured to 25 authorize access to the user based on at least the response, the dynamic digital key and an access key.
2.The vehicle access management system as claimed in claim 1,
wherein a registration of the vehicle (206) in the server (208) 30 being executed upon the owner of the vehicle (206) sending at
20
least a vehicle identification data and an owner identification data,
wherein the server (208) being configured to send a registration response upon successful registration to the owner device (202), and 5
wherein the registration response comprising an access key.
3.The vehicle access management system as claimed in claim 1,wherein the request for access to the vehicle (206) comprising a useridentification data, and the vehicle identification data.10
4.The vehicle access management system as claimed in claim 1,
wherein the owner device (202) being configured to send an authorization request to the server (208) upon the approval of the request for access to the vehicle (206), 15
wherein the authorization request comprising the owner identification data, the user identification data and the vehicle identification data.
5.The vehicle access management system as claimed in claim 4,20
wherein the server (208) being configured to verify the received authorization request against the registration of the vehicle (206),
wherein the server (208) being configured to send an authorization response upon successful verification to the 25 owner device (202), wherein the authorization response comprising the dynamic digital key,
wherein at least one of the owner device (202) and the server (208)being configured to send the authorization response tothe user device (204).30
21
6.The vehicle access management system as claimed in claim 1,wherein the owner device (202) being configured to send theregistration response to the vehicle (206).
7.The vehicle access management system as claimed in claim 1,5 wherein the vehicle (206) being configured to enable input for theresponse by the user, wherein the response further comprising the useridentification data, and the authorization response.
8.The vehicle access management system as claimed in claim 1,10 wherein the vehicle (206) being configured to verify the responsefrom the user and the registration response from the owner device(202)with the server (208), wherein the vehicle (206) beingconfigured to authorize access to the vehicle (206) upon successfulverification.15
9.A method of vehicle access management, the method comprisingsteps of:
requesting access to a vehicle (206), by a user, to an owner through a user device (204), the user device (204) being 20 associated with the user;
receiving, by an owner device (202), the request for access to the vehicle (206), the owner device (202) being associated with the owner;
approving, by the owner, request for access to the vehicle 25 (206)through the owner device (202);
generating, by the server (208), a dynamic digital key, for thevehicle (206) registered on the server (208);
receiving, by the user device (204), a response for the requestfor access, wherein the response comprising the dynamic30 digital key;
authorizing access, by the vehicle (206), based on at least theresponse, the dynamic digital key and an access key.
22
10.The method of vehicle access management as claimed in claim 9further comprising steps of:
sending, by the owner, at least a vehicle identification data and an owner identification data through the owner device (202); 5
executing, by the server (208), a registration of the vehicle (206)based on the vehicle identification data and the owneridentification data;
sending a registration response, by the server (208), to theowner device (202) upon successful registration, wherein the10 registration response comprising an access key.
11.The method of vehicle access management as claimed in claim 9,wherein the request for access to the vehicle (206) comprising a useridentification data, and the vehicle identification data.15
12.The method of vehicle access management as claimed in claim 9further comprising steps of:
sending an authorization request, by the owner device (202), to the server (208) upon the approval of the request for access 20 to the vehicle (206), wherein the authorization request comprising the owner identification data, the user identification data and the vehicle identification data.
13.The method of vehicle access management as claimed in claim 925 further comprising steps of:
verifying, by the server (208), the received authorization request against the registration of the vehicle (206);
sending an authorization response, by the server (208), to the owner device (202) upon successful verification, wherein the 30 authorization response comprising the dynamic digital key,
23
sending the authorization response, by at least one of the owner device (202) and the server (208), to the user device (204).
14.The method of vehicle access management as claimed in claim 9 5 further comprising steps of:
sending, by the owner device (202), the registration response to the vehicle (206);
entering, by the user, the response by the user, wherein the response further comprising the user identification data; 10
verifying, by the vehicle (206), the response from the user and the registration response from the owner device (202) with the server (208);
authorizing access, by the vehicle (206), to the user upon successful verification.
| # | Name | Date |
|---|---|---|
| 1 | 202441037207-STATEMENT OF UNDERTAKING (FORM 3) [10-05-2024(online)].pdf | 2024-05-10 |
| 2 | 202441037207-REQUEST FOR EXAMINATION (FORM-18) [10-05-2024(online)].pdf | 2024-05-10 |
| 3 | 202441037207-FORM 18 [10-05-2024(online)].pdf | 2024-05-10 |
| 4 | 202441037207-FORM 1 [10-05-2024(online)].pdf | 2024-05-10 |
| 5 | 202441037207-FIGURE OF ABSTRACT [10-05-2024(online)].pdf | 2024-05-10 |
| 6 | 202441037207-DRAWINGS [10-05-2024(online)].pdf | 2024-05-10 |
| 7 | 202441037207-COMPLETE SPECIFICATION [10-05-2024(online)].pdf | 2024-05-10 |