Sign In to Follow Application
View All Documents & Correspondence

A Keyless Authorization Method And A System For Accessing And Starting A Vehicle

Abstract: The present disclosure provides a keyless authentication method (100) and a system (200) for accessing and starting a vehicle. The present method (100) and system (200) becomes operative when doors of the vehicle are locked and the user intent to access and start the vehicle. The method (100) and system (200) has two stage authentication. The first authentication is done to facilitate user in accessing the vehicle and the second authentication is done to facilitate the user in starting the vehicle. For the first authentication and the second authentication, there is no need to carry any type of key or FOB. [TO BE PUBLISHED WITH FIG 1A and 1B]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 July 2022
Publication Number
05/2024
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application

Applicants

MARUTI SUZUKI INDIA LIMITED
1 Nelson Mandela Road, Vasant Kunj, New Delhi-110070, India.

Inventors

1. MUDIT KHANDELWAL
Maruti Suzuki India Limited, Palam Gurugram Road, Gurugram, Haryana-122015, India.
2. MUDIT GUPTA
Maruti Suzuki India Limited, Palam Gurugram Road, Gurugram, Haryana-122015, India.
3. ANKUR GUPTA
Maruti Suzuki India Limited, Palam Gurugram Road, Gurugram, Haryana-122015, India.
4. SIDHARTH GUPTA
Maruti Suzuki India Limited, Palam Gurugram Road, Gurugram, Haryana-122015, India.

Specification

Description:A KEYLESS AUTHORIZATION METHOD AND A SYSTEM FOR ACCESSING AND STARTING A VEHICLE

TECHNICAL FIELD
[0001] The present disclosure relates, generally, to vehicle access authorization. The present disclosure, in particular, relates to a keyless authorization method and a system for accessing and starting a vehicle.

BACKGROUND
[0002] Generally, in a vehicle, a key system is used to lock/unlock the vehicle and start the engine. In a key system, a key is provided which is used for both locking/unlocking of the doors and ignition purpose. However, using key system is sometimes an inconvenience as the user must carry the key everywhere. Further, the key may get damage due to excessive use over time and stop working. In addition, the key can be copied which is a serious security threat with the key system.
[0003] To overcome these objections, various keyless systems are invented. Existing vehicles may include a passive entry-passive start system (PEPS). A PEPS system includes a wireless free-on board (FOB) that communicates with the vehicle. When a user approaches a vehicle and grasps a door handle, a capacitive sensor in the door handle generates a signal that unlocks the door if the vehicle detects an authorized FOB in the vicinity of the vehicle. A user can then enter the vehicle and push a button to actuate the vehicle ignition system. The vehicle will start the engine if the vehicle detects the presence of an authorized FOB. Vehicles with PEPS system generally includes a lock cylinder that permits the user to enter the vehicle in the event of malfunction of the FOB.
[0004] Therefore, the biggest drawback of PEPS system is that the user still has to carry the wireless FOB everywhere. In addition, the battery of the FOB may also deplete or the wireless FOB can be copied which is a serious security threat with the PEPS system.
[0005] In some cases, the wireless FOB is replaced by a terminal such as a smartphone. The terminal can be used for accessing the vehicle. Generally, the terminal is configured to generate a request signal to the vehicle and necessary information is exchanged by performing a wireless communication with the terminal carried by the user. Thus, to access the vehicle, user has to first send a request signal to the vehicle from the terminal. Since the terminal is a very handy device, battery of the terminal tends to exhaust due to excessive use. The user may not be able to send a request signal and access the vehicle which may cause inconvenience to the user.
[0006] Accordingly, there is a need for a keyless authorization method and a system for accessing and starting a vehicle which is more secure than the existing systems and cause less inconveniene to the user.

SUMMARY
[0007] This summary is provided to introduce concepts related to a keyless authorization method and system for accessing and starting a vehicle. The concepts are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
[0008] The present disclosure relates to a keyless authorization method for accessing and starting a vehicle. The method comprises sending, to a controller, a first trigger signal for initiating first authentication through an authentication unit to confirm intent to unlock door of the vehicle; activating, by the Controller, a display/ Human Machine interface/ lamps/ buzzer present inside/outside the vehicle on receiving the first trigger signal from the authentication unit; sending, to the controller, a first authentication identifier transmitted from the authentication unit for authentication; displaying in real time, on a display/ Human Machine Interface, a pattern corresponding to the first authentication identifier entered through the authentication unit; comparing, by the controller, the displayed pattern corresponding to the first authentication identifier with a pre-stored authentication pattern stored in a memory operatively connected to the controller; transmitting, by the controller, an affirmation signal to a control unit to unlock the door, when the pattern is identical to the pre-stored authentication pattern stored in the memory; sending, to a controller, a second trigger signal for initiating second authentication to confirm intent to drive the vehicle; sending, to the controller, a second authentication identifier inputted through the display/ Human Machine Interface; comparing, by the Controller, the second authentication identifier with a pre-stored authentication identifier stored in the memory operatively connected to the controller; and transmitting, by the controller, an affirmation signal to the control unit to crank engine of the vehicle to start the vehicle, when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory.
[0009] In an aspect, the first authentication identifier includes a sequential time dependent pulses or a gesture based time dependent pulses.
[0010] In an aspect, the second authentication identifier includes a pattern, login credentials, biometric authentication or an alpha-numeric password.
[0011] In an aspect, the comparison of pattern corresponding to the first authentication identifier with a pre-stored authentication pattern is performed in real time.
[0012] In an aspect, when the pattern corresponding to the first authentication identifier is not identical to the pre-stored authentication pattern stored in the memory, consecutively, for a predefined number of times, the controller (201) actuate an alarm.
[0013] In an aspect, the pre-stored authentication pattern stored in the memory is deleted after successful authentication through the first authentication identifier.
[0014] In an aspect, a new pre-stored authentication pattern is stored in the memory, through the display/ Human Machine Interface after successful authentication through the first authentication identifier.
[0015] In an aspect, the first pre-stored authentication pattern is stored in the memory through the display/ Human Machine Interface or a terminal.
[0016] In an aspect, second trigger signal is transmitted by a switch available in the vehicle including Seat Belt fastened switch or by pressing brakes or accelerator pedal or through a prompt to the user via the in-vehicle display/Human Machine Interface to input the second authentication identifier for starting the vehicle.
[0017] The present subject matter further relates to a keyless authorization system for accessing and starting a vehicle. The system comprises an authentication unit, a display/ Human Machine Interface, a control unit, a memory and a controller. The authentication unit is configured to transmit a first trigger signal and a first authentication identifier. The display/Human Machine Interface is provided inside the vehicle configured to visually display a pattern corresponding to the first authentication identifier, generate a new first authentication identifier, generate a new authentication identifier and input a second authentication identifier. The control unit is configured to actuate/de-actuate locking mechanism of the vehicle and crank up the engine. The memory is configured to store an authentication pattern, an authentication identifier, and subsequent new authentication patterns and authentication identifiers. The controller is operatively connected to a memory, the authentication unit, the display/Human Machine Interface and the control unit. The controller is configured to receive, from the authentication unit, a first trigger signal for initiating first authentication to confirm intent to unlock the door; activate a display/ Human Machine interface present inside the vehicle on receiving the first trigger signal from the authentication unit; receive, from the authentication unit, a first authentication identifier for authentication; compare the displayed pattern corresponding to the first authentication identifier with a pre-stored authentication pattern stored in a memory; transmit an affirmation signal to unlock the door, when the pattern is identical to the pre-stored authentication pattern stored in the memory; receive a second trigger signal for initiating second authentication to confirm intent to drive the vehicle; receive, from the display/ Human Machine Interface, a second authentication identifier; compare the second authentication identifier with a pre-stored second authentication identifier stored in the memory operatively connected to the controller; transmit an affirmation signal, to the control unit, to crank engine of the vehicle to start the vehicle, when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory.
[0018] In an aspect, the authentication unit comprises a trigger switch/ sensor or a plurality of switches/ sensors The trigger switch/ sensor is configured to send signal to the controller in the form of first trigger signal and subsequently in the form of sequential time dependent pulses. The plurality of switch/sensors is configured to send signal to the controller in the form of first trigger signal and subsequently in the form of gesture based time dependent pulses.
[0019] In an aspect, the display/ Human Machine Interface is provided with a switch configured to generate a new pre-stored authentication pattern after successful authentication through the first authentication identifier.
[0020] In an aspect, the controller is further configured to compare the pattern corresponding to the first authentication identifier with a pre-stored authentication pattern in real time.
[0021] In an aspect, the controller is operatively connected to an alarm which is actuated when the pattern corresponding to the first authentication identifier is not identical to the pre-stored authentication pattern stored in the memory, consecutively, for a predefined number of times.
[0022] In an aspect, the controller is further configured to delete the pre-stored authentication pattern stored in the memory after successful authentication through the first authentication identifier.
[0023] To further understand the characteristics and technical contents of the present subject matter, a description relating thereto will be made with reference to the accompanying drawings. However, the drawings are illustrative only but not used to limit the scope of the present subject matter.
[0024] Various objects, features, aspects, and advantages of the inventive subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.

BRIEF DESCRIPTION OF FIGURES
[0025] The illustrated embodiments of the present disclosure will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. The following description is intended only by way of example, and simply illustrates certain selected embodiments of devices, systems, and processes that are consistent with the subject matter as claimed herein, wherein:
[0026] FIG. 1A illustrates a flow chart of first authentication of a keyless authorization method for accessing the vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure;
[0027] FIG. 1B illustrates a flow chart of second authentication of the keyless authorization method for starting a vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure;
[0028] FIG. 2 illustrates block diagram of an exemplary keyless authorization system for accessing and starting a vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure;
[0029] FIG. 3 illustrates an exemplary pattern corresponding to the first authentication identifier that can be utilized to implement one or more exemplary embodiments of the present disclosure;
[0030] FIG. 4A illustrates an exemplary flow chart showing the first authentication in accordance with one of the embodiment of present subject matter; and
[0031] FIG. 4B illustrates an exemplary flow chart showing the second authentication in accordance with one of the embodiment of present subject matter.
[0032] The figures depict embodiments of the present subject matter for the purposes of illustration only. A person skilled in the art will easily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.

DETAILED DESCRIPTION
[0033] A few aspects of the present disclosure are explained in detail below with reference to the various figures. Example implementations are described to illustrate the disclosed subject matter, not to limit its scope, which is defined by the claims. Those of ordinary skill in the art will recognize a number of equivalent variations of the various features provided in the description that follows.

EXEMPLARY IMPLEMENTATIONS
[0034] While the present disclosure may be embodied in various forms, there are shown in the drawings, and will hereinafter be described, some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated. Not all of the depicted components described in this disclosure may be required, however, and some implementations may include additional, different, or fewer components from those expressly described in this disclosure. Variations in the arrangement and type of the components may be made without departing from the scope of the claims as set forth herein.
[0035] Some embodiments of this invention, illustrating all its features, will be discussed in detail.
[0036] The techniques described below may be implemented using one or more computer programs executed on (or executable by) a programmable computer including any combination of any number of the following: a processor, a sensor, a storage medium readable and/or writable by the processor (including for example volatile and non-volatile memory and/or storage elements), plurality of inputs units, plurality of output devices and networking devices.
[0037] Method steps as disclosed by present disclosure may be performed by one or more computer processors executing a program tangibly embodied on a computer-readable medium to perform functions of the invention by operating on input and generating output. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, the processor receives (reads) instructions and content from a memory (such as a read only memory and/or random access memory) and writes (stores) instructions and content to the memory. Storage devices suitable for tangibly embodying computer program instructions and content include, for example, all forms of non-volatile memory, such as semiconductor memory devices, including EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disk and removable disks, magneto-optical disks, and CD-ROMs. Any of the foregoing may be supplemented by, or incorporated in, specially-designed ASICs (application specific integrated circuits) or FPGAs (Field-Programmable Gate Arrays).
[0038] Any content disclosed herein may be implemented, for example, in one or more content structures tangibly stored on a non-transitory computer-readable medium. Embodiments of the invention may store such content in such content structure(s) and read such content from such content structure(s).
[0039] The present disclosure provides a keyless authorization method and a system for accessing and starting a vehicle. The present system and method becomes operative when doors of the vehicle are locked and the user intent to access and start the vehicle. The system and method has two stage authentication. The first authentication is done to facilitate user in accessing the vehicle and the second authentication is done to facilitate the user in starting the vehicle.
[0040] FIG. 1A illustrates a flow chart of first authentication of the keyless authorization method 100 for accessing a vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure.
[0041] At block 102, the method 100 includes sending a first trigger signal. This trigger signal is sent by an authentication unit to a controller. The first trigger signal confirms that the user intends to unlock the door to access the vehicle. On receiving the first trigger signal, the controller initiates first authentication which is responsible for facilitating the user in accessing the vehicle.
[0042] At block 104, the method 100 includes activating display/ Human-Machine Interface. On receiving the first trigger signal from the authentication unit, the controller activates the display/ Human-Machine Interface/ lamps or buzzers. The display/ Human-Machine interface is mounted on dashboard of the vehicle. In an aspect, in-vehicle infotainment system can be used as a display/Human-Machine Interface. The in-vehicle infotainment system mainly has a touchscreen display, button panels, and audio/video interfaces.
[0043] At block 106, the method 100 includes sending a first authentication identifier. The first authentication identifier is a form of password that is only known to the user. The first authentication identifier is sent to the controller through the authentication unit by the user. The first authentication identifier includes but not limited to a sequential time dependent pulses or a gesture based time dependent pulses. The authentication unit is configured to generate a sequential time dependent pulses or gesture based time dependent pulses. The sequential time dependent pulses or the gesture based time dependent pulses forming a specific pattern constitute the first authentication identifier. Since the sequential time dependent pulses and the gesture based time dependent pulses are both time dependent, the pattern of these pulses are created by varying the pulses over time.
[0044] At block 108, the method 100 includes displaying the pattern corresponding to the first authentication identifier. The pattern form by the sequential time dependent pulses or the gesture based time dependent pulses, corresponding to the first authentication identifier, is displayed on the display/Human-Machine Interface in real time. The user can refer to the pattern displayed on the display/ Human-Machine Interface to inspect the inputted first authentication identifier. Since the displayed pattern on the display/ Human Machine Interface is showing real time input, the user can detect any shortcoming in his/her inputted first authentication identifier..
[0045] At block 110, the method 100 includes comparing the displayed pattern with a pre-stored authentication pattern stored in a memory. The controller is configured to compare the pattern corresponding to the first authentication identifier entered through the authentication unit with the pre-stored authentication pattern stored in the memory. The comparison performed by the controller is in real time.
[0046] At block 112, the method 100 includes transmitting an affirmation signal to a control unit to unlock the door when the pattern is identical to the pre-stored authentication pattern stored in the memory. The Controller sends the affirmation signal to the control unit. The control unit, subsequently, actuate locking mechanism provided on the door of the vehicle which unlock the locking mechanism and provide access of the vehicle to the user. The controller is further configured to delete the pre-stored authentication pattern stored in the memory after successful authentication through the first authentication identifier. The controller is further configured to initiate registration of new pre-stored first authentication identifier through the display/ Human-Machine Interface which could be used as the first authentication identifier for next time when the user need access to the vehicle. Situation may arise when the user input the first authentication identifier, incorrectly. The user gets predefined number of attempts to enter the correct first authentication identifier. The controller is configured to raise an alarm when the pattern corresponding to the first authentication identifier is not identical to the pre-stored authentication pattern stored in the memory, consecutively, for a predefined number of times (attempts). In an aspect, the alarm includes an audio/ visual alarm or a message to the user over registered terminal.
[0047] FIG. 1B illustrates a flow chart of second authentication of the keyless authorization method 100 for starting a vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure.
[0048] At block 114, the method 100 includes sending a second trigger signal. The second trigger signal confirms that the user intends to drive the vehicle. On receiving the second trigger signal, the controller initiates second authentication which is responsible for facilitating the user to drive the vehicle by cranking engine of the vehicle. As the second trigger signal is sent to confirm the intention of the user to drive the vehicle, the second trigger signal is transmitted to the controller when the user presses a switch available in the vehicle including Seat Belt fastened switch or by pressing brakes or accelerator pedal or through a prompt to the user via the in-vehicle display/Human Machine Interface to input the second authentication identifier for starting the vehicle.
[0049] At block 116, the method 100 includes sending a second authentication identifier to the controller. The second authentication identifier is a form of password that is only known to the user. The second authentication identifier is sent to the controller through the display/Human-Machine Interface provided on the dashboard. The second authentication identifier includes but not limited to a pattern, login credentials, biometric authentication or an alpha-numeric password.
[0050] At block 118, the method 100 includes comparing the second authentication identifier with a pre-stored authentication identifier stored in the memory. The controller is configured to compare the second authentication identifier entered through the display/ Human-Machine Interface with the pre-stored authentication identifier stored in the memory. The comparison performed by the controller is done only after completely inputting the second authentication identifier.
[0051] At block 120, the method 100 includes transmitting an affirmation signal to crank engine of the vehicle to start the vehicle, when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory. The Controller sends the affirmation signal to the control unit. The control unit, subsequently, crank up the engine to facilitate the user in starting the vehicle for driving. Situation may arise when the user input the second authentication identifier incorrectly. The user gets predefined number of attempts to enter the correct second authentication identifier. The controller is configured to raise an alarm when the second authentication identifier is not identical to the pre-stored authentication identifier stored in the memory, consecutively, for a predefined number of times (attempts). In an aspect, the alarm includes an audio/ visual alarm or a message to the user over registered terminal.
[0052] In this way, the two stage authentication is performed for accessing and starting a vehicle. However, it is to be noted that first registration has to be done before employing the method. Also, the user has choice to activate or deactivate the present keyless authorization method.
[0053] The first time registration of the first authentication identifier and the second authentication identifier is done through the terminal or the display/ Human Machine Interface provided on the dashboard of the vehicle or through any other terminal such as smartphone. For the purpose of registration of the first authentication identifier or a subsequent new first authentication identifier, a button/trigger switch/ sensor is provided on the display/ Human-Machine Interface. In addition, the second authentication identifier could also be changed from the display/Human-Machine Interface.
[0054] FIG. 2 illustrates block diagram of an exemplary keyless authentication system 200 for accessing and starting a vehicle that can be utilized to implement one or more exemplary embodiments of the present disclosure. The system 200 comprises a controller 201, a display/Human-Machine Interface 202, an authentication unit 203, a control unit 204, a memory 201a and a door locking mechanism 205. Further, the controller 201, the display/ Human-Machine Interface 202, the authentication unit 203 and the control unit 204 are configured to send and receive signals to each other over CAN BUS 206 (communication channel).
[0055] The authentication unit 203 is configured to facilitate first authentication which is performed to facilitate user in accessing the vehicle. The authentication unit 203 is configured to transmit the first trigger signal and the first authentication identifier. The first trigger signal is sent to initiate the first authentication. Sending the first trigger signal to the controller 201 confirms the intent of the user to unlock the door.
[0056] To facilitate generation and transmission of the first trigger signal and the first authentication identifier, the authentication unit 203 comprises a trigger switch/ sensor or a plurality of switches/ sensors capable of determining discrete motion or distance of the objects.. The trigger switch/ sensor is provided on the vehicle exterior. The first authentication identifier includes but not limited to a sequential time dependent pulses or a gesture based time dependent pulses. The sequential time dependent pulses or the gesture based time dependent pulses forming a specific pattern constitute the first authentication identifier. The trigger switch/ sensor is configured to generate a sequential time dependent pulses. Since the sequential time dependent pulses are time dependent, the pattern of these pulses are created by pressing the trigger switch/ sensor for varying period of time. The trigger switch/ sensor or a plurality of switches/ sensors capable of determining discrete motion or distance of the objects could be provided on the vehicle based on the specific use. For instance, gesture based time dependent pulses could be inputted using hand or feet of the user. Based on the application, the trigger switch/ sensor or a plurality of switches/ sensors capable of determining discrete motion or distance of the objects could be provided on the handle of the door or below the side sill garnish of the vehicle or any other position on the vehicle exterior. The trigger switch/ sensor or a plurality of switches/ sensors capable of determining discrete motion or distance of the objects is configured to generate time dependent pulses. Since the gesture based time dependent pulses are time dependent, the pattern of these pulses are created by performing gestures in the proximity of sensors and engaging the sensors for varying period of time. The pattern is discussed later by referring to FIG. 3.
[0057] The display/ Human Machine Interface 202 is configured to visually display the pattern corresponding to the first authentication identifier, generate a new first authentication identifier, generate a new second authentication identifier and input a second authentication identifier. The display/ Human-Machine Interface 202 is provided inside the vehicle on the dash board. The screen of the display/Human-Machine Interface 202 is visible from outside of the vehicle. In an aspect, an in-vehicle infotainment system can be used as the display/ Human-Machine interface 202.
[0058] The control unit 205 is configured to lock/unlock the locking mechanism 205 and crank up the engine 207 for starting the vehicle.
[0059] The memory 201a is configured to store the authentication pattern, the authentication identifier and subsequent new authentication patterns and new authentication identifiers. The authentication pattern, the authentication identifier and subsequent new first authentication patterns and new authentication identifiers are inputted into the memory 201a from the display/Human-Machine Interface 202 or from the terminal 208.
[0060] The controller 201 is operatively connected to the memory 201a, the authentication unit 203, the display/Human-Machine Interface 202 and the control unit 204. The steps performed by the Controller 201 are already discussed in detail while discussing the method. Nevertheless, the functioning of the controller 201 is discussed briefly in the following paragraphs.
FIRST AUTHENTICATION BY THE CONTROLLER
[0061] The controller 201 is configured to receive a first trigger signal from the authentication unit 203 and activate the display/Human-Machine Interface 202. Further, the controller 201 is configured to receive a first authentication identifier from the authentication unit 203. Furthermore, the controller 201 is configured to compare the pattern corresponding to the first authentication identifier with the pre-stored authentication pattern and transmit the affirmation signal to unlock the door when the pattern is identical to the pre-stored authentication pattern. In addition, the controller 201 is configured to delete the first authentication identifier after successful authentication.
SECOND AUTHENTICATION BY THE CONTROLLER
[0062] The controller 201 is configured to receive a second trigger signal for initiating second authentication. Further, the controller 201 is configured to receive the second authentication identifier from the display/Human-Machine Interface 202 and compare the received second authentication identifier with a pre-stored authentication identifier stored in the memory 201a. Furthermore, the controller 201 is configured to transmit an affirmation signal to crank engine of the vehicle to start the vehicle when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory.
[0063] In addition to the above mentioned components, an alarm 209 is also provided operatively connected to the controller 201. The controller 201 is configured to actuate the alarm 209 or send a message to the user on registered terminal if the user input incorrect first authentication identifier or second authentication identifier consecutively, more than a predefined number of time.
[0064] FIG. 3 illustrates an exemplary pattern corresponding to the first authentication identifier that can be utilized to implement one or more exemplary embodiments of the present disclosure. The pattern is shown in the form of a chart depicting a pattern of the sequential time dependent pulses. The shown sequential time dependent pulse pattern is formed by three different pulses (namely first pulse, second pulse and third pulse) of varying time period. For instance, the first pulse depicts that the trigger switch/ sensor is pressed for a time period of one second. Gap between the first pulse and the second pulse depicts that the trigger switch/ sensor is released for two seconds. The second pulse depicts that the trigger switch/ sensor is pressed for a time period of two second. Gap between the second pulse and third pulse depicts that the trigger switch/ sensor is then released for a time period of four seconds. The third pulse depicts that the trigger switch/ sensor is pressed for a time period of three seconds. This pattern of sequential time dependent pulses could also be input by the a plurality of switches/ sensors capable of determining discrete motion or distance of the objects like ultrasonic sensors including but not limiting to a parking sensor, or proximity sensor including but not limiting to a kick sensor using gestures.
WORKING OF THE DISCUSSED METHOD AND SYSTEM
[0065] FIG. 4A illustrates an exemplary flow chart showing working of the first authentication in accordance with one of the embodiment of present subject matter. The first authentication is started by activation of pattern activation feature. The pattern can be activated based on certain criteria including but not limited to state of charge of user’s terminal or through a command on user’s terminal or in-vehicle display/Human Machine Interface. If the pattern activation feature is not opted by the user, the accessing and starting of the vehicle is done by using any conventional key based or keyless system. When the pattern activation is opted by the user, a first trigger signal is sent by the user through the activation unit 203 to the controller 201 confirming the intent of the user to unlock the door of the vehicle. On receiving the first trigger signal, the controller 201 activates the display/ Human-machine Interface 202. Subsequently, the first authentication identifier is transmitted to the controller 201 through the activation unit 203. User can see the first authentication identifier inputted by him on the display/Human Machine Interface 202 in real time. The controller 201 compares the pattern corresponding to the first authentication identifier with the pre-stored authentication pattern stored in the memory. The controller 201 sent an affirmation signal to the control unit 204 to unlock the door when the pattern is identical to the pre-stored authentication pattern stored in the memory 201a. In case, the pattern is incorrect, user still get a predefined number of attempts to input the correct first authentication identifier. If the incorrect pattern is inputted by the user consecutively for more than predefined number of times, the controller 201 deletes the pre-stored authentication pattern and inform the user by raising the alarm or by sending a message on the registered terminal 208. Further, the display/ Human-Machine Interface facilitates in recreating the first authorization identifier after successful first authorization.
[0066] FIG. 4B illustrates an exemplary flow chart showing working of the first authentication in accordance with one of the embodiment of present subject matter. The second trigger signal is sent to the controller 201. On receiving the second trigger signal, the controller 201 activates the display/ Human-Machine Interface 202. The second authentication identifier is transmitted from the display/ Human-Machine Interface 202 to the controller 201. The controller 201 compares the received second authentication identifier with the pre-stored authentication identifier stored in the memory 201a. The controller 201 sent an affirmation signal to the control unit 204 to crank the engine when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory 201a. In case, the identifier is incorrect, user still get a predefined number of attempts to input the correct second authentication identifier. If the incorrect pattern is inputted by the user consecutively for more than predefined number of times, the controller 201 informs the user by raising the alarm or by sending a message on the registered terminal 208.
ADVANTAGES
[0067] The present disclosure provides a keyless authorization method and system for accessing and starting a vehicle. The present method and system has two stage authentication. One stage is dedicated to giving access of the vehicle and other stage is dedicated to starting of the vehicle. The present method and system are provided with a provision to display the inputted first authentication identifier in real time. This facilitate the user to detect any shortcoming in the first authentication identifier inputted by the user. The present method and system has provision to delete the first authentication identifier automatically after successful authentication. This enhances the safety of the vehicles and prevent theft. Further, after successful authentication of the user through first authentication, the user can recreate the first authentication identifier using display/HMI.
[0068] The above description does not provide specific details of the manufacture or design of the various components. Those of skill in the art are familiar with such details, and unless departures from those techniques are set out, techniques, known, related art or later developed designs and materials should be employed. Those in the art are capable of choosing suitable manufacturing and design details.
[0069] It should be understood, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. Unless specifically stated otherwise, as apparent from the discussion herein, it is appreciated that throughout the description, discussions utilizing terms such as “receiving,” or “retrieving,” or “comparing,” or “generating,” or the like, refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's registers and memories into other data similarly represented as physical quantities within the computer system memories or registers or other such information storage, transmission or display devices.
[0070] The exemplary embodiment also relates to a system for performing the operations discussed herein. This system may be specially constructed for the required purposes, or it may comprise a general-purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program may be stored in a computer-readable storage medium, such as, but is not limited to, any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, solid state drives, magnetic or optical cards, or any type of media suitable for storing electronic instructions, and each coupled to a computer system bus.
[0071] Further, the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. It will be appreciated that several of the above-disclosed and other features and functions, or alternatives thereof, may be combined into other systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may subsequently be made by those skilled in the art without departing from the scope of the present disclosure as encompassed by the following claims.
[0072] The claims, as originally presented and as they may be amended, encompass variations, alternatives, modifications, improvements, equivalents, and substantial equivalents of the embodiments and teachings disclosed herein, including those that are presently unforeseen or unappreciated, and that, for example, may arise from applicants/patentees and others.
[0073] It will be appreciated that variants of the above-disclosed and other features and functions, or alternatives thereof, may be combined into many other different systems or applications. Various presently unforeseen or unanticipated alternatives, modifications, variations, or improvements therein may be subsequently made by those skilled in the art which are also intended to be encompassed by the following claims.
, Claims:We Claim:
1. A keyless authorization method (100) for accessing and starting a vehicle, the method (100) comprising:
sending (102), to a controller (201), a first trigger signal for initiating first authentication through an authentication unit (203) to confirm intent to unlock door of the vehicle;
activating (104), by the Controller (201), a display/ Human Machine Interface (202)/ lamps/ buzzer present inside/outside the vehicle on receiving the first trigger signal from the authentication unit (203);
sending (106), to the controller (201), a first authentication identifier transmitted from the authentication unit (203) for authentication;
displaying (108) in real time, on a display/ Human Machine Interface (202), a pattern corresponding to the first authentication identifier entered through the authentication unit (203);
comparing (110), by the controller (201), the displayed pattern corresponding to the first authentication identifier with a pre-stored authentication pattern stored in a memory (201a) operatively connected to the controller (201);
transmitting (112), by the controller (201), an affirmation signal to a control unit (204) to unlock the door, when the pattern is identical to the pre-stored authentication pattern stored in the memory (201a);
sending (114), to a controller (201), a second trigger signal for initiating second authentication to confirm intent to drive the vehicle;
sending (116), to the controller (201), a second authentication identifier inputted through the display/ Human Machine Interface (202);
comparing (118), by the Controller (201), the second authentication identifier with a pre-stored authentication identifier stored in the memory (201a) operatively connected to the controller (201); and
transmitting (120), by the controller (201), an affirmation signal to the control unit (204) to crank engine of the vehicle to start the vehicle, when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory (201a).
2. The method (100) as claimed in claim 1, wherein the first authentication identifier includes a sequential time dependent pulses or a gesture based time dependent pulses.
3. The method (100) as claimed in claim 1, wherein the second authentication identifier includes a pattern, login credentials, biometric authentication or an alpha-numeric password.
4. The method (100) as claimed in claim 1, wherein the comparison of pattern corresponding to the first authentication identifier with a pre-stored authentication pattern is performed in real time.
5. The method (100) as claimed in claim 1, wherein when the pattern corresponding to the first authentication identifier is not identical to the pre-stored authentication pattern stored in the memory (201a), consecutively for a predefined number of times, the controller (201) actuate an alarm (209).
6. The method (100) as claimed in claim 1, wherein the pre-stored authentication pattern stored in the memory (201a) is deleted after successful authentication through the first authentication identifier.
7. The method (100) as claimed in claim 1, wherein a new pre-stored authentication pattern is stored in the memory (201a), through the display/ Human Machine Interface (202) after successful authentication through the first authentication identifier.
8. The method (100) as claimed in claim 1, wherein the first pre-stored authentication pattern is stored in the memory (201a) through the display/ Human Machine Interface (202) or a terminal (208).
9. The method (100) as claimed in claim 1, wherein the second trigger signal is sent to the controller (201) by a switch available in the vehicle including seat belt fastened switch or by pressing brakes or accelerator pedal or through a prompt to the user via the in-vehicle display/Human Machine Interface to input the second authentication identifier for starting the vehicle.
10. A keyless authorization system (200) for accessing and starting a vehicle, the system (200) comprises:
an authentication unit (203) configured to transmit a first trigger signal and a first authentication identifier;
a display/Human Machine Interface (202) provided inside the vehicle configured to visually display a pattern corresponding to the first authentication identifier, generate a new first authentication identifier, generate a new authentication identifier and input a second authentication identifier;
a control unit (204) configured to actuate/de-actuate locking mechanism (205) of the vehicle and crank up the engine (207);
a memory (201a) configured to store an authentication pattern, an authentication identifier, and subsequent new authentication patterns and authentication identifiers; and
a controller (201) operatively connected to a memory (201a), the authentication unit (203), the display/Human Machine Interface (202) and the control unit (204), wherein the controller (201) is configured to:
receive, from the authentication unit (203), a first trigger signal for initiating first authentication to confirm intent to unlock the door;
activate a display/ Human Machine interface (202) present inside the vehicle on receiving the first trigger signal from the authentication unit (203);
receive, from the authentication unit (203), a first authentication identifier for authentication;
compare the displayed pattern corresponding to the first authentication identifier with a pre-stored authentication pattern stored in a memory (201a);
transmit an affirmation signal to unlock the door, when the pattern is identical to the pre-stored authentication pattern stored in the memory (201a);
receive a second trigger signal for initiating second authentication to confirm intent to drive the vehicle;
receive, from the display/ Human Machine Interface (202), a second authentication identifier;
compare the second authentication identifier with a pre-stored second authentication identifier stored in the memory (201a) operatively connected to the controller (201);
transmit an affirmation signal, to the control unit (204), to crank engine of the vehicle to start the vehicle, when the second authentication identifier is identical to the pre-stored authentication identifier stored in the memory.
11. The system (200) as claimed in claim 10, wherein the authentication unit (203) comprises:
a trigger switch/ sensor configured to send signal to the controller (201) in the form of first trigger signal and subsequently in the form of sequential time dependent pulses; or
a trigger switch/ sensor or a plurality of switches/ sensors configured to send signal to the controller (201) in the form of first trigger signal and subsequently in the form of gesture based time dependent pulses.
12. The system (200) as claimed in claim 10, wherein the display/ Human Machine Interface (200) is provided with a switch configured to generate a new pre-stored authentication pattern after successful authentication through the first authentication identifier.
13. The system (200) as claimed in claim 10, wherein the controller (201) is further configured to compare the pattern corresponding to the first authentication identifier with a pre-stored authentication pattern in real time.
14. The system (200) as claimed in claim 10, wherein the controller (201) is operatively connected to an alarm (209) which is actuated when the pattern corresponding to the first authentication identifier is not identical to the pre-stored authentication pattern stored in the memory (201a), consecutively, for a predefined number of times.
15. The system (200) as claimed in claim 10, wherein the controller (201) is further configured to delete the pre-stored authentication pattern stored in the memory (201a) after successful authentication through the first authentication identifier.

Documents

Application Documents

# Name Date
1 202211043014-STATEMENT OF UNDERTAKING (FORM 3) [27-07-2022(online)].pdf 2022-07-27
2 202211043014-PROOF OF RIGHT [27-07-2022(online)].pdf 2022-07-27
3 202211043014-FORM 1 [27-07-2022(online)].pdf 2022-07-27
4 202211043014-FIGURE OF ABSTRACT [27-07-2022(online)].pdf 2022-07-27
5 202211043014-DRAWINGS [27-07-2022(online)].pdf 2022-07-27
6 202211043014-DECLARATION OF INVENTORSHIP (FORM 5) [27-07-2022(online)].pdf 2022-07-27
7 202211043014-COMPLETE SPECIFICATION [27-07-2022(online)].pdf 2022-07-27
8 202211043014-FORM-26 [04-10-2022(online)].pdf 2022-10-04
9 202211043014-FORM 18 [16-11-2022(online)].pdf 2022-11-16
10 202211043014-RELEVANT DOCUMENTS [24-06-2024(online)].pdf 2024-06-24
11 202211043014-POA [24-06-2024(online)].pdf 2024-06-24
12 202211043014-FORM 13 [24-06-2024(online)].pdf 2024-06-24
13 202211043014-FER.pdf 2025-07-01
14 202211043014-FORM 3 [27-09-2025(online)].pdf 2025-09-27
15 202211043014-FORM-8 [27-10-2025(online)].pdf 2025-10-27

Search Strategy

1 202211043014_SearchStrategyNew_E_202211043014_SearchStrategyE_26-06-2025.pdf