Sign In to Follow Application
View All Documents & Correspondence

A Method And System For Detecting Unauthorized Access To A Vehicle

Abstract: ABSTRACT A METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO A VEHICLE Electric vehicles comprise various types of entry processes namely, key based or keyless. However, physical key is prone to theft. Therefore, to avoid theft a system comprising a cloud server 101, a user device 102, a TCU 103, a keyless entry system 104, a battery unit 105 is required. The TCU 103 detects the changes in the 12V line and if the keyless entry is not used then the TCU 103 sends a ‘vehicle key use detected’ alert to the cloud server 101. The cloud server 101 checks whether the vehicle is authorized for physical key use. If the vehicle is not authorized then it generates ‘unauthorized access’ alert and alerts the fleet manager and vehicle user. [to be published with Figure 2]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
30 December 2021
Publication Number
47/2022
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2023-05-29
Renewal Date

Applicants

NUMEROS MOTORS PRIVATE LIMITED
No.58, 15th cross, 2nd phase JP Nagar, Bengaluru-560078, India.

Inventors

1. Ponlingam Ponratnam
No.58, 15th cross, 2nd phase JP Nagar, Bengaluru-560078
2. Omar Ibrahim Hussain M
No.58, 15th cross, 2nd phase JP Nagar, Bengaluru-560078

Specification

DESC:FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003

COMPLETE SPECIFICATION

(See Section 10 and Rule 13)

Title of invention:
A METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO A VEHICLE
APPLICANT:
Micelio Motors Private limited.
An Indian entity Having Address:
No.58, 15th cross, 2nd phase JP Nagar, Bengaluru-560078

The following specification describes the invention and the manner in which it is to be performed.


TECHNICAL FIELD
The present disclosure relates to accessing a vehicle, and more particularly to a method and system for detecting unauthorized access to a vehicle.

BACKGROUND
The subject matter discussed in the background section should not be assumed to be prior art merely as a result of its mention in the background section. Similarly, a problem mentioned in the background section or associated with the subject matter of the background section should not be assumed to have been previously recognized in the prior art. The subject matter in the background section merely represents different approaches, which in and of themselves may also correspond to implementations of the claimed technology.

The conventional way of using a key to access the vehicle had several security limitations including the possibility of duplicating the key. To overcome such limitation mechanical keys were equipped with digital coder and the lock with decoders. However, the two major drawbacks of the proposed solution were the expensive cost involved in replacing the key and lock in case the key was lost, and the other being copying of the key along with the digital code. The mechanical key with the digital coder for vehicles also affected the managing the vehicles in fleet, since each vehicle came with two keys only.

To overcome the limitation touchpad or keypad enabled locking and unlocking of the vehicles was proposed. However, enabling the vehicle with touchpad or keypad technologies increases cost of vehicle unit and ease of access is also compromised in case of forgetting password/code. Though the keypad or touchpad now have internet connectivity for ease of resting of the passcode, but lack of internet service at few locations or corruption due to malware attack also affects the access to the vehicle.

Thus, it is required that electric vehicle with fool proof security where combination of various access methods is used along with mechanical key use. Also, if methods which continuously require internet connectivity fail then key based access with prior authorization to ensure security of vehicle is required.

Therefore, there is a long-felt need for a for checking unauthorized access and generate alert, that can ensure security of electric vehicle unit and constantly monitor the electric vehicle and ensure only authorized user gets the access.

SUMMARY
This summary is provided to introduce concepts related to a method and system for detecting unauthorized access in an electric vehicle and alert system and the concepts are further described below in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter.

In an implementation of the present disclosure a system for determining unauthorized access and generating alert is disclosed. The system may comprise a cloud server, a user device with mobile application, a telematics control unit (TCU), a battery unit, a keyless entry system, a DC-DC converter, a keylock and vehicle peripherals. The system in accordance with the embodiment is configured to detect a key in the keylock of the vehicle. Further the upon detection of the key, the TCU may send a signal to verify if the key has been granted access. In case of failure of the verification, an alert is sent to another device notifying unauthorized access.

In an implementation of the present disclosure a method for determining unauthorized access and generating alert is disclosed. The method for determining unauthorized access and generating alert comprising detecting presence of voltage in the voltage lines and checking whether keyless entry is used or not to access the vehicle if not generating ‘key use detected’ alert and communicating the same to the cloud server. Further the cloud server checks whether the key use is authorized for that particular vehicle or the person. Further if the key use is not allowed then ‘unauthorized access’ alert is generated.

BRIEF DESCRIPTION OF DRAWINGS
The detailed description is described with reference to the accompanying Figures. In the Figures, the left-most digit(s) of a reference number identifies the Figure in which the reference number first appears. The same numbers are used throughout the drawings to refer like features and components.

Figure 1 illustrates a system for generating unauthorized access alert, in accordance with an embodiment of the present subject matter.

Figure 2 illustrates a method for generating vehicle key detection alert, in accordance with an embodiment of the present subject matter.

Figure 3 illustrates a method for generating unauthorized access alert, in accordance with an embodiment of the present subject matter.

Figure 4 illustrates a circuit used for detecting key use, in accordance with an embodiment of the present subject matter.

DETAILED DESCRIPTION
Reference throughout the specification to “various embodiments,” “some embodiments,” “one embodiment,” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, appearances of the phrases “in various embodiments,” “in some embodiments,” “in one embodiment,” or “in an embodiment” in places throughout the specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner in one or more embodiments.

A Telematics Control Unit (TCU) in the present disclosure may be called as overboard telematics control (OTC) or Electronic Control Unit (ECU). The TCU in accordance with the present disclosure refers to microprocessor enabled controlled circuit configured to capture, control and communicate various information and functions pertaining to a vehicle.

A system for generating unauthorized access alert as disclosed in the present embodiment may comprise a cloud server, a user device with mobile application, a telematics control unit (TCU), a battery unit, a keyless entry system, a DC-DC converter, and a keylock.

Further in another accordance with another embodiment a method for determining unauthorized access and generating alert is disclosed. The method as disclosed may comprise detecting presence of voltage in the voltage lines and checking whether keyless entry is used or not, to access the vehicle. In case key is detected for accessing the vehicle an alert and notification is sent to the cloud server.

Further the cloud server checks whether the key use is authorized for that particular vehicle or the person. Further if the key use is not allowed then ‘unauthorized access’ alert is generated.

Now referring to figure 1, a system for generating unauthorized access alert (100-a) is disclosed, the system for generating unauthorized access may comprise a cloud server 101 configured to remotely communicate with a vehicle and a user device 102. Further, the exemplary embodiment may comprise a telematics control unit (here onwards TCU) 103 configured to control the vehicle and communicate with the user device 102 and the cloud server 101. Further, the exemplary device may comprise a keylock 107 configured to control the vehicle ignition and voltage line.

Now referring to figure 2, another exemplary embodiment is disclosed. In another exemplary embodiment, the system may comprise a cloud server 101. The cloud server 101 may be remote server communicably connected and accessible via internet. The exemplary embodiment may further comprise a user device 102. The user device 102 may be in communication with the cloud server 101. The user device 102 may comprise an application embedded into the user device 102 enabling communication with the cloud server 101 and the vehicle. The user device 102 may further be configured to receive information about the vehicle location, vehicle battery status, information about nearby charging stations and information crucial for vehicle security.

The vehicle according to the exemplary embodiment may further comprise a telematics control unit (TCU) 103. The TCU 103 is in communication with the cloud server 101 and the user device 102 through cloud server 101 or directly. The TCU 103 may use communication means like MQTT protocol or WiFi or internet to communicate with the cloud server 101. The TCU 103 may receive voltage signals from all the components of vehicle through 12 V voltage peripheral lines. The keyless entry system may be a keypad, an encoder-decoder, a Barcode, a biometric, a voice recognition system or any other system based on the customer requirements. The keyless entry may further comprise a scanner to scan the barcode or RFID or QR code.

The TCU 103 may communicate with the user device 102 directly or via the cloud server 101. In one embodiment the cloud server 101 may be equipped with a database configured to contain a register of all vehicles in the fleet, key use requests and all other vehicle and client related information.

The vehicle according to present the embodiment may further comprise a battery unit 105. The battery unit 105 may be removable or fixed on the vehicle based on the customer and fleet requirements. The exemplary embodiment may further comprise a DC-DC converter 106. The DC-DC converter 106 may convert the voltage received from the battery unit 105 to a desired level of voltage required to run the electric vehicle and other components mounted on the electric vehicle. The exemplary embodiment may further comprise a keylock 107. The keylock 107 controls the output of the DC-DC Converter 106 (48V to 12V).

In an embodiment, the system (100) may further comprise vehicle peripherals 108. The vehicle peripherals may be powered by voltage received from DC-DC converter 106.

Now referring to figure 3, a method for generating an alert for detection of key use (200) is disclosed. In accordance with the embodiment, at step 201 and step 203 the TCU 103 may be configured continuously detect presence of 12 V in a peripheral line of the vehicle. At step 203 the TCU 103 may be further configured to determine if the vehicle was accessed using a keyless entry or by using a key. If the TCU 103, determines the vehicle was accessed using keyless entry then no action is taken by the TCU 103 at step 204. In case at step 204 the TCU 103 detects use of a key to access the vehicle, at step 205 the TCU 103 is configured to generate an alert and send the alert to a cloud server 101. The alert message received by the cloud server may alert the fleet manager or a user about detecting a key use for accessing the vehicle.

Now referring to Figure 4, a method for determining unauthorized access (300) is disclosed. In accordance with the exemplary embodiment, at step 301 and step 302 the cloud server 101 may receive a notification or message from the vehicle acknowledging the use of the key to access the vehicle. Once the notification is received by the cloud server 101 from the TCU 103, the cloud server 101 validates and authenticates if the access by the key was approved or not at step 303. In case the authentication fails the remote server 101 alerts the user or fleet manager of ‘unauthorized access’ by creating an alert or notification to gain the attention of the user or the fleet manager at step 305.

In case the use of the key was authenticated then at step 305 no alert or notification is generated. The alert may be in form of a sound, or a visual notification, or both. In another exemplary embodiment of the present disclosure the TCU 103, may further be configured to track and record each instance the bike is accessed by the key and send the same to the remote server 101 to compare and understand the number of instances issued by the TCU 103, wherein the instances issued by the TCU 103 depend on the request made by the rider or another user.

In one embodiment, the cloud server 101 may send the ‘unauthorized access’ alert to a control room configured to control the entire operation of the vehicle fleet. In another embodiment, the cloud server may send the ‘unauthorized access alert’ to the user device 102 to alert the vehicle user or client.

Now referring to figure 5, a circuit 400 is disclosed. The circuit 400 comprises a TCU 103 configured to control and monitor the vehicle components and vehicle peripherals. The exemplary embodiment may further comprise a keyless entry system 104. Further, the keyless entry system 104 may be in communication with the TCU 103. A relay 403 is controlled by TCU 103. The exemplary embodiment may further comprise a keylock 107 where the keylock 107 is in parallel to the relay control 403 controls. Once the key is inserted in the keylock 107 the TCU 103 detects the voltage on the voltage peripheral line. The exemplary embodiment may further comprise a battery unit 405 where the battery supplies 48 V power to the system. The exemplary embodiment may further comprise DC-DC converters 406 and 407. The output of the DC-DC converter 406, 407 may be controlled by the keylock 107.

In one embodiment, the vehicle may comprise any number of battery units and any number of DC-DC converters based on the power requirements of various modules in the vehicle. In one embodiment, the vehicle may comprise single DC-DC converter 406 for requirements of power and peripherals.

Further, the exemplary embodiment may comprise a motor controller 408, configured to control a motor 409. Further, one embodiment may comprise an ignition circuit 411 configured to send signal to the motor controller 408. Further, another embodiment may comprise a kill switch 410, configured to control connection between battery and the ignition circuit.

In one embodiment the key based access is given only for pre-determined time or time based on agreement between fleet manager and user. The fixed time is then fed into the TCU 103. The TCU 103 may consist a timer which maintains the record of time consumption. After the pre-determined time period is finished the vehicle will not be accessible through mechanical key until the agreement is renewed.

In another embodiment the key based access is given for fixed time period and the vehicle user is requested to generate a pass code only for specific vehicle and fixed time. The pass code is then saved into the TCU 103 memory. After the fixed time is finished the vehicle will not be accessible until the agreement is renewed and pass code is changed.

In yet another embodiment the key may have bar code or encoder and decoder or magnetic strip which will be recognised by the scanner module on the vehicle. Only such key which is allowed by scanner module will be allowed to use on the vehicle.
The embodiments illustrated above, especially related to the method and system for detecting unauthorized access in an electric vehicle and alert system provide following technical advancements:
• Security of vehicle
• Overriding power to the controller or the user of vehicle in emergency.
• Constant monitoring and surveillance of vehicle etc.
• Communication between vehicle user and the room.

Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure is not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.

The foregoing description shall be interpreted as illustrative and not in any limiting sense. A person of ordinary skill in the art would understand that certain modifications could come within the scope of this disclosure.
The embodiments, examples and alternatives of the preceding paragraphs or the description and drawings, including any of their various aspects or respective individual features, may be taken independently or in any combination. Features described in connection with one embodiment are applicable to all embodiments, unless such features are incompatible.
,CLAIMS:WE CLAIM:
1. A method (200) for generating alert on detection of key use for the vehicle, the method comprises:
sensing, voltage change in peripheral line 202, by a TCU 103;
detecting, presence of key for accessing the vehicle by the TCU 103; and
sending a notification message to a cloud server 101.
2. The method (200) as claimed in claim 1, further comprises receiving a notification from the cloud server 101 in case un-authorised access to the vehicle by the key is detected.
3. A method (300) for detecting ‘unauthorized access’ alert comprises:
receiving a notification from a vehicle TCU 103, by a cloud server 101;
verifying in a database for pre-authorization for a key access for the vehicle; and
generating alert in case no authorization is requested.
4. The method as claimed in claim 3, further comprises every instance is stored in the cloud server whenever the vehicle is accessed using the key.
5. A system (100) for generating unauthorized access alert comprises:
a cloud server 101, wherein the cloud server 101 communicably connected and accessible via internet;
a user Device 102, wherein the user device 102 is configured to communicate with the cloud server 101 through a mobile application;
a telematics control unit (TCU) 103, wherein the TCU 103 is configured to communicate with the cloud server 101 and the user device 102;
a keylock 107, wherein the keylock 107 is configured to control the output of the DC-DC Converter 106 and start the vehicle.
6. The system (100) as claimed in claim 5 comprises:
a keyless entry system 104, wherein the keyless entry system 104 is configured to communicate with the TCU 103;
a battery unit 105, wherein the battery unit 105 is configured to provide power to the vehicle;
a DC-DC converter 106, wherein the DC-DC converter in configured to convert the voltage received from the battery unit 105;
vehicle Peripherals 108, wherein the vehicle peripherals 108 run on the voltage received from the DC-DC converter 106.
7. The system (100) as claimed in claim 5, wherein the user device 102 configured to receive information about the vehicle location, vehicle battery status, information about nearby charging stations and information crucial for vehicle security.
8. The system (100) as claimed in claim 5, wherein the TCU 103 is configured to communicate with the user device 102 directly or through the cloud server 101.
9. The system (100) as claimed in claim 5, wherein the TCU 103 configured to use communication means like MQTT protocol or WiFi or internet to communicate with the cloud server 101.
10. The system (100) as claimed in claim 5, wherein the keyless entry system (104) is a keypad, an encoder-decoder, a Barcode or any other system based on the customer requirements.
11. The system (100) as claimed in claim 5, wherein the keyless entry system 104 comprises a scanner to scan the barcode or RFID or QR code.
12. The system (100) as claimed in claim 5, wherein the TCU 103 receive voltage signals from all the components of vehicle through 12 V voltage peripheral lines.
13. The system (100) as claimed in claim 5, wherein the key based access is given only for pre-determined time or time based on agreement between fleet manager and user. The fixed time is then fed into the TCU 103.
14. A circuit (400) for detecting key use comprises:
A telematics control unit (TCU) 103, wherein the TCU 103 is configured to control and monitor the vehicle components and vehicle peripherals;
A keyless entry system 104, wherein the keyless entry system is in communication with the TCU 103;
A relay control 403 is controlled by TCU 103;
A keylock 107, wherein the keylock 107 is in parallel to the relay 403 controls;
Once the key is inserted in the keylock 107 the TCU 103 detects the voltage on the voltage peripheral line.
15. The circuit (400) as claimed in claim 14 comprises:
A battery unit 405, wherein the battery supplies 48 V power to the system;
DC-DC converters 406 and 407, wherein the output of the DC-DC converters 406 and 407 is controlled by the keylock 107;
A motor controller 408, configured to control a motor 409;
An ignition circuit 411, configured to send signal to the motor controller 408;
A kill switch 410, configured to control connection between battery and the ignition circuit.

Dated this 30th day of December 2021

Priyank Gupta
Agent for the Applicant
IN/PA-1454

Documents

Application Documents

# Name Date
1 202141061872-STATEMENT OF UNDERTAKING (FORM 3) [30-12-2021(online)].pdf 2021-12-30
2 202141061872-PROVISIONAL SPECIFICATION [30-12-2021(online)].pdf 2021-12-30
3 202141061872-OTHERS [30-12-2021(online)].pdf 2021-12-30
4 202141061872-FORM FOR STARTUP [30-12-2021(online)].pdf 2021-12-30
5 202141061872-FORM FOR SMALL ENTITY(FORM-28) [30-12-2021(online)].pdf 2021-12-30
6 202141061872-FORM 1 [30-12-2021(online)].pdf 2021-12-30
7 202141061872-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [30-12-2021(online)].pdf 2021-12-30
8 202141061872-DRAWINGS [30-12-2021(online)].pdf 2021-12-30
9 202141061872-Proof of Right [03-03-2022(online)].pdf 2022-03-03
10 202141061872-FORM-26 [03-03-2022(online)].pdf 2022-03-03
11 202141061872-ENDORSEMENT BY INVENTORS [29-03-2022(online)].pdf 2022-03-29
12 202141061872-DRAWING [29-03-2022(online)].pdf 2022-03-29
13 202141061872-CORRESPONDENCE-OTHERS [29-03-2022(online)].pdf 2022-03-29
14 202141061872-COMPLETE SPECIFICATION [29-03-2022(online)].pdf 2022-03-29
15 202141061872-FORM 18 [30-03-2022(online)].pdf 2022-03-30
16 202141061872-RELEVANT DOCUMENTS [26-08-2022(online)].pdf 2022-08-26
17 202141061872-POA [26-08-2022(online)].pdf 2022-08-26
18 202141061872-MARKED COPIES OF AMENDEMENTS [26-08-2022(online)].pdf 2022-08-26
19 202141061872-FORM 13 [26-08-2022(online)].pdf 2022-08-26
20 202141061872-AMENDED DOCUMENTS [26-08-2022(online)].pdf 2022-08-26
21 202141061872-FORM FOR SMALL ENTITY [06-09-2022(online)].pdf 2022-09-06
22 202141061872-EVIDENCE FOR REGISTRATION UNDER SSI [06-09-2022(online)].pdf 2022-09-06
23 202141061872-MSME CERTIFICATE [18-11-2022(online)].pdf 2022-11-18
24 202141061872-FORM28 [18-11-2022(online)].pdf 2022-11-18
25 202141061872-FORM-9 [18-11-2022(online)].pdf 2022-11-18
26 202141061872-FORM 18A [18-11-2022(online)].pdf 2022-11-18
27 202141061872-FER.pdf 2022-12-14
28 202141061872-OTHERS [09-01-2023(online)].pdf 2023-01-09
29 202141061872-FER_SER_REPLY [09-01-2023(online)].pdf 2023-01-09
30 202141061872-DRAWING [09-01-2023(online)].pdf 2023-01-09
31 202141061872-COMPLETE SPECIFICATION [09-01-2023(online)].pdf 2023-01-09
32 202141061872-US(14)-HearingNotice-(HearingDate-20-04-2023).pdf 2023-02-07
33 202141061872-Correspondence to notify the Controller [03-04-2023(online)].pdf 2023-04-03
34 202141061872-Annexure [03-04-2023(online)].pdf 2023-04-03
35 202141061872-Correspondence to notify the Controller [14-04-2023(online)].pdf 2023-04-14
36 202141061872-Written submissions and relevant documents [28-04-2023(online)].pdf 2023-04-28
37 202141061872-PatentCertificate29-05-2023.pdf 2023-05-29
38 202141061872-IntimationOfGrant29-05-2023.pdf 2023-05-29

Search Strategy

1 202141061872E_14-12-2022.pdf

ERegister / Renewals

3rd: 19 Jun 2023

From 30/12/2023 - To 30/12/2024

4th: 26 Nov 2024

From 30/12/2024 - To 30/12/2025