Abstract: The present disclosure discloses a method (200) of authenticating a user for accessing and starting of automobiles securely. The method (200) comprises sending (205) a request by a user device (130) for access of an automobile (160). The method further comprises generating (210), by a system (105), a digital signature-based authentication token. The method further comprises transmitting (210), by the system (105), the authentication token to the user device (105) and user device intern transmitting (215) the same to an electronic management module (161) of the automobile when it comes in proximity of the automobile. The method further comprises authenticating, by the electronic management module (161), the authentication token of the user device. Once authenticated, the electronic management module manages a relay contact with an ignition start of the automobile there by providing secure access to the user to start the automobile [To be published with FIG. 3]
Claims:WE CLAIM:
1. A method (200) of authenticating a user for accessing and starting the automobiles securely, the method comprises:
sending (205), by a user device (130), details of automobile, which a user of the user device (130) wishes to use, wherein the details include identity of the user device, duration of access, booking time, identity/identities of an electronic management module (161) of an automobile (160);
generating (210), by a system (105), an access token based on the details received from the user device (130);
transmitting (210), by the system (105), the access token to the user device (130) using long-range communication protocols;
transmitting (215), by the user device (130), the data to the electronic management module (161) using short range wireless protocol; and
authenticating (220), by the electronic management module (161), the access token of the user device (130) when the user device (161) comes in proximity to the automobile (160) to manage a relay contact with an ignition start of the automobile (160) there by providing secure access (225) to the user to start the automobile.
2. The method (200) as claimed in claim 1, wherein the access tokens generated are used one time or repeatedly for a period of time.
3. The method (200) as claimed in claim 1, wherein the access token comprises raw data and secret header signed using a digital signature algorithm, wherein the algorithm includes one of Rivest–Shamir–Adleman (RSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), wherein when RSA is used for signature, the public key cryptography technique is used, wherein FIPS140-2 compliant HSM keys are used for signature generation and verification.
4. The method (200) as claimed in claim 1, further comprises disabling the access to starter relay and to a powertrain control module when the authentication fails, or illegal access is detected with the physical key.
5. The method (200) as claimed in claim 1, wherein the raw data received at the automobile is decrypted to verify details of the request including identities and validity of access token.
6. An automobile (160) authenticating and providing secure access to a user, the automobile (160) comprising:
an electronic management module (161), coupled to a relay contact (170), an ignition switch(165) and a powertrain control module (175) of the automobile (160), wherein the electronic management module receives encrypted raw data from a system,
wherein the electronic management module (161) is configured to provide access to a user of a user device (130) when the user device (130) comes in proximity to the automobile (160), wherein the electronic management module (161) authenticates the identities and validity of an access token contained in the user device (130), wherein the electronic management module (161) manages the relay contact with the ignition start of the automobile(160) based on the authentication thereby providing secure access to the user to start the automobile (160).
7. The automobile (160) as claimed in claim 6, wherein the electronic management module (161) is preinstalled in the automobile (160).
8. The automobile (160) as claimed in claim 6, wherein the access tokens generated are used one time or repeatedly for a period of time.
9. The automobile (160) as claimed in claim 6, wherein the electronic management module (161) is configured to disable access to the starter relay using relay contacts or power train control module when the authentication fails, or illegal access is detected using physical key.
10. The automobile (160) as claimed in claim 6, wherein the electronic management module (161)decrypts raw data received from the system (105) to verify details of the request including identities and validity of the access token.
, Description:A METHOD OF AUTHENTICATING A USER FOR ACCESSING AND STARTING OF AN AUTOMOBILE
FIELD OF INVENTION
[01] The present disclosure relates to a field of providing secure access and secure start for users to use automobiles, etc. More particularly, the present disclosure relates to methods of providing secure authentication to users for using an automobile.
BACKGROUND
[02] With increase in use of technology, the automobiles are provided with RF (radio frequency) key fobs, which allow a user of the automobile to access the automobile. As known, the key fobs can be used to lock or unlock the automobile from a distance. The key fobs generally Radio Frequency signals to communicate with the automobile to perform the intended functions.
[03] Automobiles are expensive, every year; millions of expensive automobiles are stolenby stealing the physical keys. As known, vehicles keys are provided with RF key fobs for locking and unlocking the vehicle. It should be understood that the RF key fobs used today are prone to relay attacks. The relay attack may indicate an attack in which attacker pretends to be the vehicle and steals the key fob digital key and pretends as a key fob to lock/unlock/start the vehicle.
[04] With increased use of vehicles by rental companies and vehicle sharing facilities, new models of sharing the access to the users are emerging. For instancesmart cards are being used for providing access to the vehicle, remotely unlocking the vehicle from cloud among others.As such, these sharing models needs a secured way of protecting the vehicles from unauthorized access.
[05] Further, there exists GSM based solutions, which try to unlock and cut off vehicle start remotely. However, they are extremely vulnerable for attacks as anyone who understand the mobile communication can intercept the data over air and manipulate the data. Also, GSM based solution will not work at the places where there is no network coverage like basement areas.Further, the GSM solution consumes lot of battery energy to the tune of few 100+mA continuously and then couple of amperes during data exchange.
[06] Therefore, there is a need to provide a system and a method for operating an automobile securely, which overcomes the problems of the prior art.
SUMMARY
[07] The problems in the existing art are met by aproposedmethod of authenticating a user for accessing automobiles securely using a user device. The user device is an electronic device such as a mobile phone, smart watch or any other wearable/handheld device which implements long range internet connectivity hardware and protocols and shortrange wireless hardware and protocols like Bluetooth Low Energy, WIFI, NFC, Soundwave etc.,
[08] In one implementation, a method of authenticating a user for accessing automobiles securely is disclosed. The method comprises sending, by a user device, details of automobile, which a user of the user device wishes to use. The details include identity of the user device, duration of access, booking time, identity/identities of the electronic module likehardware serial number, vehicle number, and VIN(Vehicle Identity Number) number etc., The method further comprises generating, by a system, an access token based on the details received from the user device. The method further comprises transmitting, by the system, the access token to the user device using the long-range GSM/LTE network protocols or WIFI protocols anduser device intern transmitting the data to an electronic management module of the automobile using short range wireless protocol like Bluetooth Low Energy. The method further comprises authenticating, by the electronic management module, the access token of the user device when the user device comes in proximity to the automobile. The electronic management module authenticates the access token and manages a relay contact with an ignition start of the automobile thereby providing secure access to the user to start the automobile.
BRIEF DESCRIPTION OF FIGURES
[09] In the following drawings like reference numbers are used to refer to like elements. Although the following figures depict various examples of the disclosure, and the disclosure is not limited to the examples depicted in the figures.
[010] FIG. 1 illustrates an environment illustrating a system, and a user device used for accessing automobile securely, in accordance with one embodiment of the present disclosure;
[011] FIG. 2, 3, 5, 6 and 7 illustrate controlling a relay switch to facilitate access for operating the automobile, in accordance with one embodiment of the present disclosure; and
[012] FIG. 4 illustrates a method of authenticating a user for accessing automobiles securely, in accordance with one embodiment of the present disclosure.
DETAILEDDESCRIPTION
[013] The following detailed description is intended to provide example implementations to one of ordinary skill in the art, and is not intended to limit the disclosure to the explicit disclosure, as one of ordinary skill in the art will understand that variations can be substituted that are within the scope of the disclosure as described.
[014] The present disclosure discloses a method of authenticating a user for accessing and starting of automobiles securely. The method comprises sending, by a user device, details of automobile, which a user of the user device wishes to use. The details include identity of the user device, duration of access, booking time, identity/Identities of the electronic module likehardware serial number, vehicle number, and VIN number etc.,The method further comprises generating, by a system, an access token based on the details received from the user device. The method further comprises transmitting, by the system, the access token to the user device using the long-range GSM/LTE network protocols or WIFI protocols and user device intern transmitting the data to an electronic management module of the automobile using short range wireless protocol like Bluetooth Low Energy. The method further comprises authenticating, by the electronic management module, the access token of the user device when the user device comes in proximity to the automobile. The electronic management module authenticates the access token and manages a relay contact with an ignition start of the automobile there by providing secure access to the user to start the automobile.
[015] Various embodiments of the present disclosure are explained with the help of FIGs 1-7.
[016] Referring to FIG. 1, an environment 100 of a system 105 for accessing automobiles securely is illustrated, in accordance with which various embodiments of the invention. The environment 100 includes the system 105. It should be understood that the system 105 might include a server or a database comprising an application to execute functions for facilitating secure access. Further, it must be understood that the system 105 may be implemented in any different computing systems, environments, and/or configurations such as a workstation, an electronic device, a mainframe computer, a laptop, and so on.
[017] The system 105 comprises at least one first processor 110, a first memory 115 and a first Input/output (I/O) Interface 120. The at least one first processor 110 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one first processor 110 is configured to fetch and execute computer-readable instructions stored in the first memory 115.
[018] The first memory 115 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[019] The first I/O interface 120 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The first I/O interface 120 may allow the system 105 to interact with other electronic devices. The first I/O interface 120 may facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite. The first I/O interface 120 may include one or more ports for connecting a number of devices to one another.
[020] The system 105 is communicatively coupled to a user device 130 via a first network 125. The user device 130 may include, but not limited to, a mobile phone, a tablet, a wrist watch, a wrist band, and so on. The user device 130 may comprise a processor (not shown), a memory (not shown), and a transceiver (not shown), capable of communicating with the system 105to perform various tasks.
[021] In one implementation, the first network 125 may be a wireless network, a wired network or a combination thereof. The first network 125 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The first network 125 may either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the first network 125 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[022] The user device 130 may comprise at least one second processor 135, a second memory 140, a second Input/output (I/O) Interface 145 and a transceiver 150.
[023] The at least one second processor 135 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one second processor 135 is configured to fetch and execute computer-readable instructions stored in the second memory 140.
[024] The second memory 140 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes.
[025] The second I/O interface 145 may include a variety of software and hardware interfaces, for example, a web interface, a graphical user interface, and the like. The second I/O interface 145 may allow the user device 130 to interact with the system 105. The second I/O interface 145 may facilitate multiple communications within a wide variety of networks and protocol types, including wired networks, for example, LAN, cable, etc., and wireless networks, such as WLAN, cellular, or satellite. The second I/O interface 145 may include one or more ports for connecting a number of devices to one another.
[026] The transceiver 150 may be used to send or receive communications from other devices such as the system 105 and automobiles160.
[027] The automobiles 160 may include but not limited to cars, buses, trucks and so on. As can be seen, the automobile 160 is communicatively coupled to the user device 130 via a second network 126. The second network 126 may indicate a network in which two devices are communicatively coupled using short range communication (wired or wireless) protocols which includes but not limited to a Bluetooth Low Energy, Bluetooth, WIFI, Li-Fi, infrared and so on.
[028] The automobile 160 may further comprise an electronic management module 161 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. In one example, the electronic management module 161 may also include an inbuilt memory similar to that of a microcontroller. Further, the vehicle 160 may include a second transceiver 162 capable ofsending or receiving data from the vehicle 160 to the user device 130 via the second network 126. In one example, the second transceiver 162 may transmit the data over short range wireless communication and may comprise one of the Bluetooth Low Energy, Bluetooth, WIFI, Li-Fi, infrared and so on.
[029] The system 105 and the user device 130 are configured to access the automobile160 securely such that the theft or unauthorized use of the automobile 160 can be avoided.
[030] In order to avoid theft or unauthorized use of the automobile 160, at first, the user of the user device 130 may be registered with the system 105. The user may register him/her with the system 105 by providing name, email ID, phone number, login details and so on.
[031] Upon receiving the details of the user, the system 105 stores the details of the user. Further, the system 105 receives details of the automobile 160. The system 105 may receive details of the automobile 160 such as type of vehicle, engine number, vehicle registration number, location of the automobile 160 and so on.
[032] As known, the automobile 160 may have an ignition switch165, a starter relay 170 and a starting system or powertrain control module 175. The automobile 160 comprisingthe electronic management module 161, which is used to provide access to the automobile 160. The electronic management module161 is configured with a unique identity or multiple identities. The electronic management module161 is configured using cryptography algorithms, which comprise signature, hash verification algorithms, encryption/decryption algorithms.
[033] When the user wishes to use particular automobile 160, the user may raise a request using the user device 130to the system 105. The user devicemay provide details such as identity of the device, duration of access, booking time, identity/Identities of the electronic module, an access ID, vehicle number, and so on.
[034] After receiving the access requestfrom the user device 130, the system 105 may generate access tokens to work one time or repeatedly for a period to access the automobile 160. The access tokens are generated based on a digital signaturealgorithm. In one implementation, the digital signature algorithms such as RSA, ECDSA etc. may also be used
[035] It should be understood that before this process, Public and Private Key Pair need to be generated and managed. The private key is stored such a way that no one has access to the key. The key may to be stored and managed as per FIPS 140-2 standard in HSM (Hardware Security Module) memory. Pubic key is stored securely in electronic management module’s flash memory. The method of storing key securely is described in another patent.The minimum key size is recommended is 2048bit. The access token consists of raw and data and digital signature that is generated using raw data and secret header.
1. Signature = Hash & Sign (Header.Raw Data)
2. Token = Encrypt (Raw Data). Signature
[036] After generating the access token, the system 105 sends the data to user device 130. User device 130 intern sends the data tothe automobile 160when it comes in the proximity ofautomobile 160.Upon receiving the data, the electronic management module of the automobile 160 decrypts the raw data. Subsequently, the electronic management module adds header secret to the raw data. Further, the electronic management module adds hash values to the header raw data. Further, the electronic management module verifies the signature using the hash and the signature.
1. Decrypt (Raw Data)
2. Add Header Secret to Raw Data
3. Hash (Header.Raw Data)
4. Verify Signature (Hash, Signature)
[037] It should be noted that signature verification is done using corresponding public key which is stored securely in electronic management module’s flash memory or SHE (Secured Hardware Extension) module.
[038] Also, it should be noted that the key that is used for encryption of data is different than the keys that used for signature generation and verification. The encryption keys are to be derived from signature data dynamically. The algorithm used for generation of encryption keys is known to system 105 and electronic management module and not covered as part of this patent application.
[039] In addition to signature verification, the electronic management module verifies the identities and validity of access token. For example, the electronic management module verifies the unique identity and/or multiple identities. Further, the electronic management module verifies validity of access like start time and end.
[040] The digital token is transmitted from user device 130 to electronic management module 161 of automatable 160 when user device comes in proximity of the automobile using low energy short range network like Bluetooth Low Energy. The low energy network ensures that the electronic management module 161 consumes very less power and doesn’t drain the battery of automobile in idle condition.
[041] Below table provides the example of data in Jason and Base64 URL formats.
RSA Public Key
(in base64URL format) MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDdlatRjRjogo3WojgGHFHYLugdUWAY9iR3fy4arWNA1KoS8kVw33cJibXr8bvwUAUparCwlvdbH6dvEOfou0/gCFQsHUfQrSDv+MuSUMAe8jzKE4qW+jK+xQU9a03GUnKHkkle+Q0pX/g6jXZ7r1/xAK5Do2kQ+X5xK9cipRgEKwIDAQAB
RSA Private Key
(in base64URL format) MIICWwIBAAKBgQDdlatRjRjogo3WojgGHFHYLugdUWAY9iR3fy4arWNA1KoS8kVw33cJibXr8bvwUAUparCwlvdbH6dvEOfou0/gCFQsHUfQrSDv+MuSUMAe8jzKE4qW+jK+xQU9a03GUnKHkkle+Q0pX/g6jXZ7r1/xAK5Do2kQ+X5xK9cipRgEKwIDAQABAoGAD+onAtVye4ic7VR7V50DF9bOnwRwNXrARcDhq9LWNRrRGElESYYTQ6EbatXS3MCyjjX2eMhu/aF5YhXBwkppwxg+EOmXeh+MzL7Zh284OuPbkglAaGhV9bb6/5CpuGb1esyPbYW+Ty2PC0GSZfIXkXs76jXAu9TOBvD0ybc2YlkCQQDywg2R/7t3Q2OE2+yo382CLJdrlSLVROWKwb4tb2PjhY4XAwV8d1vy0RenxTB+K5Mu57uVSTHtrMK0GAtFr833AkEA6avx20OHo61Yela/4k5kQDtjEf1N0LfI+BcWZtxsS3jDM3i1Hp0KSu5rsCPb8acJo5RO26gGVrfAsDcIXKC+bQJAZZ2XIpsitLyPpuiMOvBbzPavd4gY6Z8KWrfYzJoI/Q9FuBo6rKwl4BFoToD7WIUS+hpkagwWiz+6zLoX1dbOZwJACmH5
fSSjAkLRi54PKJ8TFUeOP15h9sQzydI8zJU+upvDEKZsZc/UhT/SySDOxQ4G/523Y0sz/OZtSWcol/UMgQJALesy++GdvoIDLfJX5GBQpuFgFenRiRDabxrE9MNUZ2aPFaFp+DyAe+b4nDwuJaW2LURbr8AEZga7oQj0uYxcYw==
Tokenrequest from user Device 130 to server 100
(in JSON format) Request :
{
"StartDate":17-Jan-2019,
"End Date": 17-Feb-2019,
"SerialNumber": "12345678",
"SdkId": "U35314667",
“VehNo: “KA00M1234”,
"TokenPurpose": 1,
“DeviceiD”: 1245677312324343
“ClientID”: 543654765765,
“Client Secret”: 123214123413,
“Vehicle Lat”:7.0,
“Vehicle Long”:8.0
}
Token data in Json format Header.RawData
Header
{
"alg": "PS256",
"typ": "JWT"
}
.
RawData
{
"ST": 1547718495,
"ET": 1550396895,
"SNO": 12345678,
"SID": "U35314667",
"DID": 1245677312324343,
"P":1
}
Token response from server 130 to user device 100 in Base64 URL format eyJhbGciOiJQUzI1NiIsInR5cCI6IkpXVCJ9.eyJTVCI6MTU0NzcxODQ5NSwiRVQiOjE1NTAzOTY4OTUsIlNOTyI6MTIzNDU2NzgsIlNJRCI6IlUzNTMxNDY2NyIsIkRJRCI6MTI0NTY3NzMxMjMyNDM0MywiUCI6MX0.25_netYUYCmY5BMpFadFbRjQpHxrfY2gcdbSDtxO6A-ivbpvMUOwNVH3JaZnsx3BKhSqpEl3ypU_H2_OXXHzMH9uHX7x79Cl3ToZIs_seQXH5TICAVuoNNPwsIW8cT38kAmSJhn21mrW8hDjw56b-azoNyVLathyKGGBtNJMkMI
Signature Data in base 64 URL format 25_netYUYCmY5BMpFadFbRjQpHxrfY2gcdbSDtxO6A-ivbpvMUOwNVH3JaZnsx3BKhSqpEl3ypU_H2_OXXHzMH9uHX7x79Cl3ToZIs_seQXH5TICAVuoNNPwsIW8cT38kAmSJhn21mrW8hDjw56b-azoNyVLathyKGGBtNJMkMI
[042] It should be understood that the request information from user device 130 could contain much more information than what is included for digital token. Further, the user device request data and token data are customizable and vary from application to application.
[043] Referring to FIGS. 2 to 7, operation of accessing the automobile 160 is explained once the user device is authenticated as explained in previous paragraphs.
[044] In one configuration, the relay outputs pin 2 and 4 of electronic management module are connected in series of the STARTER relay coilof the vehicle starting system ensuring normally closed contacts as shown in FIG2.
[045] Referring to FIG. 4, a method 200 of authenticating and providing access toa user device to access an automobile is explained.
[046] At step 205, when the user intends to use the particular automobile, the user device will send the information related to user device 130, electronic management module 161, automobile etc., to the server 105.
[047] At step 210, the server 105 generates the authentication token based on various information received and send the digitally signed token back to user device 130.
[048] At step 215, when user with the user device 130 is in the proximity of the vehicle and intends to access the vehicle by activating UI button in the user device, the authentication token is transferred from the user device 130 to the electronic management module 161.
[049] At step 220 and step 225, the authentication of the user device 130 is performed based on the access tokens generated. When the authentication is complete, the electronic management module 161 will keep the relay contact in position 2 thus allowing the start of the automobile. If any of the steps during authentication process is failed, the electronic management module 161 will switch the relay contact to position 3 as shown in FIG. 3 thus opening starter relay contact and in turn disabling the starting of the vehicle.
[050] Similarly, when the key is inserted and moved to accessory/RUN position, the electronic management module detects the same. If user device 130 authentication has not happened before this step as explained in previous step, immediately electronic management module will switch the relay contact to position 3 as shown in FIG. 3, thus opening starter relay contact and in turn disabling the starting of the vehicle. In other words, by the time key is moved to run and crank position, the starter relay is already disabled.
[051] At step 215, after authentication, the automobile 160 can be started. The start can be re enabled depending on application and various inputs. For example, it can be reenabled after detecting automobile 160 doors open and close, locked again from the user device 130 from outside, timer based after vehicle ignition is turned off, the automobile can be guarded and un guarded using independent command or combined with lock/unlock action
[052] Referring to FIGS. 5 and 6, relay in normally open position is explained. As can be seen in FIG. 5, the electronic management module is connected to the typical starter systems in the normally open position (Relay contact 3). The relay outputs pin 3 and 4 of electronic management module are connected in series of the STARTER relay coil. In the above scenario, the starter relay is in position 3 by default as shown in FIG. 5 and always cut off. Only after authentication of the user device 130 is complete, the electronic management module will switch the contact to position 2 as shown in FIG. 6 and close the starter relay contacts. Thus enabling the start of the engine of the automobile 160.
[053] In another configuration as shown inFIG. 7, disabling the access using Powertrain ECU are explained. In order to disable the access, the electronic management module will not control the starter relay directly. The engine control module (ECM) enabled with engine immobilization feature can be utilized. As shown in FIG. 7, the electronic management module will send signal to Engine Control Module using serial communication link like CAN (Controller Area Network), LIN (Local Interconnect Network), UART (Universal Asynchronous Receiver/Transmitter)etc., Once engine immobilization command is received from electronic management module, starter relay and other functionalities shall be shut off by engine control module.
[054] Based on the above, it is evident that the electronic management module may be configured and installed in the automobile. Whenever the user wishes to access the automobile, user device may raise the request to system for providing the authentication to the automobile.
[055] The system then generates the digital signature-based authentication token (pass) to the user device. When user device comes in proximity of automobile, access token data is transferred to the electronic management module installed in automobile. The electronic management module then verifies the authentication token and provides access to the user by unlocking and enabling the starting of the vehicle. In the event of unauthorized access in the form of physical key or invalid access token, the starting system of the vehicle is disabled ensuring that vehicles are protected even with the physical key.
[056] Further, the present disclosure enables to generate a secured digital signature-based authentication token to a low energy wireless electronic module (electronic management module) which is placed in the automobile.
[057] Only authorized person carrying the digital signature-based authentication token in their user devices can get access to the system. NFC or Bluetooth may be chosen as user devices support both and there is no additional key fob/access card is required to access the automobile.
[058] Further, use of offline cryptography techniques such as Hash and signatures, Public Key Cryptography to authenticate the validaccess ensure all forms of cyber-attacks like repudiation, replay, clone etc., are eliminated and only authorized person gets access to the automobile.
[059] Further, the user has to be in proximity to the automobile, without which the automobile will not start. As a result, even if someone accesses the automobile without authorization, the automobile will not start. As a consequence, it is impossible to steal the automobile.
[060] In addition, the present disclosure utilizes low energy based on Bluetooth Low Energy Technology and consumes few microamperes of current during inactive state.This way,the battery is optimized and not drained out.
[061] Although embodiments of methods of authenticating a user for accessing and starting the automobiles securely have been described in a language specific to features and/or methods, it is to be understood that the description is not necessarily limited to the specific features or methods described. Rather, the specific features and methods are disclosed as examples of implementations of authenticating a user for accessing and starting the automobiles securely.
| # | Name | Date |
|---|---|---|
| 1 | 201941005602-FER.pdf | 2021-10-17 |
| 1 | 201941005602-STATEMENT OF UNDERTAKING (FORM 3) [13-02-2019(online)].pdf | 2019-02-13 |
| 2 | 201941005602-AMENDED DOCUMENTS [01-10-2021(online)].pdf | 2021-10-01 |
| 2 | 201941005602-REQUEST FOR EXAMINATION (FORM-18) [13-02-2019(online)].pdf | 2019-02-13 |
| 3 | 201941005602-POWER OF AUTHORITY [13-02-2019(online)].pdf | 2019-02-13 |
| 3 | 201941005602-FORM 13 [01-10-2021(online)].pdf | 2021-10-01 |
| 4 | 201941005602-OTHERS [13-02-2019(online)].pdf | 2019-02-13 |
| 4 | 201941005602-FORM-26 [01-10-2021(online)].pdf | 2021-10-01 |
| 5 | 201941005602-POA [01-10-2021(online)].pdf | 2021-10-01 |
| 5 | 201941005602-FORM FOR STARTUP [13-02-2019(online)].pdf | 2019-02-13 |
| 6 | Correspondence by Agent_Power Of Attorney_Form 1_25-02-2019.pdf | 2019-02-25 |
| 6 | 201941005602-FORM FOR SMALL ENTITY(FORM-28) [13-02-2019(online)].pdf | 2019-02-13 |
| 7 | Correspondence by Applicant_DIPP Recognized Startup Certificate_25-02-2019.pdf | 2019-02-25 |
| 7 | 201941005602-FORM 18 [13-02-2019(online)].pdf | 2019-02-13 |
| 8 | 201941005602-Proof of Right (MANDATORY) [22-02-2019(online)].pdf | 2019-02-22 |
| 8 | 201941005602-FORM 1 [13-02-2019(online)].pdf | 2019-02-13 |
| 9 | 201941005602-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [13-02-2019(online)].pdf | 2019-02-13 |
| 9 | abstract 201941005602.jpg | 2019-02-15 |
| 10 | 201941005602-COMPLETE SPECIFICATION [13-02-2019(online)].pdf | 2019-02-13 |
| 10 | 201941005602-DRAWINGS [13-02-2019(online)].pdf | 2019-02-13 |
| 11 | 201941005602-DECLARATION OF INVENTORSHIP (FORM 5) [13-02-2019(online)].pdf | 2019-02-13 |
| 12 | 201941005602-COMPLETE SPECIFICATION [13-02-2019(online)].pdf | 2019-02-13 |
| 12 | 201941005602-DRAWINGS [13-02-2019(online)].pdf | 2019-02-13 |
| 13 | 201941005602-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [13-02-2019(online)].pdf | 2019-02-13 |
| 13 | abstract 201941005602.jpg | 2019-02-15 |
| 14 | 201941005602-FORM 1 [13-02-2019(online)].pdf | 2019-02-13 |
| 14 | 201941005602-Proof of Right (MANDATORY) [22-02-2019(online)].pdf | 2019-02-22 |
| 15 | 201941005602-FORM 18 [13-02-2019(online)].pdf | 2019-02-13 |
| 15 | Correspondence by Applicant_DIPP Recognized Startup Certificate_25-02-2019.pdf | 2019-02-25 |
| 16 | 201941005602-FORM FOR SMALL ENTITY(FORM-28) [13-02-2019(online)].pdf | 2019-02-13 |
| 16 | Correspondence by Agent_Power Of Attorney_Form 1_25-02-2019.pdf | 2019-02-25 |
| 17 | 201941005602-FORM FOR STARTUP [13-02-2019(online)].pdf | 2019-02-13 |
| 17 | 201941005602-POA [01-10-2021(online)].pdf | 2021-10-01 |
| 18 | 201941005602-FORM-26 [01-10-2021(online)].pdf | 2021-10-01 |
| 18 | 201941005602-OTHERS [13-02-2019(online)].pdf | 2019-02-13 |
| 19 | 201941005602-POWER OF AUTHORITY [13-02-2019(online)].pdf | 2019-02-13 |
| 19 | 201941005602-FORM 13 [01-10-2021(online)].pdf | 2021-10-01 |
| 20 | 201941005602-REQUEST FOR EXAMINATION (FORM-18) [13-02-2019(online)].pdf | 2019-02-13 |
| 20 | 201941005602-AMENDED DOCUMENTS [01-10-2021(online)].pdf | 2021-10-01 |
| 21 | 201941005602-STATEMENT OF UNDERTAKING (FORM 3) [13-02-2019(online)].pdf | 2019-02-13 |
| 21 | 201941005602-FER.pdf | 2021-10-17 |
| 1 | Searchstrategy201941005602E_15-12-2020.pdf |