Abstract: ABSTRACT “A SYSTEM AND METHOD FOR FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY” The present invention relates to a system and method for forced data centralization to protect data integrity. The present invention serves the object of a process for preventing data scatteredness and decentralized. In this system computer user that generate designs, drawings, documents, PDF files at remote location and the data will be saved by forceful centralized data management system. This system is loaded on user computers and allows users to create or access files that are normally saved by users on their individual computers. The system mainly includes I.o.T based hardware with loaded policy master. The present invention designed unique hardware to centralize all data in real time manner which does not leave a choice to user to save data on their individual device. The system enabled with technology that works at operating system level and monitors “save” and “save as” of any on the system. FIG. 1
Claims:We Claim:
1. A system and method for forced data centralization to protect data integrity:
at least one hardware and at least one software in conjugation with each other;
a hardware includes Serial Advanced Technology Attachment (SATA), Redundant Array Independent Disk (RAID), frequency modulator, Goldmont architecture with 14 nm process technologies, Central Processing Unit (C.P.U.), Fiber or SCSI interface, switches and TCP/IP connection;
a software includes programmed commands as a policy master;
characterized in that,
the policy master is loaded in system hardware and installed at interface to regulate data processing between remote located computer system and central database.
2. The system and method for forced data centralization to protect data integrity as claimed in claim 1, wherein to prevent data scatteredness or decentralization of the data from user’s device can define specific folders on specially designed hardware for which prevention of data decentralization is to be achieved.
3. The system for forced data centralization to protect data integrity as claimed in claim 1, wherein cache files are generated in the remote device at every SAVE, SAVE AS, OPEN and OPEN WITH command(s) for forced centralization in the system.
4. The method for forced data centralization to protect data integrity comprises following steps:
a. Installing Internet of Things (I.o.T) based hardware in the Local Area Network (L.A.N.) or Wide Area Network (W.A.N.) of the system;
b. Validating any remote user at any end point to ensure authentic access in the system by any of the user;
c. Providing access to user for already available file in the system for alteration or fresh file preparation;
d. Saving data in a forced manner through cache file generation at central database.
Dated this 12th day of March 2020
, Description:FORM 2
THE PATENTS ACT 1970
(39 of 1970)
&
The Patents Rules, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION:
“A SYSTEM AND METHOD FOR FORCED DATA CENTRALIZATION TO PROTECT DATA INTEGRITY”
2. APPLICANT:
(a) NAME : Synersoft Technologies Private Limited
(b) NATIONALITY : Indian
(c) ADDRESS : 5th Floor, Onyx 2,
Near Paldi Bus Terminus,
Beside Navchetan High School,
Paldi, Ahmedabad - 380007
3. PREAMBLE TO THE DESCRIPTION
PROVISIONAL
The following specification describes the invention. þ COMPLETE
The following specification particularly describes the invention and the manner in which it is to be performed.
Field of the invention
The present invention relates generally to an enhanced system and method for data centralization to prevention and protecting of data scattered-ness and decentralization and more particularly it relates to a hardware to centralize all data in real time manner which does not leave a choice to user to save data on their individual device.
Background of the invention
The ever increasing reliance on information and the computting systems that produce, process, distribute, and maintain such information in its myriad forms continues to put great demands on techniques for data protection. Simple systems providing periodic backups of a computer system's data have given way to more complex and Sophisticated data protection schemes that take into consideration a variety of factors including: the wide variety of computing devices and plat forms encountered, numerous different types of data that must be protected, the speed with which data protection operations must be executed, and the flexibility demanded by today's users.
The use of sensitive digital information creates a real risk that the information will be used inappropriately, exploited, or even lost. There are several issues that anyone sharing sensitive digital information confronts the protection of the digital information during transmission and after receipt thereof, and the unauthorized use of the digital information once received and/or shared with others.
In order to ensure against loss of data, computer systems are routinely backed up today on magnetic media, which often requires interactive responses and the physical presence of an individual. Since backup of large computer systems can require many hours to complete, backup of system data often occurs on other than a daily basis. The inability to categorize all digital assets on a local storage device to a desktop or laptop; the poor quality of existing categorization techniques when used within a structured context; the inability to provide effective automated control over categorization of digital assets outside of the central repository, as they are created and changed; the inability to request categorization information from the end-user in regard to locally stored information; the inability to selectively record categorization information based on the conceptual value of the assets; and the lack of category maintenance as assets are copied, moved, renamed, deleted and restored outside of the central repository.
It is challenging to protect enterprise data from scattered-ness and decentralization. Further, keep saving data on individual devices, enterprise’s data remains scattered and decentralized. This serious problem of scattered-ness and decentralization, leads to difficulty in preserving and protecting data.
One of several such data backup method in the prior art is periodically to acquire copies of complete files. In this data backup method, updates to the source data (By source data, we refer here and below to that data directly acted on, or processed by, the computer system.) performed after the data is copied are not reflected in the backup files. Therefore, this method of data backup entails the danger that large volumes of updated data may be lost, although that volume will vary with the backup interval.
A second data backup method is periodically to make copies of complete files and, when files are updated between backups, to store that update data in log files. Performed primarily as on-line processing, in addition to acquiring copies of complete files on magnetic tape or other media periodically, this involves acquiring logfiles with a magnetic disk device, magnetic tape device or similar equipment when files are updated during the intervals between periodic copying of the complete files. There are some differences between specific applications of this backup method.
In brief, copies of complete files are acquired to provide for the possibility of destruction of the files containing the data. The copies are acquired at daily or weekly frequencies, although the specific cycle would be determined by the particular application. One variation of this method is to segment the files containing the source data rather than copying them in toto.
Various prior arts have been disclosed describing data centralization to prevention of data scattered-ness. The prior art document US 20070113293 discloses a systems and methods for managing digital assets in a distributed computing environment are described. Meta-data for the digital assets is stored separately from the digital assets. Meta-data for some of the digital assets is copied and stored at a central location. Meta-data for the digital assets is generated by clients of the system. A method for providing secure restricted access to a digital asset includes: encrypting, by a first computing device, a digital asset; creating, by the first computing device, an executable file, the executable file comprising the encrypted digital asset, permission information associated with the digital asset, and executable code for decrypting and viewing the digital asset; creating, by the first computing device, a digital signature corresponding to the executable file; and transmitting, to a second computing device, the executable file and the digital signature. Corresponding systems and computer readable media with executable instructions are also described.
Another prior art document US 20110047128 discloses a software application is provided for a user to select a backed up data file and specify a task to be performed by an online service provider on the selected file. The application automatically connects to the online service provider and uploads the selected file for the online service provider to perform the task. Tasks that can be performed include printing, sharing, viewing, playing and archiving the selected file. Task preferences, user settings and user information can also be specified by the user and uploaded to the online service provider. Automatic connection to the online service provider can be via default setting, selected file type, or specified task. Alternatively, the user can designate which service provider is to perform the task. Payment for the task can be accomplished via bundled credits or by other payment mechanisms.
The Internet of Things (IoT) has not been around for very long. However, there have been visions of machines communicating with one another since the early 1800s. Machines have been providing direct communications since the telegraph (the first landline) was developed in the 1830s and 1840s.
The IoT is a dynamic and global network infrastructure, in which "Things" (individual physical and virtual entities and subsystems) generate data and are expected to communicate among themselves and with other processes. As connected sensors become more intelligent, the data they generate becomes increasingly important to every aspect of business. From monitoring machines on the factory floor to tracking the progress of ships at sea, sensors can help companies get far more out of their physical assets improving the performance of machines, extending their lives, and learning how they could be redesigned to do even more.
In the context of IoT, a data management platform collects, stores, processes, queries and analyzes the data generated from smart meters, devices and processes to enable many types of applications and services that leverage the data for many purposes such as for control, monitoring, analysis, predictive maintenance and analytics.
Traditionally, data management was treated differently for the next to real time tasks that were done by individual tailored processes at the edges in the form of control and monitor systems and tasks such as analysis of the data that were supported by a backend centralized database. However, the increase in IoT devices and data volume and the distinctive characteristics of the generated data makes the management of the data difficult and expensive.
Hence, system and method for data centralization to prevention of data scattered-ness still leaves some scope for improvement of solutions to secure the data at central location over network or internet.
Object of the invention
The main object of the present invention is to protect data by a system and method for forced data centralization to protect data integrity.
Another object of the present invention is to provide solution to corporate to prevent employee saving enterprise data on individual device instead of scattered server.
The further object of the present invention is to provide an forced implementation of backup system through IoT hardware which transfers scattered data from various user’s device to centralized data server.
Another object of the present invention is to provide alternate solution to the time to time back up and voluntary initiation of back by end user.
Yet, the further object of the present invention is to provide system and method for forced data centralization to protect data integrity of crucial or classified information.
Another object of the present invention is to provide unique commanding to the user associated with through Local Area Network (L.A.N.) and/or Wide Area Network (W.A.N.) at different systems that initiates centralized data back up in the highly scattered system.
Another object of the present invention is to secure free access to the user working away from the office (i.e. work from home) where typical surveillance and security is not available that increases the chances of trespass into generally considered as classified information.
Yet another object of the present invention is to provide system and method for forced data centralization to protect data integrity to immune system from cyber attack or voluntary alteration or deletion of the sensitive data by any of user of the organisation.
Another object of the invention is to provide a central database to manage any operating system violations.
Still another object of the present invention is to provide user a central device to save the enterprise data over internet or network.
Summary of the Invention
The present invention relates to a system and method for forced data centralization to protect data integrity. The present invention serves the object of a process for preventing data scatteredness and decentralized. In this system computer user that generate designs, drawings, documents, PDF files at remote location and the data will be saved by forceful centralized data management system. This system is loaded on user computers and allows users to create or access files that are normally saved by users on their individual computers. The system mainly includes I.o.T based hardware with loaded policy master. The present invention designed unique hardware to centralize all data in real time manner which does not leave a choice to user to save data on their individual device. The system enabled with technology that works at operating system level and monitors “save” and “save as” of any on the system.
Brief Description of the Drawings
Fig. 1 is a flow chart showing the main operational steps to protect data by a system and method for forced data centralization to protect data integrity
Detailed description of the Invention
Before explaining the present invention in detail, it is to be understood that the invention is not limited in its application. The nature of invention and the manner in which it is performed is clearly described in the specification. The invention has various components and they are clearly described in the following pages of the complete specification. It is to be understood that the phraseology and terminology employed herein is for the purpose of description and not of limitation.
The invention and the various features and advantageous details thereof are explained more fully with reference to the nonlimiting embodiments that are illustrated in the accompanying drawings and detailed in the following description. Descriptions of well-known starting materials, processing techniques, components and equipment are omitted so as not to unnecessarily obscure the invention in detail. It should be understood, however, that the detailed description and the specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only and not by way of limitation. Various Substitutions, modifications, additions and/or rearrangements within the spirit and/or Scope of the underlying inventive concept will become apparent to those skilled in the art from this disclosure. Embodiments discussed herein can be implemented in Suitable com puter-executable instructions that may reside on a computer readable medium (e.g., a hard disk drive, flash drive or other memory), hardware circuitry or the like, or any combination.
Before discussing specific embodiments, an example hard ware architecture for implementing certain embodiments is described herein. One embodiment can include one or more computers communicatively coupled to a network. As is known to those skilled in the art, the computer can include a central processing unit (“CPU”), at least one read-only memory (“ROM), at least one random access memory (“RAM), at least one hard drive (“HD), and one or more input/output (“I/O”) device(s). The I/O devices can include a keyboard, monitor, printer, electronic pointing device (Such as a mouse, trackball, Stylus, etc.) or the like. In various embodiments, the computer has access to at least one data base.
ROM, RAM, and HD are computer memories for storing data and computer-executable instructions executable by the CPU. Within this disclosure, the term “computer-readable medium' is not limited to ROM, RAM, and HD and can include any type of data storage medium that can be read by a processor. In some embodiments, a computer-readable medium may refer to a data cartridge, a data backup magnetic tape, a floppy diskette, a flash memory drive, an optical data storage drive, a CD-ROM, ROM, RAM, HD, or the like.
At least portions of the functionalities or processes described herein can be implemented in suitable computer executable instructions. The computer-executable instructions may be stored as Software code components or modules on one or more non-transitory computer readable media (Such as non-volatile memories, Volatile memories, DASD arrays, magnetic tapes, floppy diskettes, hard drives, optical storage devices, etc. or any other appropriate computer-readable medium or storage device). In one embodiment, the computer-executable instructions may include lines of compiled C++, Java, HTML, or any other programming or scripting code.
Additionally, the functions of the disclosed embodiments may be implemented on one computer or shared/distributed among two or more computers in or across a network. Communications between computers implementing embodiments can be accomplished using any electronic, optical, radio frequency signals, or other Suitable methods and tools of communication in compliance with known network protocols.
Additionally, any examples or illustrations given herein are not to be regarded in any way as restrictions on, limits to, or express definitions of any term or terms with which they are utilized. Instead, these examples or illustrations are to be regarded as being described with respect to one particular embodiment and as illustrative only. Those of ordinary skill in the art will appreciate that any term or terms with which these examples or illustrations are utilized will encompass other embodiments which may or may not be given therewith or elsewhere in the specification and all Such embodiments are intended to be included within the scope of that term or terms.
As described in Fig. 1, the system flow diagram the device, preferably Internet of Things (I.o.T), is installed in network system. The I.o.T device is loaded with the software, generally policy master, that works on predefined pathways to store work on the access or save control means.
The hardware enabled with software that works at operating system level and control data acquisition from end point user device and central server database. The present invention utilizes hardware including but not limited to SATA, Redundant Array Independent Disk (RAID), frequency modulator, and Goldmont architecture with 14 nm process technologies, Central Processing Unit (C.P.U), Fiber or SCSI interface, switches, TCP/IP connection. These components are specifically arranged in particular pattern that gives intended object in the associated network.
For backup and restore of data Stored at any remote location device, a Standard method for backup requires intermediate system working as the host that lead to extract the data from the data Storage System of the user device and pipe the data over to the central database server. This method is incredibly slow, and it requires tying up host Systems time in the form of database access operations and data pipelining. Further the said method is not real time solution in the backup storage. Remote location is not with the forced command therefore an alternate pathway is existed at the user device. The present system provides the better Solution to the enlisted object of the present invention by linking the remote device to central server by the specific pathways to give “forced save” at the designated location at the central server.
In order to serve the uninterrupted and continuous performance the system of the present invention controls the pathway to fix the date for final commands i.e. Save or Save As to specific pathway of the central server. The user device will outsource the data once the work on any of the file is finished and need to save for the closure.
The hardware I.o.T device loaded with the command work as the gateway for any end user who wants to work on pre-existing file in the system. System administrator used to provide credentials to user that gives access to the system after authentication by certified user verification.
Every user is profiled for destination of his data on which he works from his device. Whenever user triggers “save” or “save as” dialog, the option given to him to select destination memory location is controlled by invented hardware and is set on the path fed at the time of creating user’s profile. By doing so, user cannot save data at any other memory destination other than defined in invented hardware leaving no choice for user to scatter or decentralize data.
More generally, the method associated with the present invention preferably operates in a computer network having computer servers operating on different operating systems and a plurality of computer devices. Each computer device is managed by a computer server at the operating system level. The computer network includes a plurality of information databases that contain information associated with the users and with the computer devices of the computer network. The method generates on each computer server a set of identifying files for each computer device managed by the central computer server or system administrator. All sets of identifying files from the plurality of computer servers are then gathered into a unique central violation database. The I.o.T based hardware used to create secured Links are created between each set of identifying files and the plurality of information databases in order to determine a level of network access regulation for each computer device.
Present application provides solution to forced centralization policy master specially designed passive IoT hardware that stores all data folders designated to be protected against scatteredness and decentralization in the system.
Once the system is accessed by authorized user through valid credentials the user can get access to the list of folder containing classified information which is already worked by same user or other user(s). The I.o.T based device have specific control through policy master software to control command directly affecting subjected decentralization of data. The concern commands include “OPEN”, “SAVE”, “SAVE AS” and “OPEN WITH”.
The accession in any of the file limitation with whenever user triggers “save” or “save as” dialog, the option given to select destination memory location is controlled by invented hardware which is set on the path fed at the time of creating user’s profile.
The particular arrangement works as forced centralization where user cannot save data at any other memory destination other than defined in invented hardware leaving no choice for user to scatter or decentralize classified data.
The list of folders containing designated data to be prevented for scatteredness or decentralization will be route through I.o.T device in order to control the save commands for any alteration in the file. The system will provide access to the user with condition to controlled save or forced save in centralized database only. The present system will not allow file save in any of the users local drive in order to limit the scattering of the data and protect data integrity.
This will make user to save data on memory destination pushed by invented hardware through its agent over Local Area Network or Wide Area Network. This will effectively and accurately stop decentralization save of data by not giving choice to user in “save” or “save as” dialog of load software to save data at any other memory destination pushed by I.o.T device having policy master. The cache files are continuously running in the system where the command of “save” or “save as” is used by any end user the system will popup and give option to save work only at centralized database.
In other instance when user requires to access data for work purpose, the commands “open” or “open with” dialog is controlled in same way by agent through pushed information by invented hardware and will allow user to open data only from memory destinations configured in invented hardware.
While various elements of the present invention have been described in detail, it is apparent that modification and adaptation of those elements will occur to those skilled in the art. It is expressly understood, however, that such modifications and adaptations are within the spirit and scope of the present invention as set forth in the following claims.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 202021010683-IntimationOfGrant27-08-2024.pdf | 2024-08-27 |
| 1 | 202021010683-PROOF OF ALTERATION [16-12-2024(online)].pdf | 2024-12-16 |
| 1 | 202021010683-STATEMENT OF UNDERTAKING (FORM 3) [12-03-2020(online)].pdf | 2020-03-12 |
| 2 | 202021010683-IntimationOfGrant27-08-2024.pdf | 2024-08-27 |
| 2 | 202021010683-PatentCertificate27-08-2024.pdf | 2024-08-27 |
| 2 | 202021010683-REQUEST FOR EXAMINATION (FORM-18) [12-03-2020(online)].pdf | 2020-03-12 |
| 3 | 202021010683-Annexure [20-08-2024(online)].pdf | 2024-08-20 |
| 3 | 202021010683-PatentCertificate27-08-2024.pdf | 2024-08-27 |
| 3 | 202021010683-REQUEST FOR EARLY PUBLICATION(FORM-9) [12-03-2020(online)].pdf | 2020-03-12 |
| 4 | 202021010683-Written submissions and relevant documents [20-08-2024(online)].pdf | 2024-08-20 |
| 4 | 202021010683-PROOF OF RIGHT [12-03-2020(online)].pdf | 2020-03-12 |
| 4 | 202021010683-Annexure [20-08-2024(online)].pdf | 2024-08-20 |
| 5 | 202021010683-Written submissions and relevant documents [20-08-2024(online)].pdf | 2024-08-20 |
| 5 | 202021010683-POWER OF AUTHORITY [12-03-2020(online)].pdf | 2020-03-12 |
| 5 | 202021010683-Correspondence to notify the Controller [03-08-2024(online)].pdf | 2024-08-03 |
| 6 | 202021010683-US(14)-HearingNotice-(HearingDate-07-08-2024).pdf | 2024-06-26 |
| 6 | 202021010683-FORM-9 [12-03-2020(online)].pdf | 2020-03-12 |
| 6 | 202021010683-Correspondence to notify the Controller [03-08-2024(online)].pdf | 2024-08-03 |
| 7 | 202021010683-US(14)-HearingNotice-(HearingDate-07-08-2024).pdf | 2024-06-26 |
| 7 | 202021010683-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [20-06-2024(online)].pdf | 2024-06-20 |
| 7 | 202021010683-FORM FOR SMALL ENTITY(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 8 | 202021010683-FORM FOR SMALL ENTITY [12-03-2020(online)].pdf | 2020-03-12 |
| 8 | 202021010683-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [20-06-2024(online)].pdf | 2024-06-20 |
| 8 | 202021010683-US(14)-HearingNotice-(HearingDate-26-06-2024).pdf | 2024-06-14 |
| 9 | 202021010683-CLAIMS [04-12-2021(online)].pdf | 2021-12-04 |
| 9 | 202021010683-FORM 18 [12-03-2020(online)].pdf | 2020-03-12 |
| 9 | 202021010683-US(14)-HearingNotice-(HearingDate-26-06-2024).pdf | 2024-06-14 |
| 10 | 202021010683-CLAIMS [04-12-2021(online)].pdf | 2021-12-04 |
| 10 | 202021010683-COMPLETE SPECIFICATION [04-12-2021(online)].pdf | 2021-12-04 |
| 10 | 202021010683-FORM 1 [12-03-2020(online)].pdf | 2020-03-12 |
| 11 | 202021010683-COMPLETE SPECIFICATION [04-12-2021(online)].pdf | 2021-12-04 |
| 11 | 202021010683-DRAWING [04-12-2021(online)].pdf | 2021-12-04 |
| 11 | 202021010683-FIGURE OF ABSTRACT [12-03-2020(online)].pdf | 2020-03-12 |
| 12 | 202021010683-DRAWING [04-12-2021(online)].pdf | 2021-12-04 |
| 12 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 12 | 202021010683-FER_SER_REPLY [04-12-2021(online)].pdf | 2021-12-04 |
| 13 | 202021010683-OTHERS [04-12-2021(online)].pdf | 2021-12-04 |
| 13 | 202021010683-FER_SER_REPLY [04-12-2021(online)].pdf | 2021-12-04 |
| 13 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI [12-03-2020(online)].pdf | 2020-03-12 |
| 14 | 202021010683-DRAWINGS [12-03-2020(online)].pdf | 2020-03-12 |
| 14 | 202021010683-FER.pdf | 2021-10-19 |
| 14 | 202021010683-OTHERS [04-12-2021(online)].pdf | 2021-12-04 |
| 15 | 202021010683-COMPLETE SPECIFICATION [12-03-2020(online)].pdf | 2020-03-12 |
| 15 | 202021010683-DECLARATION OF INVENTORSHIP (FORM 5) [12-03-2020(online)].pdf | 2020-03-12 |
| 15 | 202021010683-FER.pdf | 2021-10-19 |
| 16 | 202021010683-COMPLETE SPECIFICATION [12-03-2020(online)].pdf | 2020-03-12 |
| 16 | 202021010683-DECLARATION OF INVENTORSHIP (FORM 5) [12-03-2020(online)].pdf | 2020-03-12 |
| 17 | 202021010683-DRAWINGS [12-03-2020(online)].pdf | 2020-03-12 |
| 17 | 202021010683-FER.pdf | 2021-10-19 |
| 17 | 202021010683-DECLARATION OF INVENTORSHIP (FORM 5) [12-03-2020(online)].pdf | 2020-03-12 |
| 18 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI [12-03-2020(online)].pdf | 2020-03-12 |
| 18 | 202021010683-OTHERS [04-12-2021(online)].pdf | 2021-12-04 |
| 18 | 202021010683-DRAWINGS [12-03-2020(online)].pdf | 2020-03-12 |
| 19 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI [12-03-2020(online)].pdf | 2020-03-12 |
| 19 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 19 | 202021010683-FER_SER_REPLY [04-12-2021(online)].pdf | 2021-12-04 |
| 20 | 202021010683-DRAWING [04-12-2021(online)].pdf | 2021-12-04 |
| 20 | 202021010683-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 20 | 202021010683-FIGURE OF ABSTRACT [12-03-2020(online)].pdf | 2020-03-12 |
| 21 | 202021010683-FORM 1 [12-03-2020(online)].pdf | 2020-03-12 |
| 21 | 202021010683-FIGURE OF ABSTRACT [12-03-2020(online)].pdf | 2020-03-12 |
| 21 | 202021010683-COMPLETE SPECIFICATION [04-12-2021(online)].pdf | 2021-12-04 |
| 22 | 202021010683-CLAIMS [04-12-2021(online)].pdf | 2021-12-04 |
| 22 | 202021010683-FORM 1 [12-03-2020(online)].pdf | 2020-03-12 |
| 22 | 202021010683-FORM 18 [12-03-2020(online)].pdf | 2020-03-12 |
| 23 | 202021010683-FORM 18 [12-03-2020(online)].pdf | 2020-03-12 |
| 23 | 202021010683-FORM FOR SMALL ENTITY [12-03-2020(online)].pdf | 2020-03-12 |
| 23 | 202021010683-US(14)-HearingNotice-(HearingDate-26-06-2024).pdf | 2024-06-14 |
| 24 | 202021010683-REQUEST FOR ADJOURNMENT OF HEARING UNDER RULE 129A [20-06-2024(online)].pdf | 2024-06-20 |
| 24 | 202021010683-FORM FOR SMALL ENTITY(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 24 | 202021010683-FORM FOR SMALL ENTITY [12-03-2020(online)].pdf | 2020-03-12 |
| 25 | 202021010683-FORM FOR SMALL ENTITY(FORM-28) [12-03-2020(online)].pdf | 2020-03-12 |
| 25 | 202021010683-FORM-9 [12-03-2020(online)].pdf | 2020-03-12 |
| 25 | 202021010683-US(14)-HearingNotice-(HearingDate-07-08-2024).pdf | 2024-06-26 |
| 26 | 202021010683-Correspondence to notify the Controller [03-08-2024(online)].pdf | 2024-08-03 |
| 26 | 202021010683-FORM-9 [12-03-2020(online)].pdf | 2020-03-12 |
| 26 | 202021010683-POWER OF AUTHORITY [12-03-2020(online)].pdf | 2020-03-12 |
| 27 | 202021010683-POWER OF AUTHORITY [12-03-2020(online)].pdf | 2020-03-12 |
| 27 | 202021010683-PROOF OF RIGHT [12-03-2020(online)].pdf | 2020-03-12 |
| 27 | 202021010683-Written submissions and relevant documents [20-08-2024(online)].pdf | 2024-08-20 |
| 28 | 202021010683-Annexure [20-08-2024(online)].pdf | 2024-08-20 |
| 28 | 202021010683-PROOF OF RIGHT [12-03-2020(online)].pdf | 2020-03-12 |
| 28 | 202021010683-REQUEST FOR EARLY PUBLICATION(FORM-9) [12-03-2020(online)].pdf | 2020-03-12 |
| 29 | 202021010683-PatentCertificate27-08-2024.pdf | 2024-08-27 |
| 29 | 202021010683-REQUEST FOR EARLY PUBLICATION(FORM-9) [12-03-2020(online)].pdf | 2020-03-12 |
| 29 | 202021010683-REQUEST FOR EXAMINATION (FORM-18) [12-03-2020(online)].pdf | 2020-03-12 |
| 30 | 202021010683-IntimationOfGrant27-08-2024.pdf | 2024-08-27 |
| 30 | 202021010683-REQUEST FOR EXAMINATION (FORM-18) [12-03-2020(online)].pdf | 2020-03-12 |
| 30 | 202021010683-STATEMENT OF UNDERTAKING (FORM 3) [12-03-2020(online)].pdf | 2020-03-12 |
| 31 | 202021010683-STATEMENT OF UNDERTAKING (FORM 3) [12-03-2020(online)].pdf | 2020-03-12 |
| 31 | 202021010683-PROOF OF ALTERATION [16-12-2024(online)].pdf | 2024-12-16 |
| 1 | 2021-06-1013-11-48E_10-06-2021.pdf |