Sign In to Follow Application
View All Documents & Correspondence

An Authentication System And Method Of Online Challenge & Response Solution In Personal Identification

Abstract: A system and method for providing challenge-response solutions to authenticate a user have been provided. The system includes web server comprising interlinking means adapted to interlink a plurality of images with unique index values such that each of the images has a unique index value. The web server includes registration means adapted to enable users to select at least two interlinked images for the purpose of registration. The web server includes challenge generation means adapted to generate, transmit an authentication challenge of the form of one-time equation. The web server, prior to transmitting the one-time equation, computes the value of the equation based on at least the sequence specified by the user. The web server compares the value calculated by the user with the value calculated prior to transmission and authenticates the user only in the event that said value calculated by the user is equivalent to the stored value.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 December 2011
Publication Number
27/2013
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2019-05-10
Renewal Date

Applicants

TATA CONSULTANCY SERVICES LIMITED
NIRMAL BUILDING, 9TH FLOOR, NARIMAN POINT, MUMBAI 400021, MAHARASHTRA, INDIA.

Inventors

1. BIDARE PRASANNA
#927, ARVIND 20TH MAIN, 15TH CROSS, BSK II STAGE, BANGALORE-560070, KARNATAKA

Specification

FORM-2 THE PATENT ACT, 1970 (39 OF 1970) & THE PATENT RULES, 2003 COMPLETE SPECIFICATION (See Section 10; Rule 13) A COMPUTER IMPLEMENTED SYSTEM AND METHOD FOR PROVIDING CHALLENGE-RESPONSE SOLUTIONS TO AUTHENTICATE A USER TATA CONSULTANCY SERVICES LTD., an Indian Company of Nirmal Building, 9th Floor, Nariman Point, Mumbai 400 021, Maharashtra, India. THE FOLLOWING SPECIFICATION DESCRIBES THE INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED. FIELD OF DISCLOSURE This disclosure relates to the field of authenticating users online by challenging them to prove their credentials. Particularly, this disclosure relates to a computer implemented authentication system and method for authenticating users based on the responses of the users to the challenge(s) provided to them online. BACKGROUND Transactions such as electronic funds transfer, online banking, e-procurement of goods and services and transactions providing access to sensitive data through privileged accounts are considered to be sensitive in nature. Such transactions are considered sensitive because they constitute utilization of sensitive data such as the account number, personal identification number (PIN) in case of electronic funds transfer and username and confidential password in case of electronic data access. Similarly, service providers who provide the implementation of afore mentioned transaction and manage the transaction via at least their application servers are referred to as providers of sensitive services. Banking and financial institutions (BFIs) are one of the examples of providers of sensitive services. BFIs provide clients with several financial services including money transfer, online banking, e-commerce and the like. Typically, the transactions performed by the clients with the applications servers associated with the BFIs involve exchange of sensitive client related information including but not restricted to client's bank account number, password and personal identification number. Therefore, it becomes necessary for service providers to confirm the identity of the users prior to enabling them access the relevant services. In today's scenario, it is quite common for a particular user/client to use, for example, online banking to conduct banking transactions. The online banking facility provides the user with a quick and easy method of conducting monetary transactions without visiting the bank. However since these transactions are to be conducted through client's device, typically a personal computer or mobile phone, there is a need to ensure that such transactions remain secured and hacker resistant. Some of the available authentication mechanisms include: • magnetic card readers which read the details corresponding to a card and subsequently authenticate the user based on the details associated with the card; • verifying Personal Identification Number (PIN)- a secret PIN is provided to the user which is required to be keyed in by the user every time a transaction is performed; • challenge questions & response- challenge questions which typically relate to personal information of a user are provided to the user. The user is authenticated and his/her identity is established based on the answers (responses) provided by the user; and • biometric authentication- the user is authenticated based on unique physical traits, including but not restricted to image of iris, fingerprints and image of retina. The aforementioned authentication mechanisms succeed in determining whether the user has the necessary credentials and whether the user is indeed a human being or a computer machine impersonating a human user. But, the aforementioned mechanisms fail to identify whether the user is indeed the genuine user and the location of the user. It is necessary for BFIs to collect non-refutable information and incorporate an authentication system which is secure, foolproof and difficult to manipulate. . Thus there was a need for an authentication system, which is secure and foolproof and difficult to manipulate or in other words hack resistant. Also, the system needs to offer secured Authorization based on the clients Authentication credentials. OBJECTS Some of the non-limiting objects of the present disclosure, which at least one embodiment herein satisfy are as follows: An object of the present disclosure is to provide a combination of authentication mechanisms to duly authenticate a user. Yet another object of the present disclosure is to provide a system that allows for images/pictures to be used as pass codes for authenticating a user. Still a further object of the present disclosure is to provide a system that enables users to create their own customized picture identifiers for the purpose of authentication. One more object of the present disclosure is to provide a system that makes use of a combination of picture identifiers and session based one-time equations for authenticating a user. Another object of the present disclosure is to provide a system that facilitates authenticating the clients using personal computers as well as mobile phones. Yet another object of the present disclosure is to provide a system that prevents spoofing/cloning and 'man in the middle' attacks. Still a further object of the present disclosure is to provide a system that makes available multiple authentication options for users. One more object of the present disclosure is to provide a system that is secured and hack resistant. SUMMARY In accordance with the present disclosure, there is provided a computer implemented system for providing challenge-response solutions to authenticate a user. Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes a web server comprising interlinking means adapted to interlink a plurality of images with unique index values such that each of the images has a corresponding unique index value. Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes a registration means adapted to enable the user to select at least two interlinked images for the purpose of registration. The registration means further includes: • generation means adapted to generate at least two image matrices having interlinked images, wherein each of the matrices include at least one interlinked image selected by the user, the generation means further adapted to arrange the unique index values corresponding to the interlinked images in the form of matrices and generate index-value matrices; and • communication means adapted to enable the user to specify the sequence in which the image matrices are to be traversed, the sequence selected from the group of sequences consisting of clockwise sequence, anticlockwise sequence, clockwise Z sequence, anticlockwise Z sequence; Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes challenge generation means adapted to generate and transmit an authentication challenge of the form of one-time equation. The challenge generation means further includes: • computing means adapted to compute the value of said one-time equation based on at least the sequence specified by said user; and • storage means adapted to store the value of said one-time equation; The challenge generation means in accordance with the present disclosure further adapted to prompt the user to calculate value of the one-time equation by using the image matrices, the index-value matrices and the sequence. Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes comparator means adapted to compare the value stored in the storage means with the value calculated by the user. Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes authenticating means adapted to authenticate the user only in the event that the value calculated by the user is equivalent to the value stored in the storage means; Typically, in accordance with the present disclosure, the system for providing challenge-response solutions to authenticate a user includes client device cooperating with the web server. The client device further includes: • display means adapted to display the one time equation, the image matrices and the index value matrices at least temporarily, the display means further adapted to prompt the user to calculate the value of the one-time equation; and • transmission means adapted to transmit to the web server the value calculated by the user. Typically, in accordance with the present disclosure, the web server includes a repository adapted to store at least profile information corresponding to said users, a plurality of alphanumeric characters, a plurality of numbers and questions to which said numbers serve as answers, said plurality of images and said unique index values corresponding to said images. Typically, in accordance with the present disclosure, the registration means is further adapted to optionally enable said user to select a plurality of said alphanumeric characters arranged in the form of 5x7 matrix for the purpose of registration, said registration means further including a tracking means adapted to track the order in which said alphanumeric characters are selected by said user. Typically, in accordance with the present disclosure, the registration means is further adapted to optionally enable said user to input a plurality of personal details in the form of numbers for the purpose of registration, said registration means further adapted to create questions/prompts associated with each of said numbers, wherein said numbers serve as answers for said questions/prompts. Typically, in accordance with the present disclosure, the registration means is further adapted to store the order in which the user selects said alphanumeric characters during said registration. Typically, in accordance with the present disclosure, the challenge-generation means is further adapted to: • optionally select at least one number and the corresponding question/prompt from said repository; • instruct said computing means to calculate the value of said one-time equation based on said number; • instruct said storage means to store said value; and • prompt said user to calculate value of said one-time equation by using the number which serves as the answer for the question/prompt. Typically, in accordance with the present disclosure, the challenge generation means is further adapted to generate and transmit an authentication challenge of the form of a secondary matrix having entries selected form the group of entries consisting of numerals and alphabets, only in the event that said user selects said plurality of alphanumeric characters for the purpose of registration. Typically, in accordance with the present disclosure, the challenge generation means is further adapted to instruct said user to select the entries of said secondary matrix in the same order as that in which said alphanumeric characters were selected from said 5x7 matrix. Typically, in accordance with the present disclosure, the comparator means is adapted to make a comparison between the order in which said user selects the entries in the secondary matrix, with the order in which said alphanumeric characters were selected from said 5x7 matrix during said registration, the comparator means further adapted to obtain behavioral trace corresponding to the user based on the comparison. Typically, in accordance with the present disclosure, the authentication means is further adapted to authenticate said user only in the event that said order in which said user selects the entries in the secondary matrix is same as the order in which alphanumeric characters were selected from said 5x7 matrix during said registration. In accordance with the present disclosure, there is provided a computer implemented method for providing challenge-response solutions to authenticate a user. The method in accordance with the present disclosure comprises the following steps: • interlinking a plurality of images with unique index values such that each of said images has a corresponding unique index value; • enabling said user to select at least two interlinked images for the purpose of registration; • generating at least two randomized matrices having interlinked images, wherein each of the said randomized matrices include at least one interlinked image selected by said user, arranging the unique index values corresponding to said interlinked images in the form of matrices and generate index-value matrices; • enabling said user to specify the sequence in which said randomized matrices are to be traversed; • generating and transmitting an authentication challenge of the form of one-time equation, computing and storing at a web server, the value of said one-time equation based on at least the sequence specified by said user; • displaying said one time equation, said randomized matrices of interlinked images and said index value matrices, at least temporarily, on a client device; • prompting said user to calculate the value of said one-time equation by using said image matrices, said index-value matrices and said sequence; • transmitting to said web server the value calculated by said user; and • comparing the value stored at the web server with value calculated by said user and authenticating said user only in the event that said value calculated by said user is equivalent to the value stored in said web server. Typically, in accordance with the present disclosure, the method further includes the step of storing in a repository at least profile information corresponding to said users, a plurality of alphanumeric characters, said plurality of images and said unique index values corresponding to said images. Typically, in accordance with the present disclosure, the step of enabling said user to select at least two interlinked images for the purpose of registration further includes the following steps: • optionally enabling said user to select a plurality of said alphanumeric characters arranged in the form of 5x7 matrix for the purpose of registration; • tracking the order in which said alphanumeric characters are selected by said user during said registration; and • storing the order in which said user selects said alphanumeric characters. Typically, in accordance with the present disclosure, the step of enabling said user to select at least two interlinked images for the purpose of registration further includes the step of optionally enabling said user to input a plurality of personal details in the form of numbers for the purpose of registration, and creating questions/prompts associated with each of said numbers, wherein said numbers serve as answers for said questions/prompts. Typically, in accordance with the present disclosure, the step of generating and transmitting an authentication challenge of the form of one-time equation further includes the following steps: • optionally selecting at least one number and the corresponding question/prompt from said repository; • instructing said computing means to calculate the value of said one-time equation based on said number; • instructing said storage means to store said value; and • prompting said user to calculate value of said one-time equation by using the number which serves as the answer for the question/prompt. Typically, in accordance with the present disclosure, the step of generating and transmitting an authentication challenge further includes the step of generating and transmitting an authentication challenge of the form of a secondary matrix having entries selected form the group of entries consisting of numerals and alphabets, only in the event that said user selects said plurality of alphanumeric characters for the purpose of registration. Typically, in accordance with the present disclosure, the step of generating and transmitting an authentication challenge further includes the step of optionally instructing said user to select the entries of said secondary matrix in the same order as that in which said alphanumeric characters were selected from said 5x7 matrix. Typically, in accordance with the present disclosure, the method further includes the step of optionally making a comparison between the order in which the user selects the entries in the secondary matrix, with the order in which said alphanumeric characters were selected from said 5x7 matrix during said registration and obtaining behavioral trace corresponding to the user based on the comparison. Typically, in accordance with the present disclosure, the step of authenticating said user further includes the step of optionally authenticating the user if said order in which said user selects the entries in the secondary matrix is same as the order in which alphanumeric characters were selected from said 5x7 matrix during said registration. BRIEF DESCRIPTION OF THE ACCOMPANYING DRAWINGS The present disclosure will now be described with reference to the non-limiting, accompanying drawings, in which: FIGURE 1 illustrates a schematic representation of a computer implemented system for providing challenge-response solution s for authenticating a user, in accordance with the present disclosure; FIGURE 2 and 2A illustrates a flowchart corresponding to a computer implemented method for providing challenge-response solution s for authenticating a user, in accordance with the present disclosure; FIGURES 3 to 5 illustrate the registration process undertaken by the system of the present disclosure; FIGURES 6, 8 and 10 illustrate the index-value matrices provided to the user for solving the one-time equation, in accordance with the present disclosure; FIGURES 7, 9 and 11 illustrate the image matrices provided to the user for solving the one-time equation, in accordance with the present disclosure; FIGURES 12 and 13 illustrate generating customized theme pictures based on user's preferences, in accordance with the present disclosure; and FIGURE 14 illustrates the secondary matrix provided to the user for the purpose of authentication, in accordance with the present disclosure. DETAILED DESCRIPTION OF ACCOMPANYING DRAWINGS The present disclosure will now be described with reference to the accompanying drawings which do not limit the scope and ambit of the disclosure. The description provided is purely by way of example and illustration. The embodiments herein and the various features and advantageous details thereof are explained with reference to the non-limiting embodiments in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein. The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the spirit and scope of the embodiments as described herein. The present invention discloses a computer implemented system and method for authenticating users. The system envisaged by the present invention makes use of a combination of images and a one-time equation for authenticating the users. Referring to FIGURE 1, there is shown a system 1000 for providing challenge-response solutions to authenticate a user. The system 1000, in accordance with the present invention includes a web server denoted by the reference numeral 100. The web server 100 is responsible for providing the challenge-response solutions to users for the purpose of authenticating them. The web server makes use of a combination of images associated with unique index values and one time equations to authenticate the users. The web server includes a repository (not shown in figures) adapted to store at least a plurality of images, unique-index values corresponding to each of the images and the profile information including name, email-id and the like corresponding to the users. The web server includes interlinking means denoted by the reference numeral 10 adapted to interlink a plurality of images with corresponding unique index values. The interlinking means 10 cooperates with a repository denoted by reference numeral 12 which is adapted to store at least a plurality of images and a plurality of unique index values. The interlinking means 10 interlinks each of the images with a unique index value and creates and creates interlinked images. The interlinked images created by the interlinking means 20 can also be stored on the repository 12. The web server 100 further includes a registration means denoted by reference numeral 14 which is adapted to enable the user to select at least two interlinked images for the purpose of registering himself/herself with the web server 100 for the purpose of authentication. The registration means 14 is further adapted to present typically, ten interlinked pictures to the user for the purpose of registration. During the process of registration, the user can select the interlinked images of his/her choice. The interlinked pictures provided to the user, for the purpose of registration are typically in the form including but not restricted to theme pictures, kaleidoscopic pictures in a geometric form and kaleidoscopic pictures in non-geometric form, pictures of the user himself/herself with different postures. For the purpose of registration, the user needs to select at least two interlinked pictures from the set of interlinked pictures presented for registration. Further, the process of registration may also involve training the user for using the system 1000 by running a random set/series of pictures for the purpose of demonstration and asking the user to once again select the interlinked images that he/she had previously selected, during the process of registration so that the user would get used to identifying from a set/series of interlinked pictures, the interlinked pictures selected by him/her during the process of registration. The registration means 14 includes generation means denoted by the reference numeral 14A. The generation means 14A is adapted to generate at least two randomized image matrices containing interlinked images. Each of the randomized image matrices created by the generation means 14A contain at least one interlinked image selected by the user during the process of registration. FIGURE 4 exemplifies few of the image matrices generated by the generation means 14A. Each of the interlinked image matrices contain at least one image selected by the user during the process of registration. The remaining images contained in each of the interlinked image matrices serve as decoy images. Typically, the image matrices containing interlinked images are of the size 4x4 and contain '4' images. Each of the image matrices typically contain one interlinked image selected by the user and the rest of the images, i.e. '3' images, act as decoy images. In accordance with this disclosure even the images serving as decoy images are also interlinked to unique index values. In accordance with this disclosure the user can user a plurality of interlinked images to create his/her own picture ID. The generation means 14 is further adapted to arrange the unique index values corresponding to the interlinked matrices in the form of matrices, typically of the size 4x4 and generate index-value matrices. For the purpose of authenticating a user, the image matrices as well as the corresponding index value matrices will be presented to the user on the client device (not shown in figures) associated with the user. The web server 100, in accordance with the present disclosure, further includes communication means denoted by the reference numeral 14B adapted to enable the user to specify the sequence in which the image matrices and said index value matrices are to be traversed (read). The sequence of traversing (reading) is selected from the group of sequences consisting of clockwise sequence, anticlockwise sequence, clockwise Z sequence and anticlockwise Z sequence (as shown in FIGURE 3). The sequence of traversal specified by the user corresponding to the image matrices will also be applied to the corresponding index value matrices and the index-value matrices will also be traversed in the same sequence in which the image matrices were traversed. Firstly, the user is required to traverse the image matrices in the specified sequences and identify, on the respective image matrices, the location of the interlinked images selected by him/her during the process of registration. Subsequently, based on the location on the image matrices of the interlinked images selected by him/her during the process of registration, the user is required to identify the values of the variables contained in the one-time equation one-time equation by referring to the corresponding index-value matrices. Subsequent to the user specifying the sequence in which the image matrices are to be traversed, the challenge generation means 16 of the web server 100 generates a unique one-time equation and offers it to the user as a challenge. For the purpose of authentication, the user is required to compute the value of the one-time equation provided to him/her by the challenge generation means 16. The challenge-generation means 16 generates one-time equations which are simple and the value of which can be computed by hand. The one-time equations provided by the challenge-generation means 16 will typically be in the form Ax+By+Cz+M. However, it is possible that the one-time equations generated by the challenge-generation means 16 may have a format other than the one provided above. In order to establish his/her identity, the client is required to solve (compute the final value) the one-time equation and communicate the final value corresponding to the one-time equation to the web server 100. In accordance with one exemplary embodiment of the present disclosure, if the user has selected three interlinked images during the phase of registration, a one-time equation containing at least two variables (X and Y) and one constant (M) will be provided to the user. Accordingly, three image matrices and three corresponding index-value matrices will be displayed to the user for the purpose of authentication. The three image matrices and index-value matrices enable the user to determine the values of the variables X, Y and the constant M. Typically, the value of the constant M can be determined by the user based solely on visual inspection of the corresponding image matrix and index-value matrix, and without specifying any particular sequence of traversal. In accordance with the present disclosure, the image matrices will be typically provided to the user on his/her mobile phone. The index-value matrices corresponding to the image matrices will be displayed to the user on the personal computer associated with the user. If there are 'three' image matrices, then 'three' index-value matrices will be provided to the user on his/her personal computer. In order to authenticate himself/herself, the user is prompted by the challenge generation means 16 to make use of the image matrices, index-value matrices and the sequence of traversal specified earlier by the user himself/herself, and calculate the value of the one-time equation. The challenge generation means 16, in accordance with the present disclosure further includes computing means 16A which is adapted to compute the value of the one-time equation generated by the challenge-generation means 16. Typically, the value of the one-time equation is computed by the computing means 16A and subsequently stored in storage means 16B (before the one-time equation is transmitted to the user. The value of the one-time equation which to be transmitted to the user is calculated before the transmission of the same for the purpose of comparing the value computed by the computing means 16A with the value of the one-time equation calculated by the user. In accordance with the present disclosure, the web server 100 further includes comparator means denoted by the reference numeral 18. The comparator means 18 cooperates with the storage means 16B to receive the computed value of the one-time equation that has been transmitted to the user. The comparator means 18 is adapted to compare the value received from the storage means 16B with value of calculated by the user. The web server 100 further includes authenticating means denoted by the reference numeral 20 and adapted to authenticate the user only in the event that the value (value of the one-time equation) calculated by the user is equivalent to the value (value of the one-time equation) stored in the storage means 16B. In accordance with the present disclosure, the system 1000 further includes client device denoted by the reference numeral 22 and cooperating with the web server 100. The client device 22 is selected from the group of devices consisting of personal computer and GPRS enabled mobile phone. Typically, in accordance with the present disclosure, the one-time equation and the image matrices are provided to the user through the GPRS enabled mobile phone associated with the user and the index-value matrices are provided to the user through the personal computer associated with the user. However it is possible that only a personal computer or a mobile phone can be used to facilitate communication between the user and the web server 100. The client device 22 includes display means denoted by reference numeral 22A which is adapted to display at least the one time equation generated by the challenge generation means 16, image matrices and index value matrices generated by the generation means 14A, at least temporarily. The client device 22 further includes transmission means denoted by the reference numeral 22B adapted to transmit to the web server 100, at least the value (value of the one-time equation) calculated by the user. In accordance with an exemplary embodiment of the present disclosure, the system 1000 executes an authentication process involving the below mentioned steps. Typically, users equipped with a GPRS enabled mobile phone as well as a mobile phone are allowed to make use of the system 1000 for authenticating themselves. However it is possible to extend the services of the system 1000 to users associated with either a mobile phone or a personal computer without departing from the scope of the present disclosure. Using his/her personal computer or GPRS mobile phone, the client logs onto to the website (typically, a website that hosts sensitive information and/or permits sensitive transactions to be performed). Now the user needs to be authenticated before he/she could continue accessing the website. The user, prior to accessing the website, is required to register himself/herself with the registration means 14 which requires the user to select at least two interlinked images for the purpose of registration. Using the interlinked images selected by the user, the generation means 14A generates at least two images matrices, wherein each image matrix contains at least one interlinked image selected by the user. The generation means takes into consideration the number of interlinked images selected by the user during the process of registration. That is, if the user has selected two interlinked images (during the phase of registration, 'two' image matrices will be provided to the user and the one-time equation provided to the user for authentication will also have two variables, for example X and M). For the sake of explanation, let us assume that the user has selected two interlinked images during the process of registration. Therefore, three image matrices, each having at least one interlinked image selected by the user would be provided to the user for the purpose of authentication. The image matrices generated by the generation means 14A would be typically displayed on the GPRS enabled mobile phone associated with the user. Before the display of the image matrices, the user is prompted, through the communication means 16B to specify the sequence in which he/she intends to traverse the displayed image matrices. The sequence of traversal is selected from the group of sequences consisting of clockwise sequence, anticlockwise sequence, clockwise Z sequence and anticlockwise Z sequence. The user specifies to the web server 100 that he/she would traverse the displayed image matrices in, for example clock wise sequence and clock wise Z sequence respectively. Subsequently, the challenge generation means 16 generates a one-time equation for example; 2X2+7Y2+M, having three variables namely X, Y and M, and transmits the one-time equation to the GPRS mobile phone associated with the user. The user, in order to authenticate himself/herself needs to compute the value associated with X, Y and M by making use of the corresponding image matrices and index-value matrices. Subsequently, the first image matrix will be transmitted to the user through his/her GPRS enabled mobile phone. The first image matrix is exemplified in FIGURE 7. Subsequently, the index-value matrix corresponding to the first image matrix and containing the index values corresponding to the interlinked images present in the first image matrix will be transmitted to the user on his/her personal computer. The first index-value matrix is exemplified in FIGURE 6. The user is required to identify the value of 'X' by inspecting FIGURES 6 and 7 and traversing both of them in clock wise direction. Referring to FIGURE 7, the interlinked image selected by the user during the process of registration is located on the 'second cell of the first row'. Referring to FIGURE 6, the value present on the 'second cell of the first row' is '5'. Therefore, by inspecting FIGURES 6 and 7, the user determines the value of 'X' to be 5 and computes the value of 'X' component of the one-time equation, i.e. 2X = 50. Subsequently, the second image matrix will be transmitted to the user through his/her GPRS enabled mobile phone. The second image matrix is exemplified in FIGURE 9. Subsequently, the index-value matrix corresponding to the second image matrix and containing the index values corresponding to the interlinked images present in the second image matrix will be transmitted to the user on his/her personal computer. The second index-value matrix is exemplified in FIGURE 8. The user is required to identify the value of 'Y' by inspecting FIGURES 8 and 9 and traversing both of them in clock wise Z direction. Referring to FIGURE 9, the interlinked image selected by the user during the process of registration is located on the 'first cell of the second row'. Referring to FIGURE 8, the value present on the 'first cell of the second row' is '3'. Therefore, by inspecting FIGURES 8 and 9, the user determines the value of' Y' to be 3 and computes the value of 'Y' component of the one-time equation, i.e. 7Y = 63. Subsequently, the third image matrix will be transmitted to the user through his/her GPRS enabled mobile phone. The third image matrix is exemplified in FIGURE 11. Subsequently, the index-value matrix corresponding to the third image matrix and containing the index values corresponding to the interlinked images present in the third image matrix will be transmitted to the user on his/her personal computer. The second index-value matrix is exemplified in FIGURE 10. The user is required to identify the value of

Documents

Application Documents

# Name Date
1 3686-MUM-2011-RELEVANT DOCUMENTS [28-09-2023(online)].pdf 2023-09-28
1 Other Patent Document [20-10-2016(online)].pdf 2016-10-20
2 3686-MUM-2011-RELEVANT DOCUMENTS [26-09-2022(online)].pdf 2022-09-26
2 3686-MUM-2011-PETITION UNDER RULE 137 [15-05-2018(online)].pdf 2018-05-15
3 3686-MUM-2011-RELEVANT DOCUMENTS [30-09-2021(online)].pdf 2021-09-30
3 3686-MUM-2011-OTHERS [15-05-2018(online)].pdf 2018-05-15
4 3686-MUM-2011-RELEVANT DOCUMENTS [29-03-2020(online)].pdf 2020-03-29
4 3686-MUM-2011-FER_SER_REPLY [15-05-2018(online)].pdf 2018-05-15
5 3686-MUM-2011-ORIGINAL UR 6(1A) FORM 26-110419.pdf 2020-01-03
5 3686-MUM-2011-CLAIMS [15-05-2018(online)].pdf 2018-05-15
6 3686-MUM-2011-IntimationOfGrant10-05-2019.pdf 2019-05-10
6 3686-MUM-2011-ABSTRACT [15-05-2018(online)].pdf 2018-05-15
7 ABSTRACT1.jpg 2018-08-10
7 3686-MUM-2011-PatentCertificate10-05-2019.pdf 2019-05-10
8 3686-MUM-2011-Written submissions and relevant documents (MANDATORY) [18-04-2019(online)].pdf 2019-04-18
8 3686-MUM-2011-FORM 5(17-2-2012).pdf 2018-08-10
9 3686-MUM-2011-FORM-26 [09-04-2019(online)].pdf 2019-04-09
9 3686-MUM-2011-FORM 3.pdf 2018-08-10
10 3686-MUM-2011-Form 3-220615.pdf 2018-08-10
10 3686-MUM-2011-HearingNoticeLetter.pdf 2019-03-27
11 3686-MUM-2011-ABSTRACT(17-2-2012).pdf 2018-08-10
11 3686-MUM-2011-Form 3-090516.pdf 2018-08-10
12 3686-MUM-2011-CLAIMS(17-2-2012).pdf 2018-08-10
12 3686-MUM-2011-FORM 3(11-4-2012).pdf 2018-08-10
13 3686-MUM-2011-CORRESPONDENCE(11-4-2012).pdf 2018-08-10
13 3686-MUM-2011-FORM 26.pdf 2018-08-10
14 3686-MUM-2011-CORRESPONDENCE(17-2-2012).pdf 2018-08-10
14 3686-MUM-2011-FORM 2.pdf 2018-08-10
15 3686-MUM-2011-CORRESPONDENCE(23-2-2012).pdf 2018-08-10
15 3686-MUM-2011-FORM 2(TITLE PAGE).pdf 2018-08-10
16 3686-MUM-2011-CORRESPONDENCE(23-7-2012).pdf 2018-08-10
16 3686-MUM-2011-FORM 2(TITLE PAGE)-(17-2-2012).pdf 2018-08-10
17 3686-MUM-2011-CORRESPONDENCE(25-2-2013).pdf 2018-08-10
17 3686-MUM-2011-FORM 2(17-2-2012).pdf 2018-08-10
18 3686-MUM-2011-Correspondence-090516.pdf 2018-08-10
18 3686-MUM-2011-FORM 18(23-2-2012).pdf 2018-08-10
19 3686-MUM-2011-FORM 1.pdf 2018-08-10
19 3686-MUM-2011-Correspondence-220615.pdf 2018-08-10
20 3686-MUM-2011-CORRESPONDENCE.pdf 2018-08-10
20 3686-MUM-2011-FORM 1(23-7-2012).pdf 2018-08-10
21 3686-MUM-2011-DESCRIPTION(COMPLETE)-(17-2-2012).pdf 2018-08-10
21 3686-MUM-2011-FER.pdf 2018-08-10
22 3686-MUM-2011-DESCRIPTION(PROVISIONAL).pdf 2018-08-10
22 3686-MUM-2011-DRAWING.pdf 2018-08-10
23 3686-MUM-2011-DRAWING(17-2-2012).pdf 2018-08-10
24 3686-MUM-2011-DESCRIPTION(PROVISIONAL).pdf 2018-08-10
24 3686-MUM-2011-DRAWING.pdf 2018-08-10
25 3686-MUM-2011-FER.pdf 2018-08-10
25 3686-MUM-2011-DESCRIPTION(COMPLETE)-(17-2-2012).pdf 2018-08-10
26 3686-MUM-2011-FORM 1(23-7-2012).pdf 2018-08-10
26 3686-MUM-2011-CORRESPONDENCE.pdf 2018-08-10
27 3686-MUM-2011-Correspondence-220615.pdf 2018-08-10
27 3686-MUM-2011-FORM 1.pdf 2018-08-10
28 3686-MUM-2011-Correspondence-090516.pdf 2018-08-10
28 3686-MUM-2011-FORM 18(23-2-2012).pdf 2018-08-10
29 3686-MUM-2011-CORRESPONDENCE(25-2-2013).pdf 2018-08-10
29 3686-MUM-2011-FORM 2(17-2-2012).pdf 2018-08-10
30 3686-MUM-2011-CORRESPONDENCE(23-7-2012).pdf 2018-08-10
30 3686-MUM-2011-FORM 2(TITLE PAGE)-(17-2-2012).pdf 2018-08-10
31 3686-MUM-2011-CORRESPONDENCE(23-2-2012).pdf 2018-08-10
31 3686-MUM-2011-FORM 2(TITLE PAGE).pdf 2018-08-10
32 3686-MUM-2011-CORRESPONDENCE(17-2-2012).pdf 2018-08-10
32 3686-MUM-2011-FORM 2.pdf 2018-08-10
33 3686-MUM-2011-CORRESPONDENCE(11-4-2012).pdf 2018-08-10
33 3686-MUM-2011-FORM 26.pdf 2018-08-10
34 3686-MUM-2011-CLAIMS(17-2-2012).pdf 2018-08-10
34 3686-MUM-2011-FORM 3(11-4-2012).pdf 2018-08-10
35 3686-MUM-2011-ABSTRACT(17-2-2012).pdf 2018-08-10
35 3686-MUM-2011-Form 3-090516.pdf 2018-08-10
36 3686-MUM-2011-Form 3-220615.pdf 2018-08-10
36 3686-MUM-2011-HearingNoticeLetter.pdf 2019-03-27
37 3686-MUM-2011-FORM-26 [09-04-2019(online)].pdf 2019-04-09
37 3686-MUM-2011-FORM 3.pdf 2018-08-10
38 3686-MUM-2011-Written submissions and relevant documents (MANDATORY) [18-04-2019(online)].pdf 2019-04-18
38 3686-MUM-2011-FORM 5(17-2-2012).pdf 2018-08-10
39 ABSTRACT1.jpg 2018-08-10
39 3686-MUM-2011-PatentCertificate10-05-2019.pdf 2019-05-10
40 3686-MUM-2011-IntimationOfGrant10-05-2019.pdf 2019-05-10
40 3686-MUM-2011-ABSTRACT [15-05-2018(online)].pdf 2018-05-15
41 3686-MUM-2011-ORIGINAL UR 6(1A) FORM 26-110419.pdf 2020-01-03
41 3686-MUM-2011-CLAIMS [15-05-2018(online)].pdf 2018-05-15
42 3686-MUM-2011-RELEVANT DOCUMENTS [29-03-2020(online)].pdf 2020-03-29
42 3686-MUM-2011-FER_SER_REPLY [15-05-2018(online)].pdf 2018-05-15
43 3686-MUM-2011-OTHERS [15-05-2018(online)].pdf 2018-05-15
43 3686-MUM-2011-RELEVANT DOCUMENTS [30-09-2021(online)].pdf 2021-09-30
44 3686-MUM-2011-PETITION UNDER RULE 137 [15-05-2018(online)].pdf 2018-05-15
44 3686-MUM-2011-RELEVANT DOCUMENTS [26-09-2022(online)].pdf 2022-09-26
45 3686-MUM-2011-RELEVANT DOCUMENTS [28-09-2023(online)].pdf 2023-09-28

Search Strategy

1 Current_Searches_05-09-2017.pdf

ERegister / Renewals

3rd: 06 Aug 2019

From 28/12/2013 - To 28/12/2014

4th: 06 Aug 2019

From 28/12/2014 - To 28/12/2015

5th: 06 Aug 2019

From 28/12/2015 - To 28/12/2016

6th: 06 Aug 2019

From 28/12/2016 - To 28/12/2017

7th: 06 Aug 2019

From 28/12/2017 - To 28/12/2018

8th: 06 Aug 2019

From 28/12/2018 - To 28/12/2019

9th: 06 Aug 2019

From 28/12/2019 - To 28/12/2020

10th: 13 Dec 2019

From 28/12/2020 - To 28/12/2021

11th: 15 Nov 2021

From 28/12/2021 - To 28/12/2022

12th: 29 Nov 2022

From 28/12/2022 - To 28/12/2023

13th: 14 Dec 2023

From 28/12/2023 - To 28/12/2024

14th: 07 Nov 2024

From 28/12/2024 - To 28/12/2025