Abstract: The present subject matter relates to a system (400) and a method (100) for authenticating a keyless entry and exit into a vehicle (402). The present subject matter provides a keyless wireless method for authentication employing a multi-layer security network. The system (400) comprises of an authentication unit (404) and a control unit (406) disposed in the vehicle (402) and an electronic device (408) of the user disposed external to the vehicle (402) and configured to communicably connect with the authentication unit (404). The system (400) and method (100) employs a multi-layer security network comprising of a first set of pre-defined conditions, a second set of pre-defined conditions and a third set of pre-defined conditions, where only upon satisfaction of the above-mentioned criteria is an electronic device (408) provided access to the vehicle (402). The present subject matter develops a resilient security and theft-proof system (400) against brute attacks.
DESC:TECHNICAL FIELD
[0001] The present subject matter relates to wireless communication modules. More specifically, the present subject matter relates to use of wireless communication modules for seamless entry and exit in motor vehicles.
BACKGROUND
[0002] The use of wireless communication has revolutionized all human life. Anything that can be done wirelessly is done in that manner. Different ranges of the electromagnetic spectrum can be used for different purposes. Satellites are used for long range communication. It brings a sense of security to do something virtually than to do it physically. It saves time and effort by the individual. Mostly any human requirement in the modern day can be fulfilled by using an application on the mobile handheld wireless device.
[0003] Wireless communication has multiple applications in the automotive industry. In addition to systems such as being able to interface one’s individual electronic device with one’s automobile, the electronic systems of the automobile can be updated on the air (OTA) by the manufacturer. A most common feature in modern vehicles is a wireless key, wherein a key fob is given to the vehicle owner by the manufacturer instead of a physical key interfacing with a lock.
[0004] An automobile generally consists of a body built on a frame. The frame supports a power unit, which can be either be an Internal Combustion Engine (ICE) or an Electric Motor or a combination thereof. The frame is connected to a plurality of wheels, which can freely rotate. One or more of the plurality of wheels are driven by the prime mover through a transmission system. Vehicles are generally classified based on the number of wheels it has. A lower cost option is a two wheeled saddle type vehicle. There are also three wheeled vehicles and 4 wheeled vehicles which are used for personal transport. Larger vehicles are usually used to transport cargo.
[0005] Most modern day vehicles have multiple safety measures. Other than the driver and passengers’ physical safety measures such as seat belts, air bags and frame crumple zone (crash zones), there is a safety concern for the vehicle itself, and the belongings of the owner inside the vehicle. Vehicles are often the target for thefts, and a various measure can be taken to prevent that. Door locks are used in four wheelers with doors. A steering lock is used in all sorts of vehicles, including two wheelers. Other than this, the ignition of the vehicle is also locked as a safety measure. A common feature used in modern vehicles is to have keyless entry and exit, which is usually executed with a key fob given to the vehicle owner by the manufacturer. However, the available keyless entry and exit systems known in the art lack a requisite level of security, where there is only a wireless communication channel existent between the key fob and the vehicle without any additional security protocols and mechanisms.
[0006] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art, through comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.
SUMMARY OF THE INVENTION
[0007] The foregoing summary is illustrative only and is not intended to be in any way limiting. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features will become apparent by reference to the drawings and the following detailed description.
[0008] According to embodiments illustrated herein, the present disclosure provides a method for authenticating a keyless entry and exit. The method comprises steps of: passively scanning, by an authentication unit, a pre-defined region for presence of an electronic device of an authorized user; connecting, by the authentication unit, the electronic device with the authentication unit upon satisfaction of a first set of pre-defined conditions; verifying, by the authentication unit, an authenticity of the electronic device upon satisfaction of a second set of pre-defined conditions; communicating an authentication question, by the authentication unit, from a control unit to the verified electronic device upon satisfaction of the second set of pre-defined conditions; communicating an authentication response, by the authentication unit, from the verified electronic device to the control unit; and authenticating, by the authentication unit, the verified electronic device upon satisfaction of a third set of pre-defined conditions. In an aspect, the first set of pre-defined conditions is associated with the first unique code, the second set of pre-defined conditions is associated with a strength of connection between the electronic device and the authentication unit and the third set of pre-defined conditions is associated with the authentication question.
[0009] In another aspect, the authentication question is generated by the control unit based on a pre-stored second unique code, and an authentication solution is computed by the control unit. In another aspect, the control unit is configured to receive one or more user inputs from the authenticated electronic device and perform one or more functions based on the one or more user inputs.
[00010] According to embodiments illustrated herein, the present disclosure additionally provides a system for authentication keyless entry and exit. The system comprises of an electronic device, an authentication unit and a control unit. The electronic device is configured to be communicatively coupled to an authentication unit. The authentication unit is disposed on a vehicle and is configured to: passively scan a pre-defined region for presence of the electronic device of an authorized user, connect with the electronic device on satisfaction of a first set of pre-defined conditions, and verify an authenticity of the electronic device upon satisfaction of a second set of pre-defined conditions associated with a strength of connection between the electronic device and the authentication unit. The control unit is configured to: generate an authentication question, compute an authentication solution associated with the generated authentication question, transmit the authentication question to the verified electronic device through the authentication unit, receive an authentication response being a user response from the verified electronic device, authenticate the verified electronic device upon satisfaction of a third set of pre-defined conditions, and receive one or more user inputs from the authenticated electronic device to perform one or more functions. In an aspect, the authentication question is generated based on a pre-stored second unique code.
BRIEF DESCRIPTION OF DRAWINGS
[00011] The present invention will become more fully understood from the detailed description given herein below and the accompanying drawings which are given by way of illustration only, and thus are not limitative of the present invention. The detailed description is described with reference to an embodiment of a two wheeled saddle type motorized vehicle along with accompanying figures. The same numbers are used throughout the drawings to reference like features and components.
[00012] Figure 1 illustrates a method for authenticating a keyless entry and exit,, in accordance with some embodiments of the present disclosure.
[00013] Figure 2 is an exemplary illustration of a flow diagram representing the method for authenticating keyless entry, in accordance with some embodiments of the present disclosure.
[00014] Figure 3 is an exemplary illustration of a flow diagram representing the method for authenticating keyless exit, in accordance with some embodiments of the present disclosure.
[00015] Figure 4 illustrates a block diagram depicting a system for implementing a keyless entry and exit in a vehicle, in accordance with some embodiments of the present disclosure.
[00016] Figure 5 illustrates an exemplary block diagram representing the system for keyless entry and exit with one or more components, in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION
[00017] The present disclosure may be best understood with reference to the detailed figures and description set forth herein. Various embodiments are discussed below with reference to the figures. However, those skilled in the art will readily appreciate that the detailed descriptions given herein with respect to the figures are simply for explanatory purposes as the methods and systems may extend beyond the described embodiments. For example, the teachings presented and the needs of a particular application may yield multiple alternative and suitable approaches to implement the functionality of any detail described herein. Therefore, any approach may extend beyond the particular implementation choices in the following embodiments described and shown.
[00018] References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a particular feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment” does not necessarily refer to the same embodiment.
[00019] The present invention now will be described more fully hereinafter with different embodiments. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather those embodiments are provided so that this disclosure will be thorough and complete, and fully convey the scope of the invention to those skilled in the art.
[00020] The present invention is illustrated and explained with reference to a vehicle. However, a person skilled in the art would appreciate that the present invention is not limited to a conventional vehicle having an internal combustion engine and certain features, aspect and advantages of embodiments of the present invention can be used with various type of vehicles such as scooter type, motorcycle type, saddle type and step thru two-wheeled vehicles as well as multi-axle vehicles such as electric and hybrid vehicle. The applicability of the present subject matter extends to two wheeled, three-wheeled and multi-axle vehicles equipped with a wireless system and method for keyless entry and exit from the vehicle.
[00021] The object of the present subject matter is to provide a secure et efficient method for authenticating keyless and entry and exit in association with a system for keyless entry and exit.
[00022] To this end, the present invention in order to authenticate access to the vehicle wireless uses a multi-layer protection system. In accordance with the present configuration only upon satisfaction of a first set of pre-defined conditions, a second set of pre-defined conditions and a third set of pre-defined conditions is access to the vehicle authenticated. The present invention as a first layer of protection compares a first unique code of an electronic device with a pre-stored unique code and only upon satisfaction of this first set of pre-defined condition does the method proceed to subsequent steps. In a second layer of protection, a strength of connection between an authentication unit of the vehicle and the electronic device is assessed, and only when the distance between the authentication unit and the electronic device is within a pre-defined threshold limit is the second set of pre-defined conditions deemed satisfied. Only upon satisfaction of the second set of pre-defined conditions does the method proceed to the subsequent steps. In a third layer of protection, a control unit of the vehicle generates an authentication question and transmits it the electronic device and only upon satisfaction of the third set of pre-defined conditions where the authentication solution maps with the authentication response of the user, the locking system in the vehicle becomes disabled.
[00023] The present subject matter thus provides a multi-faceted approach in authenticating and enabling access to the vehicle which can only be achieved by an authorized user of the vehicle.
[00024] In conventional keyless entry and exit systems known in the art, a keyfob is provided to the user where the keyfob is configured to wirelessly communicated with the vehicle for locking and unlocking of the vehicle. The drawbacks associated with the existent system is that in the event the keyfob gets stolen any unauthorized user would gain access to the vehicle.
[00025] The present subject matter overcomes this exact drawback of the existent technique by providing multiple layers of security to authenticate the user. Even in the event of the electronic device of the user getting stolen, the control unit would block access to the vehicle upon non-satisfaction of the third set of pre-defined conditions where a unique authentication question is generated every time by the control unit.
[00026] An additional drawback in existent wireless keyless entry and exit systems is that the usage of low frequency antennas, bluetooth or other forms of near field communication enable snooper software and brute attackers to acquire the code being transmitted from the vehicle to the key fob where access to the vehicle is authenticated.
[00027] The present subject matter addresses this exact limitation known in the art and negates any transmission of codes from the vehicle infrastructure to an external environment. Under the third layer of protection, the control unit is configured to generate the authentication questions which is an encrypted question associated with a pre-stored unique code. The pre-stored unique code is only known to an authorized user of the vehicle. Further the generated authentication question being an encrypted element and is unique each time it is transmitted by the control unit eliminates the possibility of a brute attack to acquire the pre-stored unique code. Additionally, the authentication response transmitted by the user is a decryption message to the encrypted question, which again is unique every time it is transmitted from the electronic device.
[00028] Thus, the present subject matter in accordance with the present configuration eliminates a possibility of a brute attack, a cyber attack and the advances of snooping software in acquiring the pre-stored unique code by using effective advances encryption standards.
[00029] The object of the present subject matter is provide convenience of locking and unlocking of the vehicle.
[00030] To this end, while unlocking of the vehicle is authenticated using a multi-layer secure mechanism, locking of the vehicle is effectively addressed. In the event the authorized user transmits a locking input, the control unit is configured to check the vehicle speed and reduce the vehicle speed to a pre-defined threshold speed to ensure a comfortable riding experience without sudden halting of the vehicle. The vehicle is gradually brought to an idle state where locking of the vehicle is considered safe for the rider as well as the vehicle.
[00031] It is an object of the present invention to reduce part and associated cost in a vehicle implementing the keyless entry and exit system.
[00032] In conventional vehicle having keyless entry and exit, the user of the vehicle is provided with a keyfob, with the keyfob communicating with a locking pad of the vehicle and other components for locking and unlocking of the vehicle.
[00033] The present subject matter in turn eliminates the requirement of a keyfob and employs an electronic device of the authorized user. The electronic device, in an embodiment, is a personal digital assistant or a mobile device of the authorized user. Thus, the overall number of parts and maintenance associated with the keyfob is reduced in accordance with the present disclosure. Further, in an embodiment, the authentication unit is a speedometer of the vehicle provided with a communication module, thus the present disclosure employs already existing components of the vehicle.
[00034] Additionally, the present subject matter in accordance with the present disclosure employs a low energy module for passively scanning a pre-defined region for presence of an electronic device of an authorized user. The employment of low energy modules alleviates concerns of the present subject matter being exhaustive from an energy perspective.
[00035] The present subject matter provides a seamless experience to the user of the vehicle where only a decryption message in the form of an authentication response is required on part of the user while the first layer and second layer of security is automatically executed by the authentication unit.
[00036] Further, in accordance with the configuration of the present disclosure, the keyless entry and exit system and method does not involve major alterations or modifications in existing vehicle layouts. The present subject matter negates a need for re-vamping of core manufacturing processes in the manufacturing of the vehicle equipped with the keyless entry and exit system.
[00037] Figure 1 illustrates a method for authenticating a keyless entry and exit, in accordance with some embodiments of the present disclosure.
[00038] In an aspect, the method for authenticating a keyless entry and exit is implemented in a vehicle. A vehicle consists of a frame structure covered by a body panel, and supporting a power unit. Wired and wireless electronic systems are used in modern vehicles to run the vehicle smoothly. In Internal Combustion Engine power units, an electronic fuel injection system is used to achieve a more precise timing of fuel injection. An Integrated Starter Generator (ISG) controller is used to control the ISG machine, which is used as a generator while the vehicle is running, and as a starter while the vehicle is stationary. An automatic start stop system is used to stop the engine automatically at traffic stops to save fuel. Most modern vehicles have an interactive informatic system, which, in addition to the features mentioned above, are equipped to connect to external devices, play music, display navigational directions etc.
[00039] The method (100) for authenticating a keyless entry and exit starts at step 102 and proceeds to step 104. At step 104, an authentication unit is configured to passively scan a pre-defined region for presence of an electronic device of an authorized user. In an embodiment, the pre-defined region is a radius of 5 metre marked from the authentication unit, the authentication unit being disposed in a vehicle.
[00040] In an aspect, the authentication unit comprises of a communication module configured to wireless connection with one or more electronic devices. In an aspect, the authentication unit can be any component disposed in the vehicle capable of communicably connecting with one or more external electronic devices and one or more control units disposed in the vehicle. In an aspect, the authentication unit is not an external component disposed in a vehicle but an existent component of the vehicle capable of communicably connecting with one or more electronic devices, components and/ or control units or a combination thereof. In an embodiment, the authentication unit is a speedometer od the vehicle provided with a communication module. In accordance with the disclosed configuration of the authentication unit, the method for authenticating the keyless entry and exit does not increase part count, weight or even additional cost associated with the disposition of the disclosed method.
[00041] In an aspect, the wireless connection between the electronic device of the user and the authentication unit may be established by at least one of Bluetooth, near field communication low frequency antenna, LAN, LIN, Wi-Fi, radio frequencies, satellite communication, cellular communication, infrared communication, WLAN, WPAN, WMAN and WWAN.
[00042] In an embodiment, the electronic device of the authorized user is configured to wirelessly connect with the authentication unit through Bluetooth. The authentication unit searches a local area defined by the pre-defined radius of 5 m radius for Bluetooth-enabled devices and requests for a connection to be established between the Bluetooth-enabled device such as the electronic device and the authentication unit.
[00043] In an aspect, the electronic device comprises of a communication module configured to establish a wireless communication with another communication module of another device. The electronic device comprises of suitable logic, circuitry, interfaces, and/or code providing computing and information storage with retrievable capabilities for personal as well as business use of the user. In an embodiment, the electronic device is one of a mobile device or a personal digital assistant of the user.
[00044] In an embodiment, the electronic device is a wireless handheld device and is equipped to have several types of wireless communications. At a high frequency range or at a low frequency range, over a short distance or over a long distance. Wireless fidelity (Wifi) and Bluetooth are some of the features by which the electronic device can communicate to other devices or be connected to the internet. These systems are also installed in new automobiles as features.
[00045] In an aspect, each electronic device comprises of a first unique code pre-stored in the electronic device. In an embodiment, the first unique code is a media access control address which serves as a unique identifier for the electronic device during device manufacturing.
[00046] At step 106, the authentication unit is configured to connect with the electronic device upon satisfaction of a first set of pre-defined conditions wherein the first set of pre-defined conditions are associated with the first unique code of an electronic device. The first set of pre-defined conditions are deemed satisfied when the first unique code of the electronic device matches with a pre-stored first unique code. The pre-stored first unique code is stored in the authentication unit. During installation of the keyless entry and exit, the authentication unit is pre-stored with the first unique code of the electronic device of an authorized user. At step 106, the authentication unit maps the first unique code of each electronic device in the pre-defined region of the authentication unit with the pre-stored first unique code. Upon satisfaction of the first set of pre-defined conditions, the method (100) proceeds to step 108.
[00047] At step 108, the authentication unit is configured to verify the electronic device upon satisfaction of a second set of pre-defined conditions, wherein the second set of pre-defined conditions is associated with a strength of connection existing between the electronic device and the authentication unit. The authentication verifies the electronic device based on the distance existent between the authentication unit and the electronic device satisfying the first set of pre-defined conditions. The second set of pre-defined conditions are deemed satisfied when the strength of connection between the electronic device and the authentication unit is within a pre-defined threshold limit. In an embodiment, the pre-defined threshold limit is a radius 1m from the authentication unit disposed in the vehicle. A satisfaction of the second set of pre-defined configuration ensures that the authorized user is in the vicinity of the vehicle to be in a position of intently lock and inlock the vehicle. Upon satisfaction of the second set of pre-defined conditions the method (100) proceeds to step 110.
[00048] At step 110, the authentication unit is configured to communicate an authentication question from a control unit of the vehicle to the verified electronic device upon satisfaction of the second set of pre-defined conditions. The authentication question is generated by the control unit and is based on a pre-stored second unique code. Additionally, an authentication solution is computed by the control unit wherein the authentication solution is associated with the generated authentication question.
[00049] In an aspect, the authentication question and authentication solution is based on advanced encryption system wherein the authentication question serves as an encrypted message while the authentication solution is a decrypted message with reference to the authentication question.
[00050] In an aspect, the control unit comprises suitable logic, circuitry, interfaces, and/or code that is configured to control one or more components of the vehicle. The one or more components being at least one of a steering lock, knob rotation, charging port lock, fuel cap lock, ignition lock, utility box lock and seat lock. The control unit is configured to control the starting and stopping of a prime mover of the vehicle. In an embodiment, the control unit comprises a memory which comprises suitable logic, circuitry, interfaces, and/or code that is configured to store the set of instructions, which may be executed by the control unit. In an embodiment, the memory may be configured to store one or more programs, routines, or scripts that may be executed in coordination with the control unit. The memory may be implemented based on a Random Access Memory (RAM), a Read-Only Memory (ROM), a Hard Disk Drive (HDD), a storage server, and/or a Secure Digital (SD) card. In an embodiment, the control unit is at least one of a vehicle control unit, an engine control unit, an immobilizer unit and an integrated starter generator controller. In an embodiment, the control unit refers to any microcontroller bestowed with the task of controlling ignition, transmission and prime mover parameters such as load on the prime mover, torque, vehicle speed and other aspects of transmission. In another embodiment, the control unit refers to a microcontroller bestowed with the task of controlling at least one of a steering lock, knob rotation, charging port lock, fuel cap lock, ignition lock, utility box lock and seat lock. In another embodiment, the control unit comprises of one or more control unit bestowed with functions associated with the control unit as per the present disclosure.
[00051] In an aspect, the prime mover with reference to the vehicle may be a motor, an internal combustion engine or a combination thereof. The prime mover is configured to convert the energy being transmitted into work. The prime mover is communicatively connected to the control unit of the vehicle.
[00052] At step 110, upon satisfaction of the second set of pre-defined conditions the control unit generates an authentication question. The authentication question is based on a second unique code. The second unique code is only shared amongst authorized personnel pertinent to the vehicle. The authentication question generated by the control unit is configured to manipulate aspects of the second unique code and formulate the same in the form of a question or message comprising at least one of a pattern, a code, a sequence of alphanumeric elements, a string of numbers, a message, a quick response code, a barcode, configured to be robust enough to eliminate possibility of duplicate or fake identifiers. At the outset, the authentication question transmitted by the control unit does not contain the second unique code visibly or evidently but is rather a manipulation of the second unique code. The authentication question serves as an encrypted code serving the purpose of protecting classified information and maintaining only authorized access to the vehicle. Concomitantly, the authentication solution computed by the control unit is an encrypted message as well which is a solution to the generated authentication question. The authentication solution is stored in the control unit and not transmitted in any form.
[00053] At step 112, the authentication unit is configured to communicate an authentication response from the verified electronic device to the control unit. The authentication response comprises of a user response to the generated authentication question. The verified electronic device serves as an interface between the authentication unit and the user. The user provides the authentication response to the generated authentication question through the electronic device to the authentication unit and then to the control unit.
[00054] At step 114, the authentication unit is configured to authenticate the verified electronic device upon satisfaction of the third set of pre-defined conditions. Upon receipt of the authentication response, the control unit maps the authentication response to the authentication solution computed at step 110 to check for satisfaction of the third set of pre-defined conditions. The third set of pre-defined conditions are deemed satisfied when the received authentication response matches the computed authentication solution. Upon satisfaction of the third set of pre-defined conditions, the control unit is configured to receive one or more user inputs from the authenticated electronic device and perform one or more functions based on the one or more user inputs.
[00055] In an aspect, when the third set of pre-defined conditions are not satisfied, the control unit is configured to generate a different authentication question associated with the pre-stored second unique code. The control unit computes the authentication solution associated with the different authentication question. The control unit is configured to generate different authentication questions based on non-satisfaction of the third set of pre-defined conditions up to a pre-defined count. The pre-defined count is a pre-set number of iterations. In an embodiment, the pre-defined count being 5. In an aspect, each generated authentication question being unique, and the authentication solution being computed in real-time for each authentication question. The disclosed configuration of the control unit ensures non-duplicity of authentication questions, authentication solutions as well as authentication response. Further, since only the authentication question is being transmitted by the control unit instead of a key which is transmitted in conventional keyless systems, the propensity of brute attacks to acquire this authentication question would be fruitless, thus ensuring only authorized access to the vehicle.
[00056] Certain number of locks are provided on every vehicle by the manufacturer to ensure the safety of the vehicle, to prevent theft. These locks are generally ignition locks, steering lock, fuel cap lock, storage container lock in two wheelers, and door lock, boot lock and steering lock in four wheelers. Instead of providing separate key for each of these locks, generally a vehicle is made such that a single key can be used to open each of these locks.
[00057] In an aspect, the one or more functions of the control unit being performed upon satisfaction of the third set of pre-defined conditions comprising one of disabling one or more components of the vehicle and enabling one or more components of the vehicle. In an embodiment, the one or more components of the vehicle comprises at least one of a steering lock, a fuel cap lock, a charging port, an ignition lock, a utility box lock, a seat lock, knob rotation lock.
[00058] Manufacturers provide vehicle owners key fobs equipped with radio transceivers to communicate with the systems of the vehicle to implement keyless entry and exit as an alternative to physical keys. Keys can break physically, and a key can also be cumbersome to use in a vehicle. Generally, in a vehicle, the same key gives access to every lock. In a two wheeled vehicle, generally, the same key is used for steering lock, ignition lock, fuel cap lock, and storage compartment lock. In four wheeled vehicles, the same key serves as door locks, ignition lock and boot lock. Key fobs on the other hand are generally programmed to open a single lock at a time. In sophisticated key fobs, multiple locks may be provided for each of the locks on a vehicle. Generally, however, a key fob may only have the feature to unlock the steering lock or door lock. Key fobs often work on near field communication (NFC) based technologies. Therefore, as a necessity, the key fob has to be held near a vehicle to actuate the keyless entry and exit.
[00059] An inherent disadvantage of any wireless system such as the NFC in key fob is that it is prone to hacking. Someone with appropriate equipment and knowledge of the systems can effectively steal data as it is being transmitted. A vehicle’s systems, including its key fob can also be hacked. In such a scenario, the vehicle may be prone to theft. The key fobs are generally programmed to generate a key code unique to the vehicle. That key code is transmitted. All vehicles in the vicinity of the key fob will receive the transmission, but only the vehicle unique to the key code will get unlocked. However, this key code can be hacked during transmission. It can also be the case that the key less entry and exit systems are subject to a brute force attack.
[00060] To try to counter this, keyless entry and exit systems were developed using other wireless communication systems such as Bluetooth. However, it was found that the Bluetooth systems that were made are susceptible to brute force attacks. A brute force attack is where if the nature of a passcode is known, a system enters all possible combinations of characters, letters and numbers while trying to gain entry. If all possible combinations are tried, one of the combinations will lead to the correct passcode, and the system gets breached.
[00061] The present subject matter in accordance with the present disclosure through a multi-layer security verification overcomes the above-mentioned technical problems associated with theft and unauthorized access to the vehicle.
[00062] In an aspect, the one or more user input through the authenticated electronic device comprises at least one of locking of the vehicle where the control unit being configured to enable the one or more components of the vehicle based on the locking and unlocking of the vehicle where the control unit being configured to disable the one or more components of the vehicle based on the unlocking.
[00063] In an aspect, upon receiving an unlocking input from the authenticated electronic device, the control unit is configured receive the speed of the vehicle through one or more sensors disposed in the vehicle. The control unit then compares the vehicle speed with a pre-defined threshold speed. In an embodiment the pre-defined threshold comprises of a vehicle speed range of 0 to 5 kmph. In the event of the vehicle speed being beyond the pre-defined threshold speed, the control unit transmits a signal to the prime mover of the vehicle to decelerate the vehicle to the pre-defined threshold speed. Upon the vehicle speed being within the pre-defined threshold speed, the control unit enables the locking of one or more components of the vehicle.
[00064] The method for authenticating the keyless entry and exit ends at step 116.
[00065] Figure 2 is an exemplary illustration of a flow diagram representing the method for authenticating keyless entry, in accordance with some embodiments of the present disclosure.
[00066] With reference to Figure 2, the flow diagram (200) illustrates an exemplary embodiment of the method illustrated in figure 1 for authenticating keyless entry into the vehicle.
[00067] The flow diagram (200) starts at step 201. At step 201, the first communication module is passively scanning for the first unique code of the second communication module. In an aspect, the first communication module is provided in the authentication unit while the second communication module is provided in an electronic device. In an embodiment, the first communication module is a Bluetooth module and the second communication module is a Bluetooth module. In an embodiment, the second communication module is interchangeably termed as a second communication key as illustrated in Figure 2. In an embodiment, the electronic device is a mobile device of the user.
[00068] The first communication module is a low power consuming device, and is configured to conduct the scan even when the energy storage device of the vehicle is depleted. In an embodiment, the first communication module has an auxiliary energy storage device connected to it.
[00069] At step 202, it is checked whether a pre-stored first unique code stored in the authentication unit matches to the first unique code of the second communication module in the user’s electronic device.
[00070] In the event, the determination at step 202 is negative, then the first communication module of the authentication unit resumes passive scanning as illustrated by step 203 and done in step 201. However, if the determination at step 202 is positive, the flow diagram (200) proceeds to 204.
[00071] At step 204, the authentication unit checks the strength of the connection existent between the authentication unit and the electronic device. If the strength of the connection is less than a pre-defined threshold limit in terms of decibels (depicted as XX decibels), the flow diagram (200) stands by without taking any action as illustrated in step 205.
[00072] In the event at step 204, the strength of the connection is determined to be greater than the pre-defined threshold limit in terms of decibels (depicted as XX decibels), the flow diagram (200 proceeds to step 206.
[00073] At step 206, the authentication unit transmits an authentication question to the electronic device, wherein the authentication question is generated by a control unit disposed in the vehicle. The authentication question may be interchangeably referred to as a challenge. With reference to the generated authentication question, a control unit computes an authentication solution while the electronic device computes an authentication response to the same authentication question. In an embodiment, the authentication response is referred to as a secondary key as illustrated in Figure 2. The electronic device transmits the authentication response to the control unit through the authentication unit, and the control unit compares the values of the authentication response and authentication solution. If the values do not match, the flow diagram (200) stands by step 207. In an aspect, a different authentication question is generated with step 206 running in a loop up to a pre-defined count.
[00074] In the event the values of the authentication response and authentication solution match, the control unit transmits a signal to the lockpad as illustrated in step 208.
[00075] At step 209, the control unit checks for the state of one or more components of the vehicle. In an embodiment, the one or more components of the vehicle being the steering lock. If the steering is locked, the control unit actuates the steering to be unlocked, and the flow diagram (200) proceeds to step 211. Otherwise, if the steering is unlocked, the flow diagram (200) directly proceeds to step 211.
[00076] At step 211, the control unit and the authentication unit turns on the vehicle loads so as to allow the vehicle to be started. In an embodiment, the control unit is a vehicle control unit and the authentication unit is a speedometer disposed in the infotainment cluster of the vehicle. At step 212, the ignition of the vehicle is enabled.
[00077] Figure 3 is an exemplary illustration of a flow diagram representing the method for authenticating keyless exit, in accordance with some embodiments of the present disclosure.
[00078] With reference to Figure 3, the flow diagram (300) illustrates an exemplary embodiment of the method illustrated in figure 1 for authenticating keyless exit from the vehicle.
[00079] At step 301, the first communication module scans for the first unique code of the second communication module of the electronic device. If the first unique code matches with the pre-stored first unique code, the flow diagram (300) proceeds to step 302.
[00080] At step 302, the authentication unit checks for the strength of the connection between the authentication unit and the electronic device.
[00081] If the strength of the connection is less than a pre-defined threshold limit in terms of decibels (depicted as XX decibels), the flow diagram (300) stands by without taking any action for a pre-determined time as illustrated in step 303. At step 303, the flow diagram (300) proceeds to step 307 after standing by for the predetermined time.
[00082] If the strength of the connection is greater than the pre-defined threshold limit in terms of decibels (depicted as XX decibels), the flow diagram (300) proceeds to step 304. At step 304, the authentication unit checks whether the lock / unlock button has been pressed. If the button has not been pressed, the system waits for the button to be pressed as illustrated in step 305. If the button is pressed a single time or multiple times, the flow diagram (300) proceeds to step 306.
[00083] At step 306, the flow diagram (300) determines the vehicle speed. If the vehicle speed is greater than a pre-defined threshold speed the ignition is turned off in step 307. In an embodiment, the pre-defined threshold speed is 5 kilometres per hour. Otherwise, if the speed is lesser than the predetermined value (5 kilometres per hour), the VCU (106) actuates the lockpad to deploy the steering lock.
[00084] At step 307, the flow diagram (300) turns of the ignition of the vehicle and turns off all loads.
[00085] Figure 4 illustrates a block diagram depicting a system for implementing a keyless entry and exit in a vehicle, in accordance with some embodiments of the present disclosure.
[00086] With reference to figure 4, 400 denotes a system for implementing a keyless entry and exit in a vehicle, 402 denotes a vehicle, 404 denotes an authentication unit, 406 denotes a control unit and 408 denotes an electronic device.
[00087] In an aspect, the authentication unit (404) and the control unit (406) are disposed in the vehicle (402) while the electronic device (408) is an authorized user’s personal device located external to the vehicle (402).
[00088] In an aspect, the authentication unit (404), the control unit (406) and the electronic device (408) and communicably connected to each other. The control unit (406) and the electronic device (408) and communicably connected to each other through the authentication unit (404).
[00089] In an aspect, the electronic device (408) is configured to communicatively couple to the authentication unit (404).
[00090] In an embodiment of the present subject matter, a vehicle (402) with a frame, a plurality of wheel, a prime mover and a transmission system is configured with multiple electronic control systems. The vehicle also contains a central infotainment cluster, which may or may not have a display screen. The infotainment cluster of the vehicle has a Bluetooth transceiver system, a processing unit, a memory unit and one or more wired connections.
[00091] In an aspect, the authentication unit (404) is configured to passively scan a pre-defined region for presence of the electronic device (408) of an authorized user and connect with the electronic device (408) on satisfaction of a first set of pre-defined conditions. The first set of pre-defined conditions is associated with a first unique code of the electronic device (408). The first set of pre-defined conditions is satisfied when the first unique code of the electronic device (408) matches a pre-stored first unique code of the authentication unit (404). The authentication unit (404) additionally verifies an authenticity of the electronic device (408) upon satisfaction of a second set of pre-defined conditions associated with a strength of connection between the electronic device (408) and the authentication unit (404). The second set of pre-defined conditions is satisfied when the strength of connection between the electronic device (408) and the authentication unit (404) being within a pre-defined threshold limit.
[00092] In an aspect, the control unit (406) is configured to generate an authentication question, wherein the authentication question being generated based on a pre-stored second unique code. The control unit (406) also computes an authentication solution associated with the generated authentication question and transmits the authentication question to the verified electronic device (408) through the authentication unit (404). Based on the transmitted authentication question, the control unit (406) receives an authentication response. The authentication response is a user response from the verified electronic device (408). The control unit (406) authenticates the verified electronic device (408) upon satisfaction of a third set of pre-defined conditions. The third set of pre-defined conditions is satisfied when the received authentication response matches the computed authentication solution. Upon satisfaction of the third set of pre-defined conditions, the control unit (406) is configured to receive one or more user inputs from the authenticated electronic device (408) to perform one or more functions.
[00093] In an aspect, the one or more functions based on the one or more user inputs being one of: disabling one or more components of a vehicle when the one or more user inputs being of unlocking; and enabling the one or more components of the vehicle when the one or more user inputs being of locking. In an embodiment, the one or more components being at least one of a steering lock, a fuel cap lock, a charging port, an ignition lock, a utility box lock, a seat lock, knob rotation lock.
[00094] Figure 5 illustrates an exemplary block diagram representing the system for keyless entry and exit with one or more components, in accordance with some embodiments of the present disclosure.
[00095] At the outset, figure 5 illustrates an exemplary embodiment of the system for keyless entry and exit illustrated in figure 4.
[00096] With reference to figure 5, 501 denotes a vehicle. 502 denotes an infotainment cluster, 503 denotes a processor of the infotainment cluster, 504 denotes a Bluetooth module of the infotainment cluster, 505 denotes an engine control unit, 506 denotes a vehicle control unit, 507 denotes an ignition and engine control, 508 denotes one or more components of the vehicle, 509 denotes a steer lock, 510 denotes an electronic device being a mobile device, 511 denotes a second Bluetooth module of the mobile device, 512 denotes a secondary authenticator and 513 denotes a processor of the mobile device.
[00097] The system (500) comprises a vehicle (501) and an electronic device being a handheld (mobile) device (510). The vehicle has an infotainment cluster (502). The infotainment cluster (502) comprises a processor (503), a first Bluetooth module (504), and a memory unit (not shown). The infotainment cluster (502) is communicatively connected to the Engine Control Unit (ECU) (505) and the Vehicle Control Unit (VCU) (506). The ECU (505) and VCU (506) are connected to the infotainment cluster (502) via CAN bus connectors. The VCU (506) is further communicatively connected to the ignition and engine control (507), the seat / fuel cap / charger port control (508), and the steering lock (509). In an embodiment, the engine control unit (505) and the vehicle control unit (506) are combined to form a single control unit.
[00098] In another embodiment of the present subject matter, the infotainment cluster is communicatively connected to an Engine Control Unit (ECU) and a Vehicle Control Unit (VCU). The ECU is configured to control an electronic fuel injection (EFI) system of the vehicle, and an ISG system. According to the present embodiment of the subject matter, the VCU controls a steering lock, an ignition and engine lock, and the lock for the seat, fuel cap and charger port. The locks are opened and closed by actuators which are controlled by the VCU. In an embodiment, the VCU enables the actuators to open / close any of the locks according to a signal received from the Bluetooth transceiver and processing unit in the infotainment cluster.
[00099] According to the embodiment, the mobile device (510) has a second Bluetooth module (511), a processor (513), a memory unit (not shown). The memory unit of the mobile device (510) has a method for secondary authentication (512) stored in it to determine the authentication response to the authentication question generated by the control unit according to an embodiment. The first Bluetooth module (504) and the second Bluetooth module (511) can communicatively connect to each other wirelessly.
[000100] In an embodiment of the present invention, the handheld wireless electronic device (510) of the user has a Bluetooth transceiver (511), a processing unit (513), a memory unit (not shown), and an application for a secondary authentication. According to the present subject matter, the handheld electronic device (510) with the user and the infotainment cluster (502) on the vehicle (501) are able to establish a wireless communication channel at a certain range of frequency using the Bluetooth protocol, being implemented by the Bluetooth transceivers on either device. In another embodiment, the handheld electronic device (510) has a processor (513) which is capable of implementing the application for secondary authentication in the electronic device (510) and generate a result value which is the authentication response.
[000101] In an aspect, the vehicle (501) is a hybrid or an electric vehicle, where the component ECU (505) is omitted from system (500) illustrated in Figure 5.
[000102] In an embodiment, when the user walks away from the vehicle, and is at least a predefined distance away, the VCU stops the various systems of the vehicle, and actuates the various locks on the vehicle such as the steering lock, fuel cap lock etc after a predetermined time has passed after doing one or more checks. According to the present embodiment, the vehicle is additionally configured with a lock / unlock button, which can be physically actuated by the user to lock / unlock the vehicle when the handheld device is within a predetermined distance of the vehicle.
[000103] As per an embodiment, the one or more checks in the previous embodiment comprises whether the speed of the vehicle is greater than a predetermined value. The predetermined value according to the present embodiment is 5 kilometres per hour. If the VCU determines that the vehicle is moving at a speed greater than the predetermined speed, it will stop ignition. If the speed is determined to be less than 5 kilometres per hour, the VCU actuates the steering lock.
[000104] As per an embodiment of the present subject matter, the one or more checks comprises checking whether the lock / unlock button has been clicked multiple times. If it is determined that the button has been clicked a plurality of times, the vehicle speed check of the one or more checks is carried out by the VCU. This is provided as it may happen that the user loses or accidentally drops his / her handheld device while traveling on the vehicle. The engine will automatically shut down while the user has complete control over the steering of the vehicle to prevent any accident. If the vehicle is stationary, and the device is away from the vehicle, the vehicle simply undergoes a steering lock preventing any movement of the vehicle.
[000105] The terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some embodiments”, and “one embodiment” mean “one or more (but not all) embodiments of the invention(s)” unless expressly specified otherwise. The terms “including”, “comprising”, “having” and variations thereof mean “including but not limited to”, unless expressly specified otherwise. The terms “a”, “an” and “the” mean “one or more”, unless expressly specified otherwise.
[000106] The disclosed claimed limitations and the disclosure provided herein provides a system for authentication keyless entry and exit and a method for authenticating the keyless entry and exit in a more efficient and secure manner. The claimed invention in an aspect provides enhanced safety to the vehicle and develops a theft proof keyless entry and exit system which is deemed invincible to potential brute attacks.
[000107] Thus, the disclosed seamless entry and exit method for a keyless entry system tries to overcome the technical problem of unauthorized brute attacks and security issues by providing a multi-layer protection in authenticating access to the vehicle.
[000108] The advantages of the present subject matter as described in the embodiments are that the system as described is resistant to brute force attacks. When the first set of pre-defined conditions, second set of pre-defined conditions and the third set of pre-defined conditions are not satisfied , the control unit changes the authentication question, which is again changed if the subsequent authentication responses do not match again. Since the authentication question itself changes, even a brute force attack will fail as the brute force attack relies on entering every possible iteration of the available characters. Moreover, to unlock the vehicle, there are three levels of authentication, first that the user has to match its electronic device with a first unique code, second is establishing a connection strength by being close to the vehicle, and third the user’s electronic device has to authenticate itself by decrypting the authentication question being a challenge code given by the control unit.
[000109] Thus, the claimed limitations overcome the aforementioned technical problems by providing multiple levels of security to ensure a safe and efficient operating environment for the vehicle by an authorized user.
[000110] In light of the above-mentioned advantages and the technical advancements provided by the disclosed method and system, the claimed steps as discussed above are not routine, conventional, or well understood in the art, as the claimed steps enable the following solutions to the existing problems in conventional technologies. Further, the claimed steps clearly bring an improvement in the functioning of the device itself as the claimed steps provide a technical solution to a technical problem.
[000111] A description of an embodiment with several components in communication with another does not imply that all such components are required. On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the invention.
[000112] Finally, the language used in the specification has been principally selected for readability and instructional purposes, and it may not have been selected to delineate or circumscribe the inventive subject matter and is therefore intended that the scope of the invention be limited not by this detailed description, but rather by any claims that issue on an application based here on. Accordingly, the embodiments of the present invention are intended to be illustrative, but not limiting, of the scope of the invention, which is set forth in the following claims.
[000113] While various aspects and embodiments have been disclosed herein, other aspects and embodiments will be apparent to those skilled in the art. The various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope and spirit being indicated by the following claims.
[000114] The present disclosure may be realized in hardware, or a combination of hardware and software. The present disclosure may be realized in a centralized fashion, in at least one computer system, or in a distributed fashion, where different elements may be spread across several interconnected computer systems, a computer system or other apparatus adapted for carrying out the methods described herein may be suited. A combination of hardware and software may be a general-purpose computer system with a computer program that, when loaded and executed, may control the computer system such that it carries out the methods described herein. The present disclosure may be realized in hardware that comprises a portion of an integrated circuit that also performs other functions.
[000115] A person with ordinary skills in the art will appreciate that the systems, modules, and sub-modules have been illustrated and explained to serve as examples and should not be considered limiting in any manner. It will be further appreciated that the variants of the above disclosed system elements, modules, and other features and functions, or alternatives thereof, may be combined to create other different systems or applications.
[000116] Those skilled in the art will appreciate that any of the aforementioned steps and/or system modules may be suitably replaced, reordered, or removed, and additional steps and/or system modules may be inserted, depending on the needs of a particular application. In addition, the systems of the aforementioned embodiments may be implemented using a wide variety of suitable processes and system modules, and are not limited to any particular computer hardware, software, middleware, firmware, microcode, and the like. The claims can encompass embodiments for hardware and software, or a combination thereof.
[000117] While the present disclosure has been described with reference to certain embodiments, it will be understood by those skilled in the art that various changes may be made, and equivalents may be substituted without departing from the scope of the present disclosure. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the present disclosure without departing from its scope. Therefore, it is intended that the present disclosure not be limited to the particular embodiment disclosed, but that the present disclosure will include all embodiments falling within the scope of the appended claims.
,CLAIMS:We claim,
1. A method (100) for authenticating a keyless entry and exit, the method (100) comprising steps of:
passively scanning (104), by an authentication unit (404), a pre-defined region for presence of an electronic device (408) of an authorized user,
wherein the electronic device (408) comprising a first unique code;
connecting (106), by the authentication unit (404), the electronic device (408) with the authentication unit (404) upon satisfaction of a first set of pre-defined conditions, wherein the first set of pre-defined conditions being associated with the first unique code;
verifying (108), by the authentication unit (404), an authenticity of the electronic device (408) upon satisfaction of a second set of pre-defined conditions, wherein the second set of pre-defined conditions being associated with a strength of connection between the electronic device (408) and the authentication unit (404);
communicating (110) an authentication question, by the authentication unit (404), from a control unit (406) to the verified electronic device (408) upon satisfaction of the second set of pre-defined conditions,
wherein the authentication question being generated by the control unit (406) based on a pre-stored second unique code, and
wherein an authentication solution being computed by the control unit (406), the authentication solution being associated with the generated authentication question;
communicating (112) an authentication response, by the authentication unit (404), from the verified electronic device (408) to the control unit (406),
wherein the authentication response comprises of a user response to the generated authentication question;
authenticating (114), by the authentication unit (404), the verified electronic device (408) upon satisfaction of a third set of pre-defined conditions,
wherein upon authentication, the control unit (406) being configured to receive one or more user inputs from the authenticated electronic device (408) and perform one or more functions based on the one or more user inputs.
2. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the first set of pre-defined conditions being satisfied when the first unique code of the electronic device (408) matches a pre-stored first unique code, wherein the pre-stored first unique code being stored in the authentication unit (404).
3. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the second set of pre-defined conditions being satisfied when the strength of connection between the electronic device (408) and the authentication unit (404) being within a pre-defined threshold limit.
4. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the third set of pre-defined conditions being satisfied when the received authentication response matches the computed authentication solution.
5. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the one or more functions based on the one or more user inputs being one of:
disabling one or more components of a vehicle (402); and
enabling the one or more components of the vehicle (402),
wherein the one or more components being at least one of a steering lock, a fuel cap lock, a charging port, an ignition lock, a utility box lock, a seat lock, knob rotation lock.
6. The method (100) for authenticating the keyless entry and exit as claimed in claim 5, wherein the one or more user inputs being one of:
Locking of the vehicle (402),
wherein the control unit (406) being configured to enable the one or more components of the vehicle (402) based on the locking; and
unlocking of the vehicle (402),
wherein the control unit (406) being configured to disable the one or more components of the vehicle (402) based on the unlocking.
7. The method (100) for authenticating the keyless entry and exit as claimed in claim 6, wherein upon receiving the one or more user inputs being unlocking of the vehicle (402), the control unit (406) being configured to:
Receive a vehicle speed from one or more sensors disposed in the vehicle (402);
compare the vehicle speed with a pre-defined threshold speed,
wherein the control unit (406) being configured to transmit a signal to a prime mover of the vehicle (402) to decelerate the vehicle (402) to the pre-defined threshold speed when the vehicle speed being beyond the pre-defined threshold speed; and
enable the one or more components of the vehicle (402) when the vehicle speed being the pre-defined threshold speed.
8. The method (100) for authenticating the keyless entry and exit as claimed in claim 4, wherein upon non-satisfaction of the third set of pre-defined conditions the control unit (406) being configured to:
generate a different authentication question associated with the pre-stored second unique code; and
compute the authentication solution associated with the different authentication question,
wherein the control unit (406) being configured to generate different authentication question up to a pre-defined count upon the non-satisfaction of the third set of pre-defined conditions, and
wherein each generated authentication question being unique and the authentication solution being computed in real-time for each authentication question.
9. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the authentication unit being a speedometer of the vehicle (402) provided with a communication module.
10. The method (100) for authenticating the keyless entry and exit as claimed in claim 1, wherein the control unit (406) being at least one of a vehicle control unit, an engine control unit, an integrated starter generator controller and an immobilizer unit.
11. A system (400) for authentication keyless entry and exit, the system (400) comprising:
electronic device (408) being configured to be communicatively coupled to an authentication unit (404);
the authentication unit (404) being disposed on a vehicle (402) and being configured to
passively scan a pre-defined region for presence of the electronic device (408) of an authorized user,
connect with the electronic device (408) on satisfaction of a first set of pre-defined conditions,
wherein the first set of pre-defined conditions being associated with a first unique code of the electronic device (408), and
verify an authenticity of the electronic device (408) upon satisfaction of a second set of pre-defined conditions associated with a strength of connection between the electronic device (408) and the authentication unit (404); and
a control unit (406), the control unit (406) being configured to
generate an authentication question,
wherein the authentication question being generated based on a pre-stored second unique code,
compute an authentication solution associated with the generated authentication question,
transmit the authentication question to the verified electronic device (408) through the authentication unit (404),
receive an authentication response being a user response from the verified electronic device (408),
authenticate the verified electronic device (408) upon satisfaction of a third set of pre-defined conditions, and
receive one or more user inputs from the authenticated electronic device (408) to perform one or more functions.
12. The system (400 )for authentication keyless entry and exit as claimed in claim 12, wherein
the first set of pre-defined conditions being satisfied when the first unique code of the electronic device (408) matches a pre-stored first unique code of the authentication unit (404);
the second set of pre-defined conditions being satisfied when the strength of connection between the electronic device (408) and the authentication unit (404) being within a pre-defined threshold limit; and
the third set of pre-defined conditions being satisfied when the received authentication response matches the computed authentication solution.
13. The system (400) for authentication keyless entry and exit as claimed in claim 12, wherein the one or more functions based on the one or more user inputs being one of:
Disabling one or more components of a vehicle (402) when the one or more user inputs being of unlocking; and
enabling the one or more components of the vehicle (402) when the one or more user inputs being of locking,
wherein the one or more components being at least one of a steering lock, a fuel cap lock, a charging port, an ignition lock, a utility box lock, a seat lock, knob rotation lock.
| # | Name | Date |
|---|---|---|
| 1 | 202241019775-PROVISIONAL SPECIFICATION [31-03-2022(online)].pdf | 2022-03-31 |
| 2 | 202241019775-FORM 1 [31-03-2022(online)].pdf | 2022-03-31 |
| 3 | 202241019775-DRAWINGS [31-03-2022(online)].pdf | 2022-03-31 |
| 4 | 202241019775-DRAWING [28-03-2023(online)].pdf | 2023-03-28 |
| 5 | 202241019775-CORRESPONDENCE-OTHERS [28-03-2023(online)].pdf | 2023-03-28 |
| 6 | 202241019775-COMPLETE SPECIFICATION [28-03-2023(online)].pdf | 2023-03-28 |
| 7 | 202241019775-FORM 18 [10-11-2023(online)].pdf | 2023-11-10 |
| 8 | 202241019775-FER.pdf | 2025-01-29 |
| 9 | 202241019775-FORM 3 [03-02-2025(online)].pdf | 2025-02-03 |
| 10 | 202241019775-Response to office action [28-07-2025(online)].pdf | 2025-07-28 |
| 11 | 202241019775-FER_SER_REPLY [28-07-2025(online)].pdf | 2025-07-28 |
| 12 | 202241019775-DRAWING [28-07-2025(online)].pdf | 2025-07-28 |
| 13 | 202241019775-CORRESPONDENCE [28-07-2025(online)].pdf | 2025-07-28 |
| 14 | 202241019775-COMPLETE SPECIFICATION [28-07-2025(online)].pdf | 2025-07-28 |
| 15 | 202241019775-CLAIMS [28-07-2025(online)].pdf | 2025-07-28 |
| 16 | 202241019775-ABSTRACT [28-07-2025(online)].pdf | 2025-07-28 |
| 1 | SearchHistoryE_31-12-2024.pdf |