FORM 2
THE PATENT ACT, 1970,
(39 OF 1970)
&
THE PATENTS RULE, 2003
COMPLETE SPECIFICATION
(SEE SECTION 10; RULE 13)
"SECURITY SYSTEM FOR VEHICLE AFTER SALES"
MAHINDRA & MAHINDRA LIMITED
AN INDIAN COMPANY,
R&D CENTER, AUTOMOTIVE SECTOR,
89, M.I.D.C, SATPUR,
NASHIK-422 007,
MAHARASHTRA, INDIA.
THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES AND ASCERTAINS THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED
FIELD OF THE INVENTION:-
The present invention relates to the motor vehicle security systems' after
sales handling system which consists of an immobilizer especially an
* electronic key based immobilizer which needs paring of one or more units
together to ensure the vehicle security. The disclosed invention acts on the
system components in the immobilizer system which is paired using the
uniquely identifiable data exchanges among the components. The after sales
system consists of data capturing system, field security system, server
system. The data capturing system captures all the required data from the
vehicle components in the immobilizer system while manufacturing of the
system. Field security system interacts with the vehicle and the vehicle
components to ensure the safe and secure service. This will be used by the
technicians in the field. The server system which will be used by the vehicle
manufacture to perform any service in the vehicle at field, this will interact with
the server and uses the vehicle data to perform the secure service. Both field
security systems and server security system operate in synchronous manner
and performs the service vehicle. The after sales security system will be used
in case of replacement/ repair of the vehicle security system component(s).
BACKGROUND AND PRIOR ART SEARCH:-
The present vehicle security systems present in the literature discussed about how to make system more secure once the system components are in place. Once the system components are paired with other security system components, the system will operate to secure the vehicle, but during the time of repair of any one of the system components leaves an opportunity to manipulate the other system components. The system during repair and such similar scenarios the integrity of the system has to be ensured by the other system components. This has not been addressed in any of the literature. The disclosed invention addresses this problem and ensures the system maintains its integrity.
The possession of the required tools to perform the repair in the field by the authorised person is available. In many cases the authorised tools are used to perform the illegal activities in the vehicles. This could be a very vulnerable point in the system especially the data related to the security components are revealed. The disclosed invention has taken measures to secure the tools which avoid this possibility of misusing the tools in the field.
In the field also vehicle come for repairing of any of the components the security codes used by the system is constant when next time similar or same service is performed in the vehicle. This increases the risk of the over all system. This service codes also has to be rolling nature with the high complexity levels and makes the security of the system more robust.
In most of the scenarios the authenticity of the tool and authenticity of the service person, and genuinely of the service is not assessed. The disclosed invention performs all these activities before performing the final required operation.
The vehicle belong to one geographic zones are getting repaired with other geographical zones which allows the vehicle hi-jacking from one place to another place and required security components are refitted or re-paired. This is huge security concern, the disclosed system address the will have the centralised servicing of all the vehicles which will avoid such instances. Service to the particular vehicle can be blocked by the customer and authorised person so that hi-jacked vehicles or stolen vehicles can not be serviced.
OBJECTS OF THE PRESENT INVENTION:-
The object of the present invention is to provide the secure after sales system for the vehicle security system which consists of the electronic immobilizer. The object is achieved by the system which consists of server (30), field security tool (12), server security tool (29) and live data capturing system (10).
STATEMENT OF INVENTION
Accordingly invention provides a security system for vehicle after sales comprises an immobilizer the electronically coded key, ECUs of vehicles and centralised server interconnected with secure communication by a live data capturing system for collecting data from various ECUs of vehicles getting manufactured in all the plants of organisation.
BRIEF DESCRIPTION OF THE DRAWINGS:-
Fig: 1 illustrates the data capturing system. Data are captured from the
vehicle (9) which consists of the many ECUs. Live data capturing system (10)
uploads the data into the server (30).
Fig 2: illustrates the various communications involved in the system between
the all the elements of the system.
Fig 3: illustrates field security tool (12) and its various components.
Fig 4: illustrates server security tool (29) and its various components.
Fig 5: .illustrates server (30) and its various components.
SUMMARY OF THE INVENTION:-
The present invention relates to the motor vehicle security systems' after sales handling system which consists of an immobilizer especially an electronic key based immobilizer which needs paring of on or more units together to ensure the vehicle security.
The after sales system includes the data capturing unit which captures the data while vehicle manufacturing and all the data are uploaded in the server in the data space. These data are used to in the field to perform all the services required to the vehicle. Based on this data the validity and authenticity of the vehicle under service will be decided.
Field security system will communicate with the vehicle components and the required information are extracted from the vehicle security units and the
request AP (5) is formed based on the crypto and send to the server security system. Upon the valid response from the server security system the required service will be allowed. The operation of the tool will be monitored and in case of un-wanted attempts the field security system will get restrict itself from using the tool. Field tools can handle the multiple services at the same time by maintaining the sessions of the system and each system has its expiry time scales, all these request responses are executed in the sequential way.
The field security tool has special mechanism to handle the user authorisation related information which can not be reproduced and modified. This is referred to authenticate the user of the field service tool in the initial level. But however the identity and the authorisation of the field security system will be decided and the accordingly the activities are blocked.
All the services required to the vehicle can be performed after the successful pass through of all the access control mechanism. In this process itself the validity of the service is evaluated and accordingly the service is handled.
Server security system which communicates with the server to responds to all the requests from the field service tool. Data generated during the manufacturing is used during the vehicle authorisation the server security tool also decoded the requests sent by the field security tool and the validity of the field security tool, validity of the service and the validity of the vehicle components are all decided. Upon the authorised situation the response to the field security tool is controlled.
The server security tool also identifies the machine in which it is running and the user who is control of the server security tool will be authenticated by the data stored in the server. Upon the detection of any un-authorised conditions, the tool restricts itself and further use of the tool is blocked.
Server is the integral part of the after sales security system which has all the vehicle security components data which are extracted from them during the vehicle manufacturing and is stored.
The server also stores al the histories of service performed and the data corresponds to the repaired parts compared in deciding the genuineness of the service. Which eliminates the at of using the old security system components during serving the vehicle this avoids fiddling around the system with the valid but not live part.
During certain services, all the security system parameters are also re assigned to ensure the liveliness of the new pair. In this case the usage old repaired components rejected components are restricted from use.
The after sales system has the ability to read the system parameters which are not assigned to the vehicle security system, using this nature the new component before assigning itself the validity of the component is ensured. During services, the vehicle security system information is rolled / randomly changed and he the same is backed up to the server indirectly before the data is data is actually getting uploaded in the server ensures the data integrity of the system.
Since the server is the integral part of the whole system, the vehicle can be restricted from service in case of the theft or any unwanted situations.
THE DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT OF THE PRESENT INVENTION:-
The Invention is described with referring figure 1 to 5 drawings as follows:-
Figure 1:
Fig: 1 explains the live data capturing mechanism in place. This consists of the Live data capturing system (10) which collects the data from the vehicle (9). From the vehicle (9), data from various ECUS as mentioned in the figure (ECU1, ECU2,...ECU N) are collected and the data is getting stored in the centralized Server (11). The Data capturing system (10). The vehicle (9)
mentioned here is the vehicle getting manufactured in all the plants across the organisation.
Figure 2:
Fig 2: illustrates the various communications involved in the system between the all the elements of the system.
this involves the vehicle(1) to be serviced secured , Field security system (2) tool which securely communicates with the additional security layer to the server security tool(3). the server security tool refers and generates the necessary secured data and maintains in the server(4). The server security tool (3) also establishes the secure communication via AP(5), EP(6),H1(7),H2(8) transactions with the Field security tool(2).
Figure 3:
Fig 3: illustrates field security tool (12) and its various components.
This tool will be used the person who performs the repair work on the vehicle. The tool has the Diagnostics (13) capability which will help in exactly identifying the failure after which the necessary service to be done will be decided. The tool has a User Interface (20) which securely checks the credentials of the user as well as the machine. The users activity in the tool has been monitored and reported by User Activity Monitoring and reporting module (23) by which the wrong usage of the tools is restricted. User authorisation module (24) verifies the user credentials in the background. Access control (21 ) which is contains the secured routines to be executed for various repair activities like Repair1(16), Repair2(17) ., etc. This performs the low level communication with the vehicle and also securely packs the relevant data. The Crypto (36) module which crypts the data based on the rolling code encryption key. Time Management (14) module takes ensures that all the services are completed with the prescribed time in case of time out the services underway are suspended. Communication management (22)
module which transmits the transactional elements AP(5) , EP(6) , H1(7) , H2(8).
Figure 4:
Fig 4: illustrates server security tool (29) and its various components. This tool is used by the server side which securely evaluates and generates the response for the Field Security system (2) generated responses. This consists of the User interface (26) which enables the user to browse through the server security tool (29). The User authorization module (37) which securely checks the credentials of the user upon the correct user to proceed. Communication management (25) will handle the manner in which the transaction information are handled. This system also contains the Access control (21) mechanism which performs the specialised routine for each service like Repair 1(16), Repair 2(17), etc. This also contains Crypto (36) which will encrypt the transactional details. All the services are time bound the same is ensured by Time Management (26). Session Management (27) ensures that the transactional details are related the corresponding sessions. Server interface (28) establishes communication link with Server (30).
Figure 5:
Fig 5: illustrates server (30) and its various components. This consists of the sever tool interface (31) which establishes the communication interface with the server security too. The server (30) maintains the Vehicle data (32) which care populated by the Live data capturing mechanism. Vehicle service history (33) is also maintained in the server which maintains the service performed in the vehicle chronologically. These data will be referred. User administrative module (34) which consists of the user credential details which will be refered by the Server security Tool. Restricted vehicles (35) this module maintains the prohibited vehicles which does not be serviced.
Live data capturing system (10) is capturing the data from all the security system components ECU1, ECU2...ECUN, and the key data. This also uploads these data in to the server (30).
Field security tool (12) which interacts with the vehicle using the diagnostics (13) module and the same, which has the user interface (20). User is authorisation by the proper pass codes are taken care by the user authorisation module (24). Which also contains the user activity monitoring and reporting module (23). This tool capable of performing the Repairl (16), Repair2 (17), Repair3 (18) ... Repair N (19) all are access controlled by an access control (21). This field security tool can service more than one service and more than one vehicle which is achieved by session management (15). All the communication / data exchanges between the field security tool and server security tool are all managed by communication management (22). All these communications are cryptic based on the crypto (36).
Server security tool (29) is interacting with the server (30) and the field security tool(12) to respond to the requests (5) , (7) with the responses (6),(8) co-ordinated by communication management(25). This also has user authorisation module (37) which authorises the users of the server security tool by using the user administrative module (34). Server interface (28) will be responsible for all the interactions with the server related to alt data/authorisation schemes. Session management (27) equipped with all handle all communications with the time restriction for each communications which is handled by Time management (26).all the communications are cryptic using the crypto (36).
Server (30) which stores the data uploaded by live data capturing module (10). It organised the data in to four groups as follows. The vehicles security system data will be stored in vehicle data (32). The authorised server security tool users will be stored in user administrative module (34). Vehicle service history (33) which contains the all the service performed on a vehicle by all users chronologically which will be referred in deciding the secure nature of
the service. Restricted vehicles (35) have the relevant data about the vehicles for which service is prohibited which includes the stolen vehicle.
A vehicle security system consists of the electronically coded key, security system ECUs involved has a after sales security system which has the data capturing system(10) , a server (30), field security tool (12) , server security tool(29). The figures fig 1, fig 5, fig 3,fig 4 are just illustrative and for discussion purposes only. This is not the limit of the literature, the skilled one in the art can realise the same fact in some other way. Given this specification skilled in the art can realise data capturing system (10), field security tool (12), server security tool (29) using the available software tools to run it on the machine.
The after sales system includes the data capturing unit which captures the data while vehicle manufacturing and all the data are uploaded in the server in the data space. The data corresponds to the alt the elements of the security system are stored in the server against their vehicle specific identification. The server can be remote or localised. The duplicate management ensures the integrity of the data updation in the server.
Field security system will communicate with the vehicle components and the required information are extracted from the vehicle security units and the request AP (5) is formed based on the crypto and send to the server security system, the data extracted from specific units for specific services to ensure the dependability of the vehicle data. Before extracting the data from the necessary vehicle security components, the integrity of the vehicle components are ensures by comparing the vehicle specific information across all the vehicle security system components.
Responds AP (5) is generated based on the data extracted and the user specific data. While generating request AP (5) itself the session management (15),(27) and time management (14) , (26) are all initialised and the session properties are set for the corresponding services.
The request AP (5) is processed by the server to generate the response EP (6).
Upon the valid response from the server security system the required service will be allowed. The operation of the tool will be monitored and in case of unwanted attempts the field security system will get restrict it self from using the tool. Field tools can handle the multiple services at the same time by maintaining the sessions of the system and each system has its expiry time scales, all these request responses are executed in the sequential way.
The field security tool has special mechanism to handle the user authorisation related information which can not be reproduced and modified. This is referred to authenticate the user of the field service tool in the initial level. But however the identity and the authorisation of the field security system will be decided and the accordingly the activities are blocked. All the services required to the vehicle can be performed after the successful pass through of all the access control mechanism (21). In this process itself the validity of the service is evaluated and accordingly the service is handled. Data generated during the manufacturing is used during the vehicle authorisation the server security tool also decoded the requests sent by the field security tool and the validity of the field security tool, validity of the service and the validity of the vehicle components are all decided. Upon the authorised situation the response to the field security tool is controlled.
The server security tool also identifies the machine in which it is running and the user who is control of the server security tool will be authenticated by the data stored in the server. Upon the detection of any un-authorised conditions, the tool restricts itself and further use of the tool is blocked.
Server is the integral part of the after sales security system which has all the vehicle security components data which are extracted from them during the vehicle manufacturing and is stored.
The server also stores al the histories of service performed and the data corresponds to the repaired parts compared in deciding the genuineness of the service. Which eliminates the at of using the old security system components during serving the vehicle this avoids fiddling around the system with the valid but not live part.
During certain services, all the security system parameters are also re assigned to ensure the liveliness of the new pair. In this case the usage old repaired components rejected components are restricted from use.
The after sales system has the ability to read the system parameters which are not assigned to the vehicle security system, using this nature the new component before assigning itself the validity of the component is ensured. During services, the vehicle security system information is rolled / randomly changed and he the same is backed up to the server indirectly before the data is data is actually getting uploaded in the server ensures the data integrity of the system.
Since the server is the integral part of the whole system, the vehicle can be restricted from service in case of the theft or any unwanted situations.
The preceding description is exemplary rather than limiting in nature. Variations and modifications to the disclosed embodiment may become apparent to those skilled in the art that do not necessarily depart from the purview and sprit of this invention. Accordingly the following claims must be studied to determine the scope of legal afforded this invention.
ADVANTAGES OF THE PRESENT INNOVATION:-
1. Any service performed in the vehicle is asserted as the genuine and safe service and will not cause any security threats for any vehicles.
2. Vehicle data are captured automatically captured during the vehicle manufacturing, it also gives the scope to save other vehicle security data like the mechanical profile pattern.
3. In the field, all the activities of the field service tools are monitored and reported automatically hence possessing the automatic monitoring abilities. In case of un necessary operations can be detected and the system protects itself from un-authorised activities.
4. * Before performing any service in the vehicle, the field service tool will
verify the validity of the vehicle by comparing the vehicle details from various units of the vehicle security system and restricts itself in case of un - authorised attempts thus the system possess the pro-active theft avoidance mechanisms.
5. The field security tool operates it self in case upon the valid user. The modifying the tool is restricted by means of the server security tool.
6. The field security tool can detect or identify the new components which are about to be used in the system as replacement. So before assigning the components the authenticity of the every component evaluation is possible.
7. The field tool communications with the vehicle and the server security tool is in cryptic means. The pass codes AP, EP, H1, and H2 are rolling in nature which will be different at every instant usage of the tool.
8. All the repair process is based on the time bound since the restriction blocks all the un-wanted activities with the field security tool.
9. Server security tool authenticates the field security tool upon the authorised conditions the server security tool will respond to the requests from field security tool.
10. Before performing the any responses to the field tool, the user and the validity of the tool is verified centrally by the data stored in the server.
11. Since the field and server security system works in tandem then no wrong tool/wrong versions of the tool can be used.
12. since all the activities are central server dependent then restricting service for the vehicle can be achieved. In case of vehicles stolen condition the service to the vehicles can be restricted. In this the theft attempt by hijacking the vehicle and repairing of vehicle security system is restricted.
13. All the services performed in the vehicle are their corresponding newly 'generated vehicle security parameters are recorded in conjunction with
the old data corresponds to the previous pair.
14.while performing any service to the particular vehicle all the service performed in the same vehicle , in this case all the vehicle component details are compared which will eliminate the usage of the previously used components of the security system is eliminated.
15.Valid and healthy vehicle components corresponds to other vehicles can not used, and usage of the same are restricted by the centralised .data present in the server.
All the server security tool users are all authenticated by the server data stored. And hence rights management is very robust and it is easy to control the access of all the server tool users by controlling the date in the user administrative module.
WE CLAIM:-
1. A security system for vehicle after sales comprises an immobilizer the electronically coded key, ECUs of vehicles and centralised server interconnected with secure communication by a live data capturing system for collecting data from various ECUs of vehicles getting manufactured in all the plants of organisation.
2. A security system as claimed in 1 wherein the said live data capturing system consists a field security system tool which securely communicates with the additional security layer to the server security tool to generate the necessary secured data and to maintain in the server and also establishes the secure communication via AP(5), EP(6),H1(7),H2(8) transactions with the Field security tool(2).
3. A security system as claimed in claims 1 and 2 wherein the said field security tool comprises access control module for repair diagnostics tool, user interface module, user activity monitoring module, user authorisation module, crypto tool, time management tool, session management tool, and communication management tool.
4. A security system as claimed in claims 1 to 3 wherein the said server security tool comprises access control tool, user interface module, communication management module, user authorisation module, crypto tool, time management tool, session management tool, and server interface tool.
5. A security system as claimed in claims 1 to 4 wherein the said central server comprises vehicle data memory, vehicle service history memory, user administrative module, restricted vehicle module, server interface, and data uploading module.