Sign In to Follow Application
View All Documents & Correspondence

System And Method For Authenticating Occupancy In Authorized Premises And Communicating Occupancy Data

Abstract: A system and method for authenticating occupancy in authorized premises and communicating occupancy data. The system comprises occupancy sensors, wireless sniffers, a server unit, and trigger unit. The occupancy sensors installed within the authorized premises to detect computing devices and generate a detection signal. The computing device comprises a wireless module to establish a communication with the occupancy sensor. The detection of the computing device indicates the presence of a person associated with the detected computing device. The wireless sniffers receive the detected signal. The server unit is communicatively coupled with the computing devices and the wireless sniffers to receive the detected data over the communication network. The trigger unit initiates a trigger signal comprises instructions. The server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
29 January 2019
Publication Number
31/2020
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
czanpure@outlook.com
Parent Application

Applicants

BELBIRD TECHNOLOGIES PRIVATE LIMITED
102, Anisha Enclave, SG Palya CV Raman Nagar, Bangalore – 560093, Karnataka, India.

Inventors

1. Priya Ranjan Mishra
Belbird Technologies Pvt. Ltd., Anisha Enclave, SG palya CV Raman Nagar, Bengaluru-560093
2. Sreenivasa Chary
Belbird Technologies Pvt. Ltd., Anisha Enclave, SG palya CV Raman Nagar, Bengaluru-560093
3. Sridhar S
#556, 7th Main Road, SLK software HIG Colony, Bangalore North, Bangalore-560094

Specification

Claims:
CLAIMS:
1. A system for authenticating occupancy of one or more persons in authorized premises and communicating occupancy data over a communication network, the system comprising:
a plurality of occupancy sensors installed within the authorized premises to detect one or more computing devices and generate a detection signal, wherein the computing device comprises a wireless module to establish a communication with the occupancy sensor, wherein the detection of the computing device indicates presence of a person associated with the detected computing device;
a plurality of wireless sniffers wirelessly coupled with the occupancy sensors to receive the detected signal, wherein the detected signal comprises at least one of identification information of the computing devices, location information of the computing devices, identification information of the person, and a combination thereof;
a server unit communicatively coupled with the computing devices and the wireless sniffers to receive the detected data over the communication network;
one or more radio communication units to establish a wireless messaging network between the occupancy sensors and the computing devices to locally authenticate the occupancy of the person, wherein the radio communication units are connected to the server unit through an intermediary wireless connection relay; and
a trigger unit integrated with the server unit to initiate a trigger signal comprising a plurality of instructions, wherein the server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises.
2. The system according to claim 1 wherein the radio communication units locally authenticates occupancy of the person on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit on detection of the communication signal from the wireless sniffers.

3. The system according to claim 1, wherein the trigger signal received on the computing device enables the person to enter the identification information of the person to authenticate the occupancy, wherein the identification information of the person comprises at least one of biometric data of the person and credential information of the person.

4. The system according to claim 1, wherein the computing device associated with the person comprises a notification module to initiate a notification signal on non-detection of communication between the occupancy sensor and the computing device.

5. A method for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network, the method comprising steps of:
detecting one or more computing devices and generating a detection signal through a plurality of occupancy sensors installed within the authorized premises, wherein the computing device comprises a wireless module to establish a communication with the occupancy sensor, wherein the detection of the computing device indicates presence of a person associated with the detected computing device;
receiving the detected signal through a plurality of wireless sniffers wirelessly coupled with the occupancy sensors, wherein the detected signal comprises at least one of identification information of the computing devices, location information of the computing devices, identification information of the person, and a combination thereof;
receiving the detected data over the communication network through a server unit communicatively coupled with the computing devices and the wireless sniffers;
establishing a wireless messaging network between the occupancy sensors and the computing devices to locally authenticate the occupancy of the person through one or more radio communication units, wherein the radio communication units are connected to the server unit through an intermediary wireless connection relay; and
initiating a trigger signal comprises a plurality of instructions through a trigger unit integrated with the server unit, wherein the server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises.

6. The method according to claim 5 further comprises a step of locally authenticating occupancy of the person on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit on detection of the communication signal from the wireless sniffers through the radio communication units.

7. The method according to claim 5, further comprises a step of enabling the person to enter the identification information of the person to authenticate the occupancy through the trigger signal received on the computing device, wherein the identification information of the person comprises at least one of biometric data of the person and credential information of the person.

8. The method according to claim 5, further comprises a step of initiating a notification signal on non-detection of communication between the occupancy sensor and the computing device through a notification module integrated with the computing device.
, Description:FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)

TITLE OF INVENTION:
“SYSTEM AND METHOD FOR AUTHENTICATING OCCUPANCY IN AUTHORIZED PREMISES AND COMMUNICATING OCCUPANCY DATA”

Applicants
Name: Priya Ranjan Mishra
Nationality: Indian
Address: Belbird Technologies Pvt. Ltd., Anisha Enclave, SG palya CV Raman Nagar, Bengaluru-560093

Name: Sreenivasa Chary
Nationality: Indian
Address: Belbird Technologies Pvt. Ltd., Anisha Enclave, SG palya CV Raman Nagar, Bengaluru-560093

Name: Sridhar S
Nationality: Indian
Address: #556, 7th Main Road, SLK software HIG Colony, Bangalore North, Bangalore-560094

The following specification particularly describes the invention and the manner in which in which it is to be performed.
SYSTEM AND METHOD FOR AUTHENTICATING OCCUPANCY IN AUTHORIZED PREMISES AND COMMUNICATING OCCUPANCY DATA
TECHNICAL FIELD
[0001] The present invention is generally related to occupancy detection and communication, more particularly, to a system and method for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network.
BACKGROUND
[0002] For many accommodation facilities, it is a requirement to monitor the presence of the occupants, particularly for the benefit of the administrative and safety purposes. There are various systems and methods exist to monitor and track the presence of the occupants.
[0003] US patent number US 7,554,437 filed by Axelsen discloses a system for monitoring the occupancy status of the rooms, collecting the room occupancy information in real time, and displaying the room occupancy information so that the users may monitor the actual occupancy of the rooms. The room occupancy monitoring system disclosed in this US patent includes a motion sensor module detecting whether the corresponding room is occupied and generating the first signal indicative of whether the corresponding room is occupied, and a network interface module coupled to the data communication network. The network interface module receives the first signal from the motion sensor module and transmits the first signal to the server via the communication network together with the second signal. The motion sensor module can be an infrared motion sensor, an ultrasonic motion sensor, a pressure sensor, or a beam of the light sensor.
[0004] US patent publication numbers US 20090107265 A1 filed by Parker, II; Carey B. et al. discloses a method that includes subscribing to a sensor, such that the sensor is operable to record presence data. The method further includes receiving the presence data originating from the sensor. The method also includes updating status associated with the sensor based on the presence data and displaying the updated status associated with the sensor.
[0005] However, the existing attendance monitoring systems and methods are prone to many types of tempering and inefficient. Further, physical checking is labor intensive especially in bigger establishments like hostels, offices, etc. Thus it is costly and human dependent prone to human error. Additionally, the existing solutions are based on RFID/ Wi-Fi scanners, fingerprint scanners, the camera capturing, etc. Additionally, the existing systems and methods are also prone to false detection even in the absence of human presence.
[0006] In the camera-based monitoring system, the privacy of the occupants is an issue. Also, camera-based monitoring systems need high-end cameras, and data transfer rate from multiple nodes to the server is enormous and add burden to the already heavy traffic on WiFi communication network. The existing systems that utilize Wi-Fi surveillance have a higher probability that WiFi network is down. Further, there is also the probability that WiFi or mobile devices of one or more occupants is switched off.
[0007] Therefore, there is a need for an effective and efficient system and method to automatically monitor the presence of the occupants. Further, there is a need for a robust system and method for authenticating occupancy of the occupant in authorized premises and communicating the occupancy data over a communication network. Further, there is a need for a system and method to monitor the occupancy in the authorized premises such as a campus, a room or a bed occupancy when the wifi network is low or down.
[0008] Thus, in view of the above, there is a long-felt need in the industry to address the aforementioned deficiencies and inadequacies.
[0009] Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art through comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.

SUMMARY OF THE INVENTION
[0010] A system for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network is provided substantially, as shown in and/or described in connection with at least one of the figures, as set forth more completely in the claims.
[0011] The system comprises a plurality of occupancy sensors, a plurality of wireless sniffers, a server unit, a trigger unit, and one or more radio communication units. The plurality of occupancy sensors installed within the authorized premises detect one or more computing devices and generate a detection signal. The computing device includes a wireless module to establish a communication with the occupancy sensor. The detection of the computing device indicates the presence of a person associated with the detected computing device. The wireless sniffers are wirelessly coupled with the occupancy sensors to receive the detected signal. The detected signal comprises at least one of identification information of the computing devices, location information of the computing devices, and identification information of the person. The server unit is communicatively coupled with the computing devices and the wireless sniffers to receive the detected data over the communication network.
[0012] The radio communication units establish a wireless messaging network between the occupancy sensors and the computing devices to locally authenticate the occupancy of the person. The radio communication units are connected to the server unit through an intermediary wireless connection relay. The trigger unit is integrated with the server unit to initiate a trigger signal comprises a plurality of instructions. The server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises.
[0013] In an aspect, the radio communication units locally authenticate occupancy of the person on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit on detection of the communication signal from the wireless sniffers.
[0014] In an aspect, the trigger signal received on the computing device enables the person to enter the identification information of the person to authenticate the occupancy, wherein the identification information of the person comprises at least one of biometric data of the person and credential information of the person.
[0015] In an aspect, the computing device associated with the person comprises a notification module to initiate a notification signal on non-detection of communication between the occupancy sensor and the computing device.
[0016] According to embodiments illustrated herein, there is provided a method for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network. The method comprises the step of detecting one or more computing devices and generating a detection signal through a plurality of occupancy sensors installed within the authorized premises. The computing device comprises a wireless module to establish a communication with the occupancy sensor. The detection of the computing device indicates the presence of a person associated with the detected computing device. The method further comprises a step of receiving the detected signal through a plurality of wireless sniffers wirelessly coupled with the occupancy sensors. The detected signal comprises at least one of identification information of the computing devices, location information of the computing devices, identification information of the person, and a combination thereof. The method then comprises a step of receiving the detected data over the communication network through a server unit communicatively coupled with the computing devices and the wireless sniffers.
[0017] The method further comprises a step of establishing a wireless messaging network between the occupancy sensors and the computing devices to locally authenticate the occupancy of the person through one or more radio communication units. The radio communication units are connected to the server unit through an intermediary wireless connection relay. Then the method comprises a step of initiating a trigger signal comprises a plurality of instructions through a trigger unit integrated with the server unit. The server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises. The method then comprises a step of locally authenticating occupancy of the person on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit on detection of the communication signal from the wireless sniffers through the radio communication units.
[0018] Furthermore, the method comprises a step of enabling the person to enter the identification information of the person to authenticate the occupancy through the trigger signal received on the computing device. The identification information of the person comprises at least one of biometric data of the person and credential information of the person. The method then comprises a step of initiating a notification signal on the non-detection of communication between the occupancy sensor and the computing device through a notification module integrated with the computing device.
[0019] Accordingly, one advantage of the present invention is that it provides a cost-efficient system and method to monitor the occupancy in the authorized premises when the wifi network is low or down.
[0020] Accordingly, one advantage of the present invention is that it provides a tamperproof system and method to record the attendance only on confirming the occupancy of the occupant.
[0021] Accordingly, one advantage of the present invention is that it can be deployed easily without burdening the existing communication network of the authorized premises. It warns user whose WiFi is switched off to either take remedial actions such as switching on the device or WiFi or even to inform the warden etc.
[0022] Accordingly, one advantage of the present invention is that it warns the persons or occupants whose computing device’s WiFi is switched off to either take remedial actions such as to switch on the computing device or to inform an administrator of the authorized premises.
[0023] These features and advantages of the present disclosure may be appreciated by reviewing the following description of the present disclosure, along with the accompanying figures wherein like reference numerals refer to like parts.


BRIEF DESCRIPTION OF DRAWINGS
[0024] The accompanying drawings illustrate the embodiments of apparatus, methods, and other aspects of the disclosure. Any person with ordinary skills in the art will appreciate that the illustrated element boundaries (e.g., boxes, groups of boxes, or other shapes) in the figures represent an example of the boundaries. In some examples, one element may be designed as multiple elements, or multiple elements may be designed as one element. In some examples, an element shown as an internal component of one element may be implemented as an external component in another and vice versa. Furthermore, the elements may not be drawn to scale.
[0025] Various embodiments will hereinafter be described in accordance with the appended drawings, which are provided to illustrate, not limit, the scope, wherein similar designations denote similar elements, and in which:
[0026] FIG. 1 illustrates a block diagram of the present system for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network, in accordance with at least one embodiment.
[0027] FIG. 2 illustrates a flowchart of the present method for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network, in accordance with at least one embodiment.
DETAILED DESCRIPTION
[0028] The present disclosure is best understood with reference to the detailed figures and description set forth herein. Various embodiments have been discussed with reference to the figures. However, those skilled in the art will readily appreciate that the detailed descriptions provided herein with respect to the figures are merely for explanatory purposes, as the methods and systems may extend beyond the described embodiments. For instance, the teachings presented and the needs of a particular application may yield multiple alternative and suitable approaches to implement the functionality of any detail described herein. Therefore, any approach may extend beyond certain implementation choices in the following embodiments.
[0029] References to “one embodiment,” “at least one embodiment,” “an embodiment,” “one example,” “an example,” “for example,” and so on indicate that the embodiment(s) or example(s) may include a particular feature, structure, characteristic, property, element, or limitation but that not every embodiment or example necessarily includes that particular feature, structure, characteristic, property, element, or limitation. Further, repeated use of the phrase “in an embodiment” does not necessarily refer to the same embodiment.
[0030] Methods of the present invention may be implemented by performing or completing manually, automatically, or a combination thereof, selected steps or tasks. The term “method” refers to manners, means, techniques and procedures for accomplishing a given task including, but not limited to, those manners, means, techniques, and procedures either known to, or readily developed from known manners, means, techniques and procedures by practitioners of the art to which the invention belongs. The descriptions, examples, methods, and materials presented in the claims and the specification are not to be construed as limiting but rather as illustrative only. Those skilled in the art will envision many other possible variations within the scope of the technology described herein.
[0031] FIG. 1 illustrates a block diagram of the present system 100 for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network 102, in accordance with at least one embodiment. The system 100 comprises a plurality of occupancy sensors 104, a plurality of wireless sniffers 106, a server unit 108, a trigger unit 110, and one or more radio communication units 112. The plurality of occupancy sensors 104 installed within the authorized premises 101 to detect one or more computing devices 114 and to generate a detection signal. Examples of the computing device 114 include, but are not limited to, a personal computer, a laptop, a personal digital assistant (PDA), a mobile device, a tablet, or any other computing device.
[0032] In an embodiment, the computing device 114 comprises a wireless module 116 to establish a communication with the occupancy sensor 104. Examples of the occupancy sensor 104 include but not limited to Passive Infrared (PIR) motion sensor, microwave sensors, etc. In an embodiment, the present system 100 may utilize HC-SR501 PIR motion sensor as occupancy sensor 104. The HC-SR501 PIR motion sensor is based on infrared technology and includes an automatic control module. The HC-SR501 PIR motion sensor is highly sensitive, reliable, and having an ultra-low-voltage operating mode.
[0033] The detection of the computing device 114 indicates the presence of a person 118 associated with the detected computing device 114. The detected data of the occupancy sensors 104 is stored at occupancy sensor nodes in case wireless network is down and the detected data is communicated to the server unit 108 whenever wireless network resumes.
[0034] The wireless sniffers 106 are wirelessly coupled with the occupancy sensors 104 to receive the detected signal. In an embodiment, the wireless sniffers 106 are packet analyzers or packet sniffers. The wireless sniffers 106 intercept the data as it is transmitted over the communication network 102 and decode the data into a format that is readable for the users. In an embodiment, the present system 100 may utilize ESP8266 Wi-Fi modules as wireless sniffers 106. The ESP8266 Wi-Fi module is a low-cost Wi-Fi microchip with full TCP/IP stack and microcontroller capability.
[0035] The detected signal comprises at least one of identification information of the computing devices 114, location information of the computing devices 114, identification information of the person 118, and a combination thereof. In an embodiment, the computing device 114 associated with the person 118 comprises a notification module 120 to initiate a notification signal on non-detection of communication between the occupancy sensor 104 and the computing device 114.
[0036] The server unit 108 is communicatively coupled with the computing devices 114 and the wireless sniffers 106 to receive the detected data over the communication network 102. The communication network 102 can be implemented as one of the different types of networks, such as an intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The communication network 102 may either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further, the communication network 102 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[0037] The wireless sniffers 106 consumes less electrical energy because the scanning process is only triggered when the occupancy sensor detects one or more person (occupant). The trigger unit 110 is integrated with the server unit 108 to initiate a trigger signal comprises a plurality of instructions. The server unit 108 transmits the triggered signal to the computing device 114 to execute the instructions to authenticate occupancy of the person in the authorized premises 101. In an embodiment, the trigger signal received on the computing device 114 enables the person to enter the identification information of the person to authenticate the occupancy. The identification information of the person 118 comprises at least one of biometric data of the person 118 and credential information of the person 118.
[0038] The radio communication units 112 establish a wireless messaging network between the occupancy sensors 104 and the computing devices 114 to locally authenticate the occupancy of the person 118. The radio communication units 112 are connected to the server unit 108 through an intermediary wireless connection relay. In an embodiment, the radio communication units 112 locally authenticate occupancy of the person 118 on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit 108 on detection of the communication signal from the wireless sniffers 106. In an embodiment, the radio communication unit 112 is a Bluetooth unit. Further, the present system 100 may enhance the reliability of the authenticated attendance data by coordinating and validating with the camera occupancy data, wherein the cameras are installed in the authorized premises.
[0039] The trigger unit 110, wireless module 116 and notification module 120 include routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types. In an embodiment, the trigger unit 110 is a software application.
[0040] In operation, the present system 100 performs the authentication process locally on the computing device 114 through the trigger unit 110 on the computing device 114 to eliminate the huge authentication data burden on the communication network 102. In an embodiment, the trigger unit 110 is an authentication application program installed by the server unit 108 and is unique to each user/ occupant with unique authentication data. After mapping the computing device with an individual occupancy zone, the server unit 108 initiates the authentication process. The authentication application program running on the server unit 108 sends the trigger signal to the computing device 114 to start the attendance authentication application program with a unique code. The unique code is identified with individual user/ authorized occupants. The authentication application program installed on the computing device 114 matches the unique code sent by server unit 108 with the unique code registered during the installation or upgradation process by the server unit 108. The authentication application program requests the person to either provide thumb or fingers impression to run biometric-based authentication or run the camera to capture the facial image of the person or both. The facial data, biometric data are compared with data stored in the attendance authentication application program. On successful comparison, the server unit 108 authenticates the attendance of the person in the authorized premises.
[0041] The authentication data will be different from the data used to unlock the computing device and will be installed by the server unit 108 under the control of a system administrator. The stored facial or biometric data cannot be overwritten / re-written locally on the computing devices. In an embodiment, the attendance authentication program may be initiated by the person 118. The person 118 may communicate with the occupancy sensor 104 through his/ her computing device 114 and then the occupancy sensor 104 will initiate the remaining attendance authentication process. On successful completion of authenticity, process servers unit 108 resets the notification module 116.
[0042] FIG. 2 illustrates a flowchart 200 of the present method for authenticating occupancy of one or more person in authorized premises and communicating occupancy data over a communication network, in accordance with at least one embodiment. The method comprises the step 202 of detecting one or more computing devices and generating a detection signal through a plurality of occupancy sensors installed within the authorized premises. The computing device comprises a wireless module to establish a communication with the occupancy sensor. The detection of the computing device indicates the presence of a person associated with the detected computing device. The method further comprises a step 204 of receiving the detected signal through a plurality of wireless sniffers wirelessly coupled with the occupancy sensors. The detected signal comprises at least one of identification information of the computing devices, location information of the computing devices, identification information of the person, and a combination thereof. The method then comprises a step 206 of receiving the detected data over the communication network through a server unit communicatively coupled with the computing devices and the wireless sniffers.
[0043] The method further comprises a step 208 of establishing a wireless messaging network between the occupancy sensors and the computing devices to locally authenticate the occupancy of the person through one or more radio communication units. The radio communication units are connected to the server unit through an intermediary wireless connection relay.
[0044] Then the method comprises a step 210 of initiating a trigger signal comprises a plurality of instructions through a trigger unit integrated with the server unit. The server unit transmits the triggered signal to the computing device to execute the instructions to authenticate occupancy of the person in the authorized premises. The method then comprises a step 212 of locally authenticating occupancy of the person on non-detection of a communication signal from the wireless sniffers and transmitting the occupancy data to the server unit on detection of the communication signal from the wireless sniffers through the radio communication units.
[0045] Furthermore, the method comprises a step 214 of enabling the person to enter the identification information of the person to authenticate the occupancy through the trigger signal received on the computing device. The identification information of the person comprises at least one of biometric data of the person and credential information of the person. The method then comprises a step 216 of initiating a notification signal on non-detection of communication between the occupancy sensor and the computing device through a notification module integrated with the computing device. The present system and method can be utilized in various authorized premises such as establishments, hostels, hospitals, hotels, crowd management, etc.
[0001] No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the invention.
[0002] It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit and scope of the invention. There is no intention to limit the invention to the specific form or forms enclosed. On the contrary, the intention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention, as defined in the appended claims. Thus, it is intended that the present invention cover the modifications and variations of this invention, provided they are within the scope of the appended claims and their equivalents.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 201941003602-POWER OF AUTHORITY [29-01-2019(online)].pdf 2019-01-29
1 201941003602-US(14)-HearingNotice-(HearingDate-13-03-2024).pdf 2024-02-28
2 201941003602-ABSTRACT [14-11-2021(online)].pdf 2021-11-14
2 201941003602-FORM 1 [29-01-2019(online)].pdf 2019-01-29
3 201941003602-FIGURE OF ABSTRACT [29-01-2019(online)].pdf 2019-01-29
3 201941003602-CLAIMS [14-11-2021(online)].pdf 2021-11-14
4 201941003602-DRAWINGS [29-01-2019(online)].pdf 2019-01-29
4 201941003602-COMPLETE SPECIFICATION [14-11-2021(online)].pdf 2021-11-14
5 201941003602-DRAWING [14-11-2021(online)].pdf 2021-11-14
5 201941003602-COMPLETE SPECIFICATION [29-01-2019(online)].pdf 2019-01-29
6 abstract 201941003602.jpg 2019-01-31
6 201941003602-FER_SER_REPLY [14-11-2021(online)].pdf 2021-11-14
7 201941003602-PA [25-01-2020(online)].pdf 2020-01-25
7 201941003602-OTHERS [14-11-2021(online)].pdf 2021-11-14
8 201941003602-PETITION UNDER RULE 137 [14-11-2021(online)].pdf 2021-11-14
8 201941003602-FORM28 [25-01-2020(online)].pdf 2020-01-25
9 201941003602-ASSIGNMENT DOCUMENTS [25-01-2020(online)].pdf 2020-01-25
9 201941003602-RELEVANT DOCUMENTS [14-11-2021(online)].pdf 2021-11-14
10 201941003602-8(i)-Substitution-Change Of Applicant - Form 6 [25-01-2020(online)].pdf 2020-01-25
10 201941003602-FER.pdf 2021-10-17
11 201941003602-FORM 18 [08-02-2020(online)].pdf 2020-02-08
12 201941003602-8(i)-Substitution-Change Of Applicant - Form 6 [25-01-2020(online)].pdf 2020-01-25
12 201941003602-FER.pdf 2021-10-17
13 201941003602-ASSIGNMENT DOCUMENTS [25-01-2020(online)].pdf 2020-01-25
13 201941003602-RELEVANT DOCUMENTS [14-11-2021(online)].pdf 2021-11-14
14 201941003602-FORM28 [25-01-2020(online)].pdf 2020-01-25
14 201941003602-PETITION UNDER RULE 137 [14-11-2021(online)].pdf 2021-11-14
15 201941003602-OTHERS [14-11-2021(online)].pdf 2021-11-14
15 201941003602-PA [25-01-2020(online)].pdf 2020-01-25
16 201941003602-FER_SER_REPLY [14-11-2021(online)].pdf 2021-11-14
16 abstract 201941003602.jpg 2019-01-31
17 201941003602-COMPLETE SPECIFICATION [29-01-2019(online)].pdf 2019-01-29
17 201941003602-DRAWING [14-11-2021(online)].pdf 2021-11-14
18 201941003602-COMPLETE SPECIFICATION [14-11-2021(online)].pdf 2021-11-14
18 201941003602-DRAWINGS [29-01-2019(online)].pdf 2019-01-29
19 201941003602-FIGURE OF ABSTRACT [29-01-2019(online)].pdf 2019-01-29
19 201941003602-CLAIMS [14-11-2021(online)].pdf 2021-11-14
20 201941003602-FORM 1 [29-01-2019(online)].pdf 2019-01-29
20 201941003602-ABSTRACT [14-11-2021(online)].pdf 2021-11-14
21 201941003602-US(14)-HearingNotice-(HearingDate-13-03-2024).pdf 2024-02-28
21 201941003602-POWER OF AUTHORITY [29-01-2019(online)].pdf 2019-01-29

Search Strategy

1 2021-05-1117-31-54E_11-05-2021.pdf
1 SearchHistory(1)AE_28-03-2022.pdf
2 2021-05-1117-31-54E_11-05-2021.pdf
2 SearchHistory(1)AE_28-03-2022.pdf