Abstract: The present invention describes a method of controlling an electronic device (400) based on user input and a device thereof. The method includes receiving (102) a biometric command from a user to perform an operation in an electronic device (400) and during the operation, continuously determining (104) whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code. The method further includes applying (106) a first level of security in the electronic device (400) in response to determining that the biometric command for the operation is devoid of both the first type of predetermined biometric based access code and the second type of predetermined biometric based access code.
FIELD OF THE INVENTION
The present invention relates to methods and systems for controlling an electronic device and in particularly relates to dynamically customizing the security access levels or user preferred customisation in electronic device based on user input.
BACKGROUND OF THE INVENTION:
The modern day electronic devices including Mobile Devices (Tablets, Phones, PDAs), handheld touch screen devices etc. carry a huge amount of confidential/sensitive data. The user of such electronic devices carrying confidential/sensitive data might not wish to share such data with others. In order to prevent access to such confidential/sensitive, several locking mechanisms have been implemented that protect the device. However, such locking mechanisms protect the device when the device is in a locked state only. Such device security mechanisms guarantee protection of data while unlocking e.g. Passwords, unlock patterns, fingerprint scan etc. Thus, while the device is awake and being used, there is hardly any way that the device can sense our discomfort while using it in someone’s presence or when there is a situation where we have to lend the device to someone.
In one of the existing solution, a mechanism is provided that provides locking mechanism or a secured access in respect of a particular application in an electronic device. In such application locking mechanism, the entire application is blocked from use and there is no partial security offered. Furthermore, such password locking adds the overhead of unlocking every time even to the actual user. Fingerprint recognition solves this problem but again like all other application locks, it either locks or unlocks the application completely. In another existing solution, a mechanism is provided wherein the user can manually enter or select a type of mode to control the access to an electronic device. However, again the user has to manually enter or select the access mode each time while giving the electronic device to others for being used. Furthermore, it becomes very cumbersome for the user to select a restricted access mode each time the device is to be handled or operated by some other person. Also, it does not offer the user access to his own contents if he tries to use as guest user in a restricted access mode. Thus, the actual user of the electronic device is not able to access his contents.
Thus, there exists a need to overcome the above problems and provide a mechanism to customize the operation of the device on the go as and when being used. A mechanism is required that adds intelligence to the smart devices to behave according to the situation around.
SUMMARY OF THE INVENTION:
In an embodiment, a method of controlling an electronic device is provided. The method comprises receiving a biometric command from a user to perform an operation in an electronic device and during the operation, continuously determining whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code. The method further includes applying a first level of security in the electronic device in response to determining that the biometric command for the operation is devoid of both the first type of predetermined biometric based access code and the second type of predetermined biometric based access code.
In an embodiment, a device for controlling an electronic device is provided. The device includes a receiving unit for receiving a biometric command from a user to perform an operation in an electronic device and a controlling unit that is configured to, during the operation, continuously determine whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code.. A processing unit is further provided for applying a first level of security in the electronic device, in response to determining that the biometric command for the operation is devoid of the first type of predetermined biometric based access code and the second type of predetermined biometric based access code.
The present invention provides a customization mechanism that can sense an alien user and modifies the device application’s contents accordingly, thereby enabling dynamic customization of the application which is running. In other words, accessibility of the application and availability of content of the application are dynamically controlled. Further, the customization mechanism dynamically customizes application(s), whether running or ideal, even when the device is ON, UNLOCKED and BEING USED. It also gives the user an alternative way of accessing applications when someone is in vicinity. The present invention provides an intelligence mechanism such that the smart devices behave according to the situation around. With the present invention, even if someone knows our unlock pattern it will never provide him full access to the device. Thus, the present invention also provides added level of security even when the after the device has been unlocked.
To further clarify advantages and features of the present invention, a more particular description of the invention will be rendered by reference to specific embodiments thereof, which is illustrated in the appended drawings. It is appreciated that these drawings depict only typical embodiments of the invention and are therefore not to be considered limiting of its scope. The invention will be described and explained with additional specificity and detail with the accompanying drawings.
Brief Description of Figures:
These and other features, aspects, and advantages of the present invention will become better understood when the following detailed description is read with reference to the accompanying drawings in which like characters represent like parts throughout the drawings, wherein:
Figure 1 shows a flow chart for a method of controlling an electronic device in accordance with an embodiment of the invention;
Figure 2 shows a flow diagram describing the working of the process in accordance with an embodiment of the invention;
Figure 3 shows a flow chart for implementing the present invention;
Figure 4 shows a block diagram of a device implementing the present invention;
Figure 5 illustrates an exemplary implementation of the present invention in a Social Networking Site (SNS) chat application;
Figure 6 illustrates an exemplary implementation of the present invention in a message application;
Figure 7 illustrates an exemplary implementation of the present invention in a gallery application;
Figure 8 illustrates an exemplary implementation for marking a portion of video as private;
Figure 9 illustrates an exemplary implementation of the present invention in respect of a portion of video marked as private in Figure 8;
Figure 10 illustrates an exemplary implementation of the present invention in respect of data items marked as private;
Figure 11 illustrates an exemplary implementation of the present invention on receiving a combination of inputs;
Figure 12 shows a table indicating several cases in implementing the present invention on receiving a combination of inputs;
Figure 13 illustrates an exemplary implementation of the present invention while sharing files over Bluetooth and Wi-Fi;
Figure 14 illustrates an exemplary implementation of the present invention when chatting with a PRIVATE CONTACT;
Figure 15 illustrates an exemplary implementation of the present invention during the browsing sessions;
Figure 16 illustrates an exemplary implementation of the present invention when using the file manager;
Figure 17 illustrates an exemplary implementation of the present invention when uninstalling an application;
Figure 18 illustrates an exemplary implementation of the present invention when when talking to a private contact;
Figure 19 illustrates an exemplary implementation of the present invention when when sharing/ selecting files over data sharing applications/modes such as Bluetooth or Wi-Fi;
Figure 20 illustrates an exemplary implementation of the present invention when when transferring a selected files;
Figure 21 illustrates an exemplary implementation of the present invention when when using a plurality of Applications;
Figure 22 illustrates an exemplary implementation of the present invention when when using any Search Application;
Figure 23 illustrates an exemplary implementation of the present invention when using wearable devices; and
Figure 24 illustrates a typical hardware configuration of a computer system, which is representative of a hardware environment for practicing the present invention.
Further, skilled artisans will appreciate that elements in the drawings are illustrated for simplicity and may not have been necessarily been drawn to scale. For example, the flow charts illustrate the method in terms of the most prominent steps involved to help to improve understanding of aspects of the present invention. Furthermore, in terms of the construction of the device, one or more components of the device may have been represented in the drawings by conventional symbols, and the drawings may show only those specific details that are pertinent to understanding the embodiments of the present invention so as not to obscure the drawings with details that will be readily apparent to those of ordinary skill in the art having benefit of the description herein.
Detailed Description:
For the purpose of promoting an understanding of the principles of the invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, such alterations and further modifications in the illustrated system, and such further applications of the principles of the invention as illustrated therein being contemplated as would normally occur to one skilled in the art to which the invention relates.
It will be understood by those skilled in the art that the foregoing general description and the following detailed description are exemplary and explanatory of the invention and are not intended to be restrictive thereof.
Reference throughout this specification to “an aspect”, “another aspect” or similar language means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrase “in an embodiment”, “in another embodiment” and similar language throughout this specification may, but do not necessarily, all refer to the same embodiment.
The terms "comprises", "comprising", or any other variations thereof, are intended to cover a non-exclusive inclusion, such that a process or method that comprises a list of steps does not include only those steps but may include other steps not expressly listed or inherent to such process or method. Similarly, one or more devices or sub-systems or elements or structures or components proceeded by "comprises...a" does not, without more constraints, preclude the existence of other devices or other sub-systems or other elements or other structures or other components or additional devices or additional sub-systems or additional elements or additional structures or additional components.
Unless otherwise defined, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The system, methods, and examples provided herein are illustrative only and not intended to be limiting.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings.
Figure 1 illustrates a flow chart for method of controlling an electronic device in accordance with an embodiment of the invention. The method 100 includes a step 102 for receiving a biometric command from a user to perform an operation in an electronic device. In an embodiment, the electronic device is selected from a group comprising a smartphone, smart glass, smart watch, smart television, PDA, tablets, netBooks, e-readers, a laptop, a desktop computer, and other wearable smart devices including necklace, band, ring, watch, anklet, etc. The operation in an electronic device may include but not limited to, accessing the electronic device, accessing any item in the electronic device, accessing any content or application per installed in the electronic device etc.
The method further includes step 104 for continuously determining, during the operation, whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code. In an embodiment, the biometric command made by the user may include, but not limited to one or more of a touch based command, a voice based command, a facial gesture based command; an eye-gesture based command, palm based command, ear recognition based command, user hand movement based command. The eye-gesture based command is one or more of iris recognition based command, retina recognition based command. In an embodiment, the touch based command includes, but not limited to one or more of touch based user inputs including a finger touch based input received via a first fingerprint sensing unit available on the electronic device, and a palm touch and/or one or more side finger based input received via a second fingerprint sensing unit available on the electronic device. In an example, the first fingerprint sensing unit can be available on a display unit of the electronic device. In another example, the first fingerprint sensing unit can be located at a bottom panel of the electronic device. Similarly, in an example, the second fingerprint sensing unit can be available on walls of the electronic device such as side walls and back walls. In another example, the second fingerprint sensing unit can be located at a back panel of the electronic device having a second display unit. In yet another example, the second fingerprint sensing unit can be located at any other strategic place on the electronic device such as combination of side walls and back panel of the electronic device.
In an embodiment, the first type of predetermined biometric based access code is distinct from the second type of predetermined biometric based access code. The first type of predetermined biometric based access code and the second type of predetermined biometric based access code are in a mapped relationship with one or more distinct biometric commands. The biometric commands associated with the first type of predetermined biometric based access code and the second type of predetermined biometric access code are preconfigured by user. In an exemplary implementation, the first type of predetermined biometric based access code is associated with a regular biometric command from the user and the second first type of predetermined biometric based access code is associated with a special and unique biometric command from the user. For example, a biometric command using any of the four fingers in a hand may be associated with first type of predetermined access code and the biometric command using the thumb may be associated with second type of predetermined access code. A predefined mapping/ configuration is performed the user to associate the biometric commands with the first or second type of predetermined access codes.
The method further includes step 106 of applying a first level of security in the electronic device in response to determining that the biometric command for the operation is devoid of the first type of predetermined biometric based access code and the second type of predetermined biometric access code. In one embodiment, applying the first level of security includes restricting access only in respect of one or more predefined data items selected from a list of data items and allowing access in respect of remaining data items. In another embodiment, implementing the first level of security includes allowing access only in respect of one or more predefined data items selected from said list of data items and restricting access in respect of remaining data items. The predefined data items are selected by the user and pre-stored in the memory of the electronic device. The predefined items generally include data items that the user does not want to be accessed or viewed by others. The pre-defined data items is selected from a list of items including, but not limited to, contacts stored in a phone list; details pertaining to said contact including contact details, messages, emails, bank account details; an image; an image file; an image/video directory; a video file; an application installed on the electronic device, contents associated with an application installed on said electronic device; a user preferences, a user profile, a user browsing history. In an example, the predefined item may include a plurality of personal images stored in the gallery of a smart phone that the user does not wish to share with others.
In an embodiment, the access includes one or more of actions performable on the list of data items. The action being at least one of selecting, accessing, viewing, editing, deleting, sharing, copying, searching and modifying.
In an embodiment, the method 100 includes applying the first level of security in the device, in response to determining presence of the second type of predetermined biometric based access code in the biometric command for the operation in the device. The first level of security may be described in similar manner as described previously.
In an embodiment, the method 100 further comprises implementing a second level of security in the device, in response to determining presence of the first type of predetermined biometric based access code in the biometric command for the operation in the device. In an embodiment, implementing the second level of security includes allowing access in respect of one or more predefined data items selected from a list of data items and access in respect of remaining data items. The level of access in respect of the list items as defined in respect of first and second security level is configurable by the user.
Figure 2 shows a flow diagram describing the working of the process in accordance with an embodiment of the invention. The flow diagram 200 referred in Figure 2 and the related description illustrates as to how the device behaves when the present invention is implemented. The block 202 indicates that an application installed in an electronic device is in a running stage or an active stage. Thereafter, a biometric command in the form of a touch is received by the electronic device. However, it is to be noted that biometric commands as described in reference to Figure 1 are also within the scope of the invention. The device on receiving the touch command detects the touch as indicated in block 204. The touch is detected by using the fingerprint information associated with the received touch. Once the touch is detected, the device checks whether the touch is associated with a predetermined access code of first type or second type or none. In other words, the device identifies whether the touch belongs to a guest touch (block 206), admin special touch (block 212), or an admin normal touch (block 214). The guest touch is associated with a guest user, i.e., any user other than the owner. The admin special touch/ admin normal touch is associated with an authenticated admin user of the device and is different from the guest user and the owner. In case the touch command is detected to be the guest touch (block 206) i.e. a touch identified not related to first or second type of predetermined access codes as pore-configured by the user/ admin of the device, flow 1 as indicated in Figure 2 is implemented. In such a case, the customized behaviour mode of the device is automatically activated as indicated in block 206. Thereafter, the application on the foreground is customized so as to maintain the privacy of the owner (the admin user) as indicated in block 208 and block 210. Additionally, in an embodiment, the privacy setting may also apply to all applications the guest user navigates to. The behaviour of the application in such a situation has to be defined by the user beforehand. Some exemplary ways in which this may be done are as follows:-
1. Chat applications- archive chat window of contacts marked as private;
2. E-commerce applications/ Playstore – forget card details and previous transactions;
3. Messaging – conversation with private contacts are hidden;
4. Gallery
* Images/Videos marked as private are hidden;
* Sent by particular contact are hidden;
* Folder containing privately marked photographs is hidden;
* Photos/videos containing private contacts are hidden (based on facetag);
* Clicked/shot at particular location are hidden;
5. Videos- sensitive/censored/clipped areas of video skipped while playing;
6. Browsing – cookies containing saved passwords not accessible, history not accessible, kind of a fresh browser/ a private browsing session with no past memory of any session;
7. Video player/Audio player can make playlists inaccessible.
8. Calling App: If a call with a private contact is in progress and suddenly the guest touch is detected, the system can disable microphone and speaker so that the guest cannot communicate with the contact. If the guest touch is persisted for long time then the call could be disconnected.
Thus, while accessing/using any application, the device is equipped enough to differentiate the touch of the owner and a guest/alien user. On detecting an alien touch the application being used is customized so as to not display predefined confidential or sensitive data. So, the same application has two modes of display. While in hands of the owner it gives complete access, but on recognizing a guest it changes on its own to behave accordingly, and hides personal data. This gives device the intelligence to change the level of access depending upon who is using it.
In case the touch command is detected to be an admin special touch (block 212) i.e. , associated with the second type of predetermined access code flow 2 as indicated in Figure 2 is implemented. This is the case when the owner himself is using the device, however needs a quick/dynamic transition into a temporary guest mode kind of appearance. Even if the touch is recognized by the device as owner’s but being associated with the predefined special input, it is treated similar to a guest using the device. Here, the device behaves in the same way as explained above in respect of flow 1, i.e. applications are customized as and when accessed on the go. In particularly, the customized behaviour mode of the device is automatically activated as indicated in block 208 once the admin special touch (block 212) is detected. In an example, when the owner accesses the device with this associated input method (e.g. Thumb has been associated to perform customized application/guest like behaviour), it behaves in the same way as it would have behaved for a guest. Although it is in the owner’s hand, the present invention gives an option to customize the data if need be so. This kind of situation might arise while the user/admin is using his device in someone’s presence, or showing photos and other stuff to friends or family.
In case the touch command is detected to be an admin normal touch (block 214) i.e. a touch identified related to a first type of predetermined access code as pre-configured by the user/ admin of the device, flow 3 as indicated in Figure 2 is implemented. This is normal case scenario where the owner/admin is using his device normally, and hence there is no customization of the applications giving full access to the owner and there is normal application behaviour (block 216) without any restrictions.
To summarize the three flows described above, when the owner is using the device with his regular/normal touch input then all the private and non-private entities are accessible to him but when the owner uses the device with his special touch input or some other user other than the owner is using the device, then access to all the private entities as defined by the user gets restricted.
Referring to Figure 3, a flow chart for implementing the present invention is illustrated. The process starts (block 302) by checking whether the customization mode is selected or not by the user/owner as indicated in block 304. If the customization mode is selected by the user, the default settings are checked. Here, the default settings indicate that the special touch input is none and other user touch input is OFF. Thereafter, the device seeks input from the user/owner for associating an owner’s special input (as indicated in block 308) and, on receiving an approval for associating the owner’s special input, registers a fingerprint associated with a user finger touch for customization (block 310). The device, on receiving a non-confirmation for associating the owner’s special input or after registering the fingerprint, seeks input from the user to enable privacy settings for other guest users as indicated in block 312 and on receiving an approval, enables privacy settings for other guest users as indicated in block 314. The device thereafter checks if any of the mode (special touch or other user) is selected by the user as indicated in block 316. If none of the modes is selected, the customization mode is turned off the user is exited as indicated in block 318. If one or both the modes are selected, then one or more of predefined data items are marked as private as indicated in block 320. Thereafter, the user is prompted to exit the settings as indicated in block 322. The customization settings are complete once the user exits. The user may however be provided an option to edit the settings by not exiting the settings page. Once the settings are complete and the customization mode is ON, the device thereafter waits for receiving a touch based input as indicated in block 324. Once a touch based input is received and detected (block 326), the fingerprint information associated with the touch based input is matched and recognized by the biometric sensing unit present in the device as indicated in block 328. It is checked whether the touch based input corresponds to owners regular touch input, or owner’s special input or other user’s input. In case it is recognized in block 330 that the touch based input corresponds to other user’s input (block 332), the customized application behaviour mode is enabled and the customization filter hides one or more of predefined data items marked as private (block 338) and ends the process at block 342 and repeats the above said steps. In case it is recognized in block 330, that the touch based input corresponds to an owner’s input, it is checked whether it corresponds to owner’s regular input or owner’s special input as indicated in block 334. If the touch based input corresponds to owner’s special input (block 336), then the customized application behaviour mode is enabled and the customization filter hides the one or more of predefined data items marked as private (block 338). If the touch based input corresponds to owner’s regular touch input (block 330), full access to all the data, including one or more of predefined data items marked as private, is provided (as indicated in block 340). The process ends at block 342 and the above steps are repeated based on changing touch based input.
Referring to Figure 4, a device for implementing the present invention is illustrated. The device 400 includes a receiving unit 402 for receiving a biometric command from a user to perform an operation in an electronic device. The biometric command may include, but not limited to one or more of a touch based command, a voice based command, a facial gesture based command; an eye-gesture based command, palm based command, ear recognition based command, user hand movement based command. The eye-gesture based command is one or more of iris recognition based command, retina recognition based command. In an embodiment, the touch based command includes, but not limited to one or more of touch based user inputs including a finger touch based input, a palm touch and/or one or more side finger based input received or any combinations thereof. The device 400 includes one or more sensing units 404 for sending the biometric command. The sensing units 404 include one or more biometric units including a first fingerprint sensing unit available on the electronic device, a second fingerprint sensing unit available on the electronic device. Other suitable sensing units for voice detection, face detection, eye-gestures, retina based commands may be provided. The device 400 further includes a controlling unit 406 that is configured to, during the operation, continuously determine whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code. The device 400 further includes a display 408 and a memory 410 for storing the predetermined access codes of first type and second type, list of pre-defined user items, storing details of the biometric commands defined by the user, details in respect of an application, user specific details, etc. A processing unit 412 is further provided for applying a first level of security in the electronic device, in response to determining that the biometric command for the operation is devoid of the first type of predetermined biometric based access code and the second type of predetermined biometric based access code. The controlling unit 406 and the processing unit 412 may include one or more processors, micro-controllers, microprocessors etc. An input/ output unit 414 is further provided for receiving one or more inputs from the user. The apparatus 400 further includes a power supply unit 416 for supplying power to various units of the device 400. Each of the aforesaid units including are operably interconnected to each other. In an embodiment, the controlling unit 406 and processing unit 412 may form a standalone module.
EXEMPLARY IMPLEMENTATIONS OF THE PRESENT INVENTION:
The forthcoming description of Figures depicts examples to illustrate the usefulness of the present invention. However, it may be strictly understood that the forthcoming examples shall not be construed as being limitations towards the present invention and the present invention may be extended to cover analogous implementations through other type of like mechanisms.
The following application examples depict the behavior of the applications before and after customization based on different inputs from owner (normal or special) and guest user.
Referring to Figure 5, an exemplary implementation of the present invention in a Social Networking Site (SNS) application is illustrated. Suppose person A, the owner of the phone has marked a contact DIVINE as PRIVATE in his configurations. When he is himself using the phone in his regular/normal way, the chat application view is as shown in Figure 5 (a), with no customization. It can be noticed that in this normal scenario, the contact DIVINE is visible. But suppose person B, (a guest user) is around and the user himself is showing the person B some other chat information by opening this application (by using the biometric command in the form of a special touch input gesture), then the associated private contact DIVINE chat gets archived automatically so that any information regarding the private contact is hidden and is not in the view of person B. The customized view for user B would be as shown in Figure 5(b) on receiving a special touch input from the owner. Referring to Figure 5(c), the behavior of SNS applications when the other user B has borrowed owner’s device and is using it, is similar to the one above. On receiving an alien/ guest touch input from user B, the behavior of the application becomes same as indicated in respect of Figure 5(b) i.e. the associated private contact DIVINE chat gets archived automatically so that any information regarding the private contact is hidden and is not in the view of person B. Similar behaviour as depicted in Figure 5(b) and Figure 5(c) is applicable to other applications which are synced with contacts. All contents related to the private contacts get automatically hidden whenever a guest input or special input of owner is detected by the device. Thus, the chat application is dynamically customized based on touch input such that content of the chat application, and in particular, a chat session of a private contact is hidden when a special touch is received as input.
Referring to Figure 6, an exemplary implementation of the present invention in a message application is illustrated. Suppose person A, the owner of the phone, has marked a contact A as PRIVATE in his configurations. When he is himself using the phone in his regular/normal way, then he would be able to see all message communications with that contact in his messaging application view as illustrated in figure 6(a). But on the receiving an owner special touch input or some guest user input in respect of the messaging application as illustrated in Figure 6(b) and Figure 6(c) respectively, all message conversation with private contacts are hide. Thus, the messaging application is dynamically customized based on touch input such that content of the messaging application, and in particular, a conversation related to a private contact is hidden when a special touch is received as input.
Referring to Figure 7, an exemplary implementation of the present invention in a gallery application is illustrated. Suppose the owner A has many pictures in his gallery application but he has marked a PICTURE 2 as private in his application. When the input received while viewing the pictures is detected as the normal/regular input from the owner A, then all the pictures are in view as depicted in Figure 7(a). But on encountering a special input from the owner or any input from guest user, the gallery application gets customized such that the private marked picture is not present in the application view as in Figure 7(b) and Figure 7 (c).
Referring to Figure 8, an exemplary implementation for marking private sections on an already existing video is illustrated. As illustrated in Figure 8(a), suppose the owner of the phone A has the option to bookmark certain parts of videos as PRIVATE, the user can mark PRIVATE portions in videos which already exist on his device or also while capturing a new video. As can be seen in Figure 8(b), a user can mark portions in a video by tapping a mark on the screen. The user based on his choice can mark any portion in the video to be as private. As can be seen in Figure 8(c), the user taps the screen to start marking a portion of video starting at time 00:57 and taps the mark on the screen to stop marking at 01:23. By doing such a marking, the portion of video at the timeframe 00:57 to 01:23 is marked as private.
Referring to Figure 9, an exemplary implementation of the present invention in respect of a portion of video marked as private in Figure 8 is illustrated. Suppose the owner A wants to access the video wherein the portion of video from timeframe 00:57-01:23 is marked as private. When the input received while viewing the video is detected as the normal/regular input from the owner A, then the entire video including the private portion is also visible to the owner as depicted in Figure 9(a). But on encountering a special input from the owner or any input from guest user, the marked parts of the video gets automatically hidden. Thus, in this guest mode or special input mode, the video from timeframe 00:57 to 01:23 is skipped thereby ensuring that no private data is visible to unwanted person as illustrated in Figures 9(b) and 9(c).
Thus, the imaging application and the video application are dynamically customized based on touch input such that privately marked images and portions of video are hidden when a special touch is received as input.
Referring to Figure 10, an exemplary implementation of the present invention in respect of data items marked as private. Figure 10 in particularly illustrates the case of applying the first level of security wherein the user is provided access only in respect of the private marked data items on receiving a special input. As can be seen, an application window with all the entities/ data items (wherein two of the entities are marked as private) is indicated. Now, on receiving the special input and based on a preconfigured setting, only the private entities are made visible and the remaining entities are hidden.
Thus, access to applications is dynamically customized based on touch input such that privately marked applications are hidden when a special touch is received as input, thereby restricting access to the privately marked applications.
Referring to Figure 11, an exemplary implementation of the present invention on receiving a combination of inputs is illustrated. The case illustrated in reference to Figure 11 may be useful in scenarios wherein the device is lying in a guest’s hand, the applications are not customized as the owner is giving input by touch/swipe or vice versa. In such a case, let us consider two inputs are being received. The first input being a finger touch/swipe based input detected via a biometric sensing unit on the display screen and the second input being a palm and side fingerprint of other four fingertips detected via a biometric sensing unit on the sidewalls and back walls of the device. When using two inputs the application behavior is customized if even one of the inputs is of guest or guest like (i.e., special input given by owner itself). So, if owner’s friend is holding his device and the owner is swiping through gallery images etc. the device does not get confused as to what behavior to put forth. It will still display customized application view. Several combinations/ cases are possible in such a scenario. Each of which has been discussed below in reference to Figure 12. Figure 12 shows a table indicating several cases in implementing the present invention on receiving a combination of inputs.
In case 1 as illustrated in Figure 12, both the first and second input are identified as regular/ normal input of the owner. Hence, a complete access is available. In case 2, input 1 is identified as a guest input or special user input and input 2 is identified as regular/input of the owner. On encountering the combination of a special input from the owner or any input from a guest user and a regular/input of the owner, a customized mode 1 is activated wherein a predefined restricted access is provided. In case 3, input 2 is identified as a guest input or special user input and input 1 is identified as regular/input of the owner. On encountering the combination of a special input from the owner or any input from a guest user and a regular/input of the owner, a customized mode 2 is activated wherein a predefined restricted access is provided. In case 4, input 1 is identified as a guest input or special user input and input 2 is identified as a guest input. On encountering the combination of a special input from the owner or any input from a guest user and a guest input, a customized mode 3 is activated wherein a predefined restricted access is provided. Thus, it can be noticed that while accessing/using any application, the device is equipped enough to differentiate the touch of the owner and a guest/alien user and behave according to the situation around. Each of the customized modes as defined above may be pre-configured by the user.
Referring to Figure 13, an exemplary implementation of the present invention while sharing files over Bluetooth and Wi-Fi is illustrated. While sharing files over Bluetooth and Wi-Fi if the normal/regular input of the owner is received, then all the files are available for sharing in the file selection menu. But if a guest’s input or owner’s special input is encountered then the privately marked files are not available in the menu for sharing. All the private marked data is thus hidden and is out of the reach of unauthorized person, thereby preventing any leakage of personal information of the owner. Also to secure the data of the owner in scenario when a download or upload is going on and the user does not want this data to be visible to any other user on download or upload complete, then the user can set PRIVATE settings ON/OFF in his Bluetooth and Wi-Fi menu. After these settings, if a download is complete and that file receives a normal owner touch input, then the file opens up but if the touch input was of some other user or a special input from the owner himself is encountered, in that case nothing happens on clicking on download complete notification. Suppose the owner A has turned on the PRIVACY settings in his Bluetooth/Wi-Fi Settings and he wants customization when a download and upload happens. Then, on receiving a file over Bluetooth (say Image.jpg) over Bluetooth transfer, when the user taps on the downloaded file with his normal/regular touch input the file opens normally as illustrated in Figure 13 (a). In addition, details of the file are also displayed. Referring to Figure 13(a), the file being an image and its extension .jpg is displayed. This allows the user to identify the content that has been downloaded. However, if the Privacy setting is ON and the touch input is owner’s special input, then no action is performed even though the owner has clicked on that notification. In addition, details of the file are also prevented from being displayed. Referring to Figure 13(b), the notification only indicated completion of the download but hides details of the content. i.e., image, that have been downloaded. This would provide the owner privacy without letting the other user know about his privacy settings which he has already configured. Further, there will be no action performed on the click as can be seen in Figure 13(b) wherein the user taps the downloaded file and the file does not open. Similar behaviour would be when some other user (guest user) tries to open up the downloaded file as illustrated in Figure 13 (c). When the user taps the downloaded file, then no action is performed even though the guest user has clicked on that notification. Furthermore, there will be no authorization message since the aim is to use the device such that the privacy settings are not even hinted to the other user using the device or when other user is in vicinity.
Referring to Figure 14, an exemplary implementation of the present invention when chatting with a PRIVATE CONTACT is illustrated. Suppose the contact ‘DIVINE’ has been marked PRIVATE by the owner. Then while in chat with the PRIVATE contact DIVINE, if regular touch of the owner is encountered, the behaviour remains the same and the chat details are clearly displayed as can be seen in Figure 14(a). But on encountering special input from the owner or on encountering a guest input from a guest user, the chat window associated with the PRIVATE contact DIVINE gets dynamically updated as shown in Figure 14(b). As can be seen in Figure 14(b), the contact name gets customized to UNKNOWN and the current chat context is archived in background and a blank chat conversation shows in foreground.
Referring to Figure 15, an exemplary implementation of the present invention during the browsing sessions is illustrated. On receiving a Normal/Regular input from the owner ,the browsing session e.g., owner’ s mailbox opens up with owner’s account details saved in cookies as illustrated in Figure 15(a). For this type of Normal/Regular input, the passwords and card details can be used directly from saved cookies in other similar browsing sessions. But, on receiving a special /guest input, all the cookies are disabled and hence the guest user has no access to owner’s saved passwords and card credentials as can be seen in Figure 15(b).
Referring to Figure 16, an exemplary implementation of the present invention when using the file manager is illustrated. On receiving a Normal/Regular input from the owner, the owner is shown option for deleting files as can be seen in Figure 16(a). But on receiving the Owner’s Special/ Guest input, there is no option to DELETE files in File Manager because the user might not want to allow any other guest user to delete data from his device. Thus, the present invention provides for customization of the file manager on the go.
Referring to Figure 17, an exemplary implementation of the present invention, when uninstalling an application, is illustrated. On receiving a Normal/Regular input from the owner, the owner is shown the option for uninstalling applications on his device files as can be seen in Figure 17(a). But, on receiving an Owner’s Special/ Guest input, no option is provided for uninstalling the applications files as can be seen in Figure 17(b). This restricts the guest users from uninstalling any applications on owner’s device.
Referring to Figure 18, an exemplary implementation of the present invention, when when talking to a private contact, is illustrated. Suppose “DIVINE” is a PRIVATE contact with whom the owner is currently on call with. On receiving Normal/Regular input from the owner, there is no customization as can be seen in Figure 18(a) such as display of saved name and profile picture of the contact. But on receiving a special /guest input while on call with a Private contact, the Call user interface is changed so as to not display the saved name, (or the call can be made to disconnect, or speakers/microphones can be made to become disabled depending on settings defined by the user) and not display profile picture of the contact (or display a general image instead of the profile picture of the contact), as can be seen in Figure 18(b).
Referring to Figure 19, an exemplary implementation of the present invention, when when sharing files over Bluetooth or Wi-Fi, is illustrated. Suppose file marked 4 has been marked as Private. As discussed earlier, while sharing files over Bluetooth and Wi-Fi if the normal/regular input of the owner is received, then all the files are available for sharing in the file selection menu. But if a guest’s input or owner’s special input is encountered then the privately marked files are not available in the menu for sharing. All the private marked data is thus hidden and is out of the reach of unauthorized person, thereby preventing any leakage of personal information of the owner. As can be seen in Figure 19(a), on receiving Normal/Regular input from the owner, there is no customization and all files (including File 4) are shown while selecting for share. But, on receiving a special /guest input picture 4 marked as private goes hidden (as illustrated in Figure 19(b)), that was available initially when being selected using the Normal/Regular input
Referring to Figure 20, an exemplary implementation of the present invention, when when transferring selected files through various data sharing applications A1, A2, A3, A4, A5, and A6, is illustrated. For the sake of brevity only six data sharing applications have been shown. In the figure, A1 can be data sharing application capable sharing files via Bluetooth (BT). Similarly, A2 can be data sharing application capable sharing files via Wi-Fi. On receiving Normal/Regular input from the owner while sharing any file, there is no customization and the owner can select and share files via A1/A2 normally as can be seen in Figure 20(a). However, in order to protect privacy of the owner’s data, sharing can be customized by making the device unable to SCAN/PAIR with other devices on receiving a special /guest input as can be seen in Figure 20(b).
Referring to Figure 21, an exemplary implementation of the present invention, when when using a plurality of Applications, is illustrated. On receiving Normal/Regular input from the owner, all data without customization is shown as can be seen in Figure 21(a). However, on receiving a guest/ special user input, the customization view gets activated (as shown in Figure 21(b)) e.g. private photos removed private contacts hidden, sensitive chats archived.
Referring to Figure 22, an exemplary implementation of the present invention, when when using any Search Application, is illustrated. Searching can be in a particular application or across applications which includes mailbox, news, document search, to-do lists, web search, image, maps, etc. For e.g. on receiving a regular user input from the owner, a search based on history is performed and the results only pertaining to personal preferences of restaurants are shown (Figure 22(a)). However, a special/guest input shows a generic full web search as shown in Figure 22(b).
Referring to Figure 23, an exemplary implementation of the present invention, when using wearable devices, is illustrated. A wearable device can be used to customize the view of applications on various devices, which may not have fingerprint recognition. In such cases, the wrist of the person can act as the 2nd input.
In another implementation of the present invention, the owner has an option to mark some pages /contents of pdf s/documents. On receiving a normal owner input, all the pages/contents are in view. However, on receiving a Guest input/Owner’s special input, the previously marked pages/contents are made not to be in view.
In another implementation, a Guest/owner’s special input can have default setting of low resolution (to save space etc) and Camera opens with default settings. And, on Normal owner input high resolution images are captured and Camera opens with personal filter/shutter settings.
In another implementation, the notification panel does not show private content when being scrolled down by guest touch/owner’s special touch. Eg, a chat message by a private contact. Similarly, no private notifications pop-up while being used by guest/special input of owner. Also, no private notifications are visible in locked screen if phone is held by guest. The implementation of the present invention can be can be broadened further such as to display a particular type of notifications only when being scrolled down by finger touch 1, and different type of notifications by using finger touch 2 and so on.
Thus, present invention enables dynamic customization of applications based on touch input. The dynamic customization includes restricting access of privately marked applications, hiding chat session of privately marked contacts, hiding privately images, hiding privately marked portions of video, and restricting specific functionalities such as sharing, deleting, and uninstalling, related to privately marked applications. Such dynamic customization enhances security of the application and provides a better user-experience in terms of simplicity and ease of use.
Referring to Figure 24, illustrates a typical hardware configuration of a computer system, which is representative of a hardware environment for practicing the present invention. A hardware configuration of the device 400 in the form of a computer system 2400 is shown. The computer system 2400 can include a set of instructions that can be executed to cause the computer system 2400 to perform any one or more of the methods disclosed. The computer system 2400 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
In a networked deployment, the computer system 2400 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 2400 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single computer system 2400 is illustrated, the term "system" shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
The computer system 2400 may include a processor 2402 e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both. The processor 2402 may be a component in a variety of systems. For example, the processor may be part of a standard personal computer or a workstation. The processor 2402 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analysing and processing data. The processor 2402 may implement a software program, such as code generated manually (i.e., programmed).
The computer system 2400 may include a memory 2404, such as a memory 2404 that can communicate via a bus 2408. The memory 2404 may be a main memory, a static memory, or a dynamic memory. The memory 2404 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one example, the memory 2404 includes a cache or random access memory for the processor 2402. In alternative examples, the memory 2404 is separate from the processor 2402, such as a cache memory of a processor, the system memory, or other memory. The memory 2404 may be an external storage device or database for storing data. Examples include a hard drive, compact disc ("CD"), digital video disc ("DVD"), memory card, memory stick, floppy disc, universal serial bus ("USB") memory device, or any other device operative to store data. The memory 2404 is operable to store instructions executable by the processor 2402. The functions, acts or tasks illustrated in the figures or described may be performed by the programmed processor 2402 executing the instructions stored in the memory 2404. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like.
As shown, the computer system 2400 may or may not further include a display unit 2410, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 2410 may act as an interface for the user to see the functioning of the processor 2402, or specifically as an interface with the software stored in the memory 2404 or in the drive unit 2416.
Additionally, the computer system 2400 may include an input device 2412 configured to allow a user to interact with any of the components of system 2400. The input device 2412 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control or any other device operative to interact with the computer system 2400.
The computer system 2400 may also include a disk or optical drive unit 2416. The disk drive unit 2416 may include a computer-readable medium 2422 in which one or more sets of instructions 2424, e.g. software, can be embedded. Further, the instructions 2424 may embody one or more of the methods or logic as described. In a particular example, the instructions 2424 may reside completely, or at least partially, within the memory 2404 or within the processor 2402 during execution by the computer system 2400. The memory 2404 and the processor 2402 also may include computer-readable media as discussed above.
The present invention contemplates a computer-readable medium that includes instructions 2424 or receives and executes instructions 2424 responsive to a propagated signal so that a device connected to a network 2426 can communicate voice, video, audio, images or any other data over the network 2426. Further, the instructions 2424 may be transmitted or received over the network 2426 via a communication port or interface 2420 or using a bus 2408. The communication port or interface 2420 may be a part of the processor 2402 or may be a separate component. The communication port 2420 may be created in software or may be a physical connection in hardware. The communication port 2420 may be configured to connect with a network 2426, external media, the display 2410, or any other components in system 2400 or combinations thereof. The connection with the network 2426 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed later. Likewise, the additional connections with other components of the system 2400 may be physical connections or may be established wirelessly. The network 2426 may alternatively be directly connected to the bus 2408.
The network 2426 may include wired networks, wireless networks, Ethernet AVB networks, or combinations thereof. The wireless network may be a cellular telephone network, an 802.11, 802.16, 802.20, 802.1Q or WiMax network. Further, the network 2426 may be a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
In an alternative example, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement various parts of the system 2400.
Applications that may include the systems can broadly include a variety of electronic and computer systems. One or more examples described may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
The system described may be implemented by software programs executable by a computer system. Further, in a non-limited example, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement various parts of the system.
The system is not limited to operation with any particular standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) may be used. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed are considered equivalents thereof.
The drawings and the forgoing description give examples of embodiments. Those skilled in the art will appreciate that one or more of the described elements may well be combined into a single functional element. Alternatively, certain elements may be split into multiple functional elements. Elements from one embodiment may be added to another embodiment. For example, orders of processes described herein may be changed and are not limited to the manner described herein. Moreover, the actions of any flow diagram need not be implemented in the order shown; nor do all of the acts necessarily need to be performed. Also, those acts that are not dependent on other acts may be performed in parallel with the other acts. The scope of embodiments is by no means limited by these specific examples. Numerous variations, whether explicitly given in the specification or not, such as differences in structure, dimension, and use of material, are possible. The scope of embodiments is at least as broad as given by the following claims.
Benefits, other advantages, and solutions to problems have been described above with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and any component(s) that may cause any benefit, advantage, or solution to occur or become more pronounced are not to be construed as a critical, required, or essential feature or component of any or all the claims.
Claims:
We Claim:
1. A method (100) comprising:
receiving (102) a biometric command from a user to perform an operation in an electronic device;
during the operation, continuously determining (104) whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code; and
applying (106) a first level of security in the electronic device, in response to determining that the biometric command for the operation is devoid of both the first type of predetermined biometric based access code and the second type of predetermined biometric based access code.
2. The method (100) as claimed in claim 1 further comprising applying the first level of security in the device, in response to determining presence of the second type of predetermined biometric based access code in the biometric command for the operation in the device.
3. The method (100) as claimed in claim 1 or 2, wherein applying the first level of security includes one of:
a. restricting access only in respect of one or more predefined data items selected from a list of data items and allowing access in respect of remaining data items;
b. allowing access only in respect of one or more predefined data items selected from said list of data items and restricting access in respect of remaining data items.
4. The method (100) as claimed in claim 1, wherein the first type of predetermined biometric based access code is distinct from the second type of predetermined biometric based access code.
5. The method (100) as claimed in claim 1, wherein the first type of predetermined biometric based access code and the second type of predetermined biometric based access code are in a mapped relationship with one or more distinct biometric commands.
6. The method (100) as claimed in claim 5, wherein the biometric commands associated with the first type of predetermined biometric based access code and the second type of predetermined biometric access code are preconfigured by the user.
7. The method (100) as claimed in claim 1 further comprising applying a second level of security in the device, in response to determining presence of the first type of predetermined biometric based access code in the biometric command for the operation in the device.
8. The method (100) as claimed in claim 7, wherein applying the second level of security includes allowing access in respect of one or more predefined data items selected from a list of data items and access in respect of remaining data items.
9. The method (100) as claimed in claim 3 or 8, wherein said predefined one or more data items is selected from a list of items including: contacts stored in a phone list; details pertaining to said contact including contact details, messages, emails, bank account details; an image; an image file; an image/video directory; a video file; an application installed on said electronic device, contents associated with an application installed on said electronic device; a user preferences, a user profile, a user browsing history.
10. The method (100) as claimed in claim 3 or 8, wherein said access includes access in respect of one or more action performable on said list of data items.
11. The method (100) as claimed in claim 10, wherein said action is at least one of selecting, accessing, viewing, editing, deleting, sharing, copying, searching and modifying.
12. The method (100) as claimed in claim 1, wherein the biometric command is one or more of a touch based command, a voice based command, a facial gesture based command; an eye-gesture based command, a palm based command, an ear recognition based command, a user hand movement based command.
13. The method (100) as claimed in claim 12, wherein the eye-gesture based command is one or more of iris recognition based command, retina recognition based command.
14. The method (100) as claimed in claim 12, wherein said touch based command includes one or more touch based user inputs including:
a. a finger touch based input received via a first fingerprint sensing unit available on the electronic device;
b. a palm touch and/or one or more side finger based input received via a second fingerprint sensing unit available on the electronic device.
15. A device (400) comprising:
a receiving unit (402) for receiving a biometric command from a user to perform an operation in an electronic device;
a controlling unit (406) for, during the operation, continuously determining whether the biometric command is accompanied with a first type of predetermined biometric based access code or a second type of predetermined biometric based access code; and
a processing unit (412) for applying a first level of security in the electronic device, in response to determining that the biometric command for the operation is devoid of both the first type of predetermined biometric based access code and the second type of predetermined biometric based access code.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 3681-DEL-2015-IntimationOfGrant28-09-2022.pdf | 2022-09-28 |
| 1 | Power of Attorney [10-11-2015(online)].pdf | 2015-11-10 |
| 2 | 3681-DEL-2015-PatentCertificate28-09-2022.pdf | 2022-09-28 |
| 2 | Form 5 [10-11-2015(online)].pdf | 2015-11-10 |
| 3 | Form 3 [10-11-2015(online)].pdf | 2015-11-10 |
| 3 | 3681-DEL-2015-Written submissions and relevant documents [26-09-2022(online)].pdf | 2022-09-26 |
| 4 | Form 18 [10-11-2015(online)].pdf | 2015-11-10 |
| 4 | 3681-DEL-2015-FORM-26 [09-09-2022(online)].pdf | 2022-09-09 |
| 5 | Drawing [10-11-2015(online)].pdf | 2015-11-10 |
| 5 | 3681-DEL-2015-Correspondence to notify the Controller [08-09-2022(online)].pdf | 2022-09-08 |
| 6 | Description(Complete) [10-11-2015(online)].pdf | 2015-11-10 |
| 6 | 3681-DEL-2015-US(14)-HearingNotice-(HearingDate-12-09-2022).pdf | 2022-08-24 |
| 7 | 3681-del-2015-Form-1-(23-11-2015).pdf | 2015-11-23 |
| 7 | 3681-DEL-2015-CLAIMS [30-05-2020(online)].pdf | 2020-05-30 |
| 8 | 3681-DEL-2015-DRAWING [30-05-2020(online)].pdf | 2020-05-30 |
| 8 | 3681-del-2015-Correspondence Others-(23-11-2015).pdf | 2015-11-23 |
| 9 | 3681-DEL-2015-FER_SER_REPLY [30-05-2020(online)].pdf | 2020-05-30 |
| 9 | 3681-DEL-2015-PA [18-09-2019(online)].pdf | 2019-09-18 |
| 10 | 3681-DEL-2015-ASSIGNMENT DOCUMENTS [18-09-2019(online)].pdf | 2019-09-18 |
| 10 | 3681-DEL-2015-OTHERS [30-05-2020(online)].pdf | 2020-05-30 |
| 11 | 3681-DEL-2015-8(i)-Substitution-Change Of Applicant - Form 6 [18-09-2019(online)].pdf | 2019-09-18 |
| 11 | 3681-DEL-2015-FER.pdf | 2019-12-02 |
| 12 | 3681-DEL-2015-Correspondence-101019.pdf | 2019-10-14 |
| 12 | 3681-DEL-2015-OTHERS-101019.pdf | 2019-10-14 |
| 13 | 3681-DEL-2015-Correspondence-101019.pdf | 2019-10-14 |
| 13 | 3681-DEL-2015-OTHERS-101019.pdf | 2019-10-14 |
| 14 | 3681-DEL-2015-8(i)-Substitution-Change Of Applicant - Form 6 [18-09-2019(online)].pdf | 2019-09-18 |
| 14 | 3681-DEL-2015-FER.pdf | 2019-12-02 |
| 15 | 3681-DEL-2015-ASSIGNMENT DOCUMENTS [18-09-2019(online)].pdf | 2019-09-18 |
| 15 | 3681-DEL-2015-OTHERS [30-05-2020(online)].pdf | 2020-05-30 |
| 16 | 3681-DEL-2015-FER_SER_REPLY [30-05-2020(online)].pdf | 2020-05-30 |
| 16 | 3681-DEL-2015-PA [18-09-2019(online)].pdf | 2019-09-18 |
| 17 | 3681-DEL-2015-DRAWING [30-05-2020(online)].pdf | 2020-05-30 |
| 17 | 3681-del-2015-Correspondence Others-(23-11-2015).pdf | 2015-11-23 |
| 18 | 3681-del-2015-Form-1-(23-11-2015).pdf | 2015-11-23 |
| 18 | 3681-DEL-2015-CLAIMS [30-05-2020(online)].pdf | 2020-05-30 |
| 19 | Description(Complete) [10-11-2015(online)].pdf | 2015-11-10 |
| 19 | 3681-DEL-2015-US(14)-HearingNotice-(HearingDate-12-09-2022).pdf | 2022-08-24 |
| 20 | Drawing [10-11-2015(online)].pdf | 2015-11-10 |
| 20 | 3681-DEL-2015-Correspondence to notify the Controller [08-09-2022(online)].pdf | 2022-09-08 |
| 21 | Form 18 [10-11-2015(online)].pdf | 2015-11-10 |
| 21 | 3681-DEL-2015-FORM-26 [09-09-2022(online)].pdf | 2022-09-09 |
| 22 | Form 3 [10-11-2015(online)].pdf | 2015-11-10 |
| 22 | 3681-DEL-2015-Written submissions and relevant documents [26-09-2022(online)].pdf | 2022-09-26 |
| 23 | Form 5 [10-11-2015(online)].pdf | 2015-11-10 |
| 23 | 3681-DEL-2015-PatentCertificate28-09-2022.pdf | 2022-09-28 |
| 24 | Power of Attorney [10-11-2015(online)].pdf | 2015-11-10 |
| 24 | 3681-DEL-2015-IntimationOfGrant28-09-2022.pdf | 2022-09-28 |
| 1 | searchstrategy_30-11-2019.pdf |