Sign In to Follow Application
View All Documents & Correspondence

System And Method For Encrypting A Document

Abstract: The present disclosure relates to a system for encrypting a document that includes an input device, associated with the first user; one or more sensing devices configured with the input device, and configured to sense movement of the input device. The system can receive, from the one or more sensors, a set of first signals pertaining to the sensed movement of the input device, by the first user, with respect to a surface. Generate a password based on the set of first signals, and the password is generated on the basis of one or more coordinates of the surface where the input device is actuated during movement of the input device on the surface. Receive, from an entity, a set of second signals pertaining to the document to be secured for the authorized access. Encrypt the document with the generated password, and the encryption of the document with the password.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
03 August 2021
Publication Number
09/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
info@khuranaandkhurana.com
Parent Application
Patent Number
Legal Status
Grant Date
2024-12-31
Renewal Date

Applicants

Chitkara Innovation Incubator Foundation
SCO: 160-161, Sector - 9c, Madhya Marg, Chandigarh- 160009, India.

Inventors

1. SOOD, Kiran
Chitkara Business School, Chitkara University, Chandigarh-Patiala National Highway, Village Jansla, Rajpura, Punjab - 140401, India.
2. BALUSAMY, Balamurugan
20182, ATS Paradiso, CHI-IV, Greater Noida, Uttar Pradesh - 201310, India.
3. RAMASAMY, Lakshmana Kumar
5/20, Teachers Colony, Bharathipuram, Pallapalayam Post, Coimbatore - 641103, Tamil Nadu, India.
4. JINDAL, Munish
#855, D Block, Model Town Extension, Dugri Road, Ludhiana - 141002. Punjab, India.
5. JUNEJA, Nancy
B 210, Gujranwala Town - Part 1, Near Model Town Metro Station, Delhi - 110009, India.
6. BANSAL, Rajni
Assistant Professor, Chitkara Business School, Chitkara University, Chandigarh-Patiala National Highway, Village Jansla, Rajpura, Punjab - 140401, India.
7. GUPTA, Monica
Assistant Professor, Chitkara Business School, Chitkara University, Chandigarh-Patiala National Highway, Village Jansla, Rajpura, Punjab - 140401, India.

Specification

The present disclosure relates to the field of document encryption.
More particularly the present disclosure relates to a system and method for encrypting documents.
BACKGROUND
[0002] Background description includes information that may be useful in
understanding the present invention. It is not an admission that any of the
information provided herein is prior art or relevant to the presently claimed
invention, or that any publication specifically or implicitly referenced is prior art.
[0003] Conventionally, documents widely shared between one or more
entities for various purposes such as KYC, bills reimbursement and like. Sometime the document can include a sensitive information that can be misused if falls into wrong hands. Mostly, the documents are secured at server but their privacy can be compromised while they are shared between entities over network. Documents are most vulnerable to hackers when the documents are communicated over network.
[0004] There is, therefore, a need of a system and method for encrypting
documents, which can prevent the misuse of the document by any unauthorized people.
OBJECTS OF THE PRESENT DISCLOSURE
[0005] Some of the objects of the present disclosure, which at least one
embodiment herein satisfies are as listed herein below.
[0006] It is an object of the present disclosure to provide a system and
method for encrypting document, which is efficient.
[0007] It is an object of the present disclosure to provide a system and
method for encrypting document, which is prevents any misuse of document by
any unauthorized person.
[0008] It is an object of the present disclosure to provide a system and
method for encrypting document, which is easy to use.

[0009] It is an object of the present disclosure to provide a system and
method for encrypting document, which requires less maintenance cost.
SUMMARY
[0010] The present disclosure relates to the field of document encryption.
More particularly the present disclosure relates to a system and method for encrypting documents.
[0011] An aspect of the present disclosure pertains to a system for
encrypting a document of a first user. The system includes an input device, associated with the first user; one or more sensing devices configured with the input device, and configured to sense movement of the input device. A processing unit operatively configured with the input device and the one or more sensing device, the processing unit comprises a processor configured to execute a set of instructions, stored in a memory, which, on execution, causes the system to receive, from the one or more sensors, a set of first signals pertaining to the sensed movement of the input device, by the first user, with respect to a surface. Generate, corresponding to the first user, a password based on the set of first signals, and the password is generated on the basis of one or more coordinates of the surface where the input device is actuated, by the first user, during movement of the input device on the surface. Receive, from an entity, a set of second signals pertaining to the document of the first user to be secured for the authorized access. Encrypt the document with the generated password, and the encryption of the document with the generated password facilitates the secured access of the document.
[0012] In an aspect, the encrypted document may be accessed by a second
user by entering the generated password.
[0013] In an aspect, the input device may comprise any or combination of
a mouse, and a touch pad.
[0014] In an aspect, the entity may comprise any or combination of a
private institution, and public institution.

[0015] In an aspect, the password may comprise any or combination of
alphabet, numerical value, and special character.
[0016] A method for encrypting a document of a first user. The method
includes receiving, using a processor, a set of first signals, from the one or more sensors, pertaining to the sensed a two-dimensional movement of the input device, by the first user, with respect to a surface. Generating, by the processor, a password, corresponding to the first user, based on the set of first signals, and the password is generated on the basis of one or more coordinates of the surface where the input device is actuated, by the first user, during movement of the input device on the surface. Receiving, by the processor, a set of second signals, from an entity, pertaining to the document of the first user to be secured for the authorized access. Encrypting, by the processor, the document with the generated password, and the encryption of the document with the generated password facilitates the secured access of the document.
[0017] Various objects, features, aspects and advantages of the inventive
subject matter will become more apparent from the following detailed description of preferred embodiments, along with the accompanying drawing figures in which like numerals represent like components.
BRIEF DESCRIPTION OF DRAWINGS
[0018] The accompanying drawings are included to provide a further
understanding of the present disclosure, and are incorporated in and constitute a part of this specification. The drawings illustrate exemplary embodiments of the present disclosure and, together with the description, serve to explain the principles of the present disclosure. The diagrams are for illustration only, which thus is not a limitation of the present disclosure.
[0019] In the figures, similar components and/or features may have the
same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar

components having the same first reference label irrespective of the second
reference label.
[0020] FIG. 1A illustrates an exemplary network architecture in which or
with which proposed system for encrypting a document can be implemented, in
accordance with an embodiment of the present disclosure.
[0021] FIG. IB illustrates an exemplary representation of converting
sensed coordinates in to text password, in accordance with an embodiment of the
present disclosure.
[0022] FIG. 2 illustrates an exemplary module diagram for proposed
system, in accordance with an embodiment of the present disclosure.
[0023] FIG. 3 illustrates a proposed method of leaning/training a skill, in
accordance with an embodiment of the present disclosure.
[0024] FIG. 4 illustrates an exemplary computer system in which or with
which embodiments of the present invention can be utilized, in accordance with
embodiments of the present disclosure.
DETAILED DESCRIPTION
[0025] The following is a detailed description of embodiments of the
disclosure depicted in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the scope of the present disclosure as defined by the appended claims.
[0026] In the following description, numerous specific details are set forth
in order to provide a thorough understanding of embodiments of the present
invention. It will be apparent to one skilled in the art that embodiments of the
present invention may be practiced without some of these specific details.
[0027] The present disclosure relates to the field of document encryption.
More particularly the present disclosure relates to a system and method for encrypting documents.

[0028] The present disclosure elaborates upon a system for encrypting a
document of a first user. The system includes an input device, associated with the
first user; one or more sensing devices configured with the input device, and
configured to sense movement of the input device. A processing unit operatively
configured with the input device and the one or more sensing device, the
processing unit comprises a processor configured to execute a set of instructions,
stored in a memory, which, on execution, causes the system to receive, from the
one or more sensors, a set of first signals pertaining to the sensed movement of the
input device, by the first user, with respect to a surface. Generate, corresponding
to the first user, a password based on the set of first signals, and the password is
generated on the basis of one or more coordinates of the surface where the input
device is actuated, by the first user, during movement of the input device on the
surface. Receive, from an entity, a set of second signals pertaining to the
document of the first user to be secured for the authorized access. Encrypt the
document with the generated password, and the encryption of the document with
the generated password facilitates the secured access of the document.
[0029] In an embodiment, the encrypted document can be accessed by a
second user by entering the generated password.
[0030] In an embodiment, the input device can comprise any or
combination of a mouse, and a touch pad.
[0031] In an embodiment, the entity can comprise any or combination of a
private institution, and public institution.
[0032] In an embodiment, the password can comprise any or combination
of alphabet, numerical value, and special character.
[0033] A method for encrypting a document of a first user. The method
includes receiving, using a processor, a set of first signals, from the one or more sensors, pertaining to the sensed movement of the input device, by the first user, with respect to a surface. Generating, by the processor, a password, corresponding to the first user, based on the set of first signals, and the password is generated on the basis of one or more coordinates of the surface where the input device is actuated, by the first user, during movement of the input device on the surface.

Receiving, by the processor, a set of second signals, from an entity, pertaining to
the document of the first user to be secured for the authorized access. Encrypting,
by the processor, the document with the generated password, and the encryption
of the document with the generated password facilitates the secured access of the
document.
[0034] FIG. 1A illustrates an exemplary network architecture in which or
with which proposed system for encrypting a document can be implemented, in
accordance with an embodiment of the present disclosure.
[0035] FIG IB illustrates an exemplary representation of converting
sensed coordinates in to text password, in accordance with an embodiment of the
present disclosure.
[0036] As illustrated, in a network implementation 100, a system 102 for
encrypting a document of the first user can be communicatively coupled with a
plurality of input devices 108-1, 108-2... 108-N (collectively referred to as input
devices 108 and individually referred to as input device 108 hereinafter) through
network 104. The system 102 can be implemented using any or a combination of
hardware components and software components such as a server 106, a computing
system, a computing device, a security device and the like.
[0037] Further, the system 102 can interact with the first user 110-1, 110-
2... 110-N (collectively referred to as first users 110, and individually referred to
as first user 110 herein after), through the input devices 108 (also referred as input
devices, 108) or through applications residing on the input device 108. In an
implementation, the system 102 can be accessed by applications residing on any
operating system, including but not limited to, Android™, iOS™, and the like. In
a preferred embodiment, the client node devices 108 are associated with the first
users 110.
[0038] In an embodiment, the system can be operatively configured with
an entity 112 through the network 104. The entity can include any or combination
of a private institute such as but without limiting to an education institute, a bank,
an insurance company, hospital etc., and a public institute. The entity 112 can be
configured to send the documents of the first user to the system through the

network. Also, the documents can be submitted to the system by the first user
himself/herself The document can be but not limiting to PDF format. The system
102 can be configured, at the time of registering the first user with the system, to
receive one or more particulars of the first user 110. The one or more particulars
can include but not limited to name, address, pan card, adhar card, biometrics
such as finder print impression, facial data, and photograph.
[0039] In an embodiment, the first user 110 is also configured to signature
using the input device 110 configured with the system 102. The input device 108 can include but not limited to a laptop, phone, tablet etc. The signature can be done by using a mouse, touch pad, and touch screen associated with the input device, and moving the input device 108 with respect to a surface. In case of a mouse, the surface can be on which the mouse is placed, in case of touch pad and the touch screen, the surface can be the touch pad and the touchscreen itself. In case of the mouse, the signature can be done by moving the mouse on the surface and in case of the touch pad and touch screen the signature can be done by moving a stylus or a finger.
[0040] In an embodiment, the system 102 can include one or more sensors
that can be configured with the input device 108 to track a moment of the input device for registering the signature. A set of first signals pertaining to sensed coordinates of the surface where the input device is actuated, signature can be received by the system 102 from the one or more sensors. The system 102 can be configured to generate a text password corresponding to the signature. The password can be generated by converting the coordinates sensed into text format (as shown in FIG. IB). The password generated can be a function of the coordinates sensed by the one or more sensing device or sensors. The password generated for the first user can be save in a database configured with the system 102.
[0041] In an embodiment, any of the entity 112 and the first user 110 can
submit the document to the system 102 in form of a set of second signals. The system 102 can be configured to encrypt the received document using the saved password for the first user 108. This can facilitate a secured access of the

document by a third user. In an example, if the first user has a health insurance of an insurance company (also referred as the third user), and he/she wants to claims the health insurance in case of any medical emergency. Any of the first user 110 and a hospital (also referred as the entity 112) he/she is admitted in, can submit the documents such as medical bills, test reports etc with the insurance company system (system 102, that can be a website or an application of the insurance company).
[0042] In an embodiment, once the documents are submitted to the
insurance company system, the system can be configured to encrypt the receiving document with the already saved password of the first user 110, automatically. This is done to prevent any unauthorized access to the documents by the hacker. When at any point of time the insurance company want to access the document, the insurance company can enter the already saved password of corresponding to the first user 110, to open the document.
[0043] FIG. 2 illustrates an exemplary module diagram for proposed
system, in accordance with an embodiment of the present disclosure.
[0044] In an embodiment, a module diagram 200 of the system 102 may
comprise one or more processor(s) 202. The one or more processor(s) 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 202 are configured to fetch and execute computer-readable instructions stored in a memory 206 of the system 102. The memory 204 may store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory 204 may comprise any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0045] The system 102 may also comprise an interface(s) 206. The
interface(s) 206 may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the

like. The interface(s) 206 may facilitate communication of system 102. The
interface(s) 206 may also provide a communication pathway for one or more
components of the system 102. Examples of such components include, but are not
limited to, processing engine(s) 208 and data 210. For example,
[0046] The processing engine(s) 208 may be implemented as a
combination of hardware and programming (for example, programmable
instructions) to implement one or more functionalities of the processing engine(s)
208. In examples described herein, such combinations of hardware and
programming may be implemented in several different ways. For example, the
programming for the processing engine(s) 208 may be processor executable
instructions stored on a non-transitory machine-readable storage medium and the
hardware for the processing engine(s) 208 may comprise a processing resource
(for example, one or more processors), to execute such instructions. In the present
examples, the machine-readable storage medium may store instructions that, when
executed by the processing resource, implement the processing engine(s) 208. In
such examples, the system 102 may comprise the machine-readable storage
medium storing the instructions and the processing resource to execute the
instructions, or the machine-readable storage medium may be separate but
accessible to system 102 and the processing resource. In other examples, the
processing engine(s) 208 may be implemented by electronic circuitry.
[0047] The data 210 may comprise data that is either stored or generated
as a result of functionalities implemented by any of the components of the processing engine(s) 208 or the system 102. The system 102 can include a receiving module 212 that can be configured to receive the set of first signals and the set of second signals.
[0048] In an embodiment, the system 102 can include a computing
module 214 that can be operatively configured with the receiving module 212. The computing module can be configured to convert the coordinates in a text format. The computing module 214 can use an interrelation between the sensed coordinates to generate the password.

[0049] In an embodiment, the system 102 can include an encryption
module 216 that can be operatively configured with the receiving module 212 and
the computing module 214. The encryption module 216 can be configured to
encrypt the document of the first user 110 using the generated password.
[0050] FIG. 3 illustrates a proposed method of leaning/training a skill, in
accordance with an embodiment of the present disclosure.
[0051] In an embodiment, at step 302, a method 300 for encrypting the
document can include receiving, using a processor, a set of first signals, from the
one or more sensors, pertaining to the sensed movement of the input device, by
the first user, with respect to a surface.
[0052] At step 304, the method 300 can include generating, by the
processor, a password, corresponding to the first user, based on the set of first
signals, and the password is generated on the basis of one or more coordinates of
the surface where the input device is actuated, by the first user, during movement
of the input device on the surface.
[0053] At step 306, the method 300 can include receiving, by the
processor, a set of second signals, from an entity, pertaining to the document of
the first user to be secured for the authorized access.
[0054] At step 308, the method 300 can include encrypting, by the
processor, the document with the generated password, and the encryption of the
document with the generated password facilitates the secured access of the
document.
[0055] FIG. 4 illustrates an exemplary computer system in which or with
which embodiments of the present invention can be utilized, in accordance with
embodiments of the present disclosure.
[0056] As illustrated in FIG. 4, computer system 400 can include an
external storage device 410, a bus 420, a main memory 430, a read only memory
440, a mass storage device 450, communication port 460, and a processor 470. A
person skilled in the art will appreciate that the computer system may include
more than one processor and communication ports. Examples of processor 470
include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or

AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™ system on chip processors or other future processors. Processor 470 may include various modules associated with embodiments of the present invention. Communication port 460 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 460 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[0057] Memory 430 can be Random Access Memory (RAM), or any other
dynamic storage device commonly known in the art. Read-only memory 440 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 470. Mass storage 450 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[0058] Bus 420 communicatively couple processor(s) 470 with the other
memory, storage and communication blocks. Bus 420 can be, e.g. a Peripheral Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface (SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as other buses, such a front side bus (FSB), which connects processor 470 to software system.

[0059] Optionally, operator and administrative interfaces, e.g. a display,
keyboard, and a cursor control device, may also be coupled to bus 420 to support direct operator interaction with a computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 460. The external storage device 410 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc -Read Only Memory (CD-ROM), Compact Disc-Re-Writable (CD-RW), Digital Video Disk-Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[0060] Moreover, in interpreting the specification, all terms should be
interpreted in the broadest possible manner consistent with the context. In particular, the terms "comprises" and "comprising" should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refer to at least one of something selected from the group consisting of A, B, C ....and N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[0061] While the foregoing describes various embodiments of the
invention, other and further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.

ADVANTAGES OF THE INVENTION
[0062] The proposed invention provides a system and method for
encrypting document, which is efficient.
[0063] The proposed invention provides a system and method for
encrypting document, which is prevents any misuse of document by any
unauthorized person.
[0064] The proposed invention provides a system and method for
encrypting document, which is easy to use.
[0065] The proposed invention provides a system and method for
encrypting document, which requires less maintenance cost.

We Claim:

1. A system for encrypting a document of a first user, the system comprising:
an input device, associated with the first user;
one or more sensing devices configured with the input device, and configured to sense movement of the input device;
a processing unit operatively configured with the input device and the one or more sensing device, the processing unit comprises a processor configured to execute a set of instructions, stored in a memory, which, on execution, causes the system to:
receive, from the one or more sensors, a set of first signals
pertaining to the sensed movement of the input device, by the first
user, with respect to a surface;
generate, corresponding to the first user, a password based
on the set of first signals, and the password is generated on the
basis of one or more coordinates of the surface where the input
device is actuated, by the first user, during movement of the input
device on the surface;
receive, from an entity, a set of second signals pertaining to
the document of the first user to be secured for the authorized
access; and
encrypt the document with the generated password, wherein
the encryption of the document with the generated password
facilitates the secured access of the document.
2. The system as claimed in claim 1, wherein the encrypted document is accessed by a second user by entering the generated password.
3. The system as claimed in claim 1, wherein the input device comprises any or combination of a mouse, a touch pad, and a touch screen.
4. The system as claimed in claim 1, wherein the entity comprises any or combination of a private institution, and public institution.

5. The system as claimed in claim 1, wherein the password comprises any or combination of alphabet, numerical value, and special character.
6. A method for encrypting a document of a first user, the method comprising:
receiving, using a processor, a set of first signals, from the one or more sensors, pertaining to the sensed movement of the input device, by the first user, with respect to a surface;
generating, by the processor, a password, corresponding to the first user, based on the set of first signals, and the password is generated on the basis of one or more coordinates of the surface where the input device is actuated, by the first user, during movement of the input device on the surface;
receiving, by the processor, a set of second signals, from an entity, pertaining to the document of the first user to be secured for the authorized access; and
encrypting, by the processor, the document with the generated password, wherein the encryption of the document with the generated password facilitates the secured access of the document.

Documents

Application Documents

# Name Date
1 202111035008-STATEMENT OF UNDERTAKING (FORM 3) [03-08-2021(online)].pdf 2021-08-03
2 202111035008-POWER OF AUTHORITY [03-08-2021(online)].pdf 2021-08-03
3 202111035008-FORM FOR STARTUP [03-08-2021(online)].pdf 2021-08-03
4 202111035008-FORM FOR SMALL ENTITY(FORM-28) [03-08-2021(online)].pdf 2021-08-03
5 202111035008-FORM 1 [03-08-2021(online)].pdf 2021-08-03
6 202111035008-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [03-08-2021(online)].pdf 2021-08-03
7 202111035008-EVIDENCE FOR REGISTRATION UNDER SSI [03-08-2021(online)].pdf 2021-08-03
8 202111035008-DRAWINGS [03-08-2021(online)].pdf 2021-08-03
9 202111035008-DECLARATION OF INVENTORSHIP (FORM 5) [03-08-2021(online)].pdf 2021-08-03
10 202111035008-COMPLETE SPECIFICATION [03-08-2021(online)].pdf 2021-08-03
11 202111035008-Proof of Right [11-08-2021(online)].pdf 2021-08-11
12 202111035008-Proof of Right [24-09-2021(online)].pdf 2021-09-24
13 202111035008-FORM 18 [26-05-2023(online)].pdf 2023-05-26
14 202111035008-FER.pdf 2023-11-17
15 202111035008-FORM-26 [17-05-2024(online)].pdf 2024-05-17
16 202111035008-FER_SER_REPLY [17-05-2024(online)].pdf 2024-05-17
17 202111035008-DRAWING [17-05-2024(online)].pdf 2024-05-17
18 202111035008-CORRESPONDENCE [17-05-2024(online)].pdf 2024-05-17
19 202111035008-CLAIMS [17-05-2024(online)].pdf 2024-05-17
20 202111035008-ABSTRACT [17-05-2024(online)].pdf 2024-05-17
21 202111035008-US(14)-HearingNotice-(HearingDate-07-11-2024).pdf 2024-10-01
22 202111035008-FORM-26 [30-10-2024(online)].pdf 2024-10-30
23 202111035008-Correspondence to notify the Controller [30-10-2024(online)].pdf 2024-10-30
24 202111035008-Written submissions and relevant documents [22-11-2024(online)].pdf 2024-11-22
25 202111035008-Annexure [22-11-2024(online)].pdf 2024-11-22
26 202111035008-PatentCertificate31-12-2024.pdf 2024-12-31
27 202111035008-IntimationOfGrant31-12-2024.pdf 2024-12-31

Search Strategy

1 SearchHistory_202111035008E_16-11-2023.pdf

ERegister / Renewals