Abstract: System and method for generation of secure QR code The present invention discloses a system and method for generation of a secure QR code (114). The disclosed secure QR code (114) protects confidential data from unauthorized reading. The secure QR code (114) is configured to be generated by a customized QR code generator (104) and is read by a customized QR code converter (202) for maintaining the security of the data stored in the QR code. The method for generating the secure QR code (114) comprises encrypting an input data (102) by using an encryption algorithm. Subsequently, the encrypted data is encoded, and a secret XOR key is used to perform a XOR masking process on the encoded data. A secure QR code (114) can be printed after the XOR process such that the secure QR code cannot be read by any standard QR code reading module or software.
DESC:FIELD OF INVENTION
[001] The field of invention generally relates to QR codes. More specifically, it relates to a secure QR code that requires specific reading components and cannot be read by a standard QR reading device.
BACKGROUND
[002] Since the arrival of QR code reading applications for smartphones, QR codes have been adopted in innumerable commercial and non-commercial uses. In particular, QR codes have become indispensable in online transactions, virtual bills, e-commerce, identity-based applications, and the like. In such applications, the QR code is used to store information such as product details, transaction id, movie tickets, user details, account details, etc.
[003] In the existing prior arts, a QR code can be read by any standard QR converter or by any standard QR reading software application. Hence, the information stored in the QR code can be obtained with ease. This poses a security risk in case sensitive information or private information is stored in the QR code. In turn, this security risk can lead to a probable misuse of important documents or data, by way of correlation between data available in human readable form and encrypted data available in the QR. Thus, current readable QR codes pose a big security threat on the issue of confidentiality of important information.
[004] Thus, in light of the above discussion, it is implied that there is need for a secure QR code and method for generation of the secure QR code which is reliable and does not suffer from the problems discussed above.
OBJECT OF INVENTION
[005] The principle object of this invention is to disclose a secure QR code which is protected against unauthorized reading or scanning.
[006] A further object of the invention is to provide a method for generation of a secure QR code which cannot be read by any standard QR reading device or software.
[007] A further object of the invention is to provide a method for extraction of input data from a secure QR code which cannot be read by any standard QR reading device or software.
[008] Another object of the invention is to provide a method for generation of a secure QR code which can be read or verified only by the corresponding secure code reading software.
[009] Another object of the invention is to provide a system to generate a secure QR code which can be read or verified only by the corresponding secure code reading system.
[0010] Another object of the invention is to provide a system to extract input data from a secure QR code which can be read or verified only by the corresponding secure code reading system.
[0011] Yet another object of the invention is to generate a secure QR code wherein a QR code comprised is configured to be read only by custom-made hardware modules.
BRIEF DESCRIPTION OF FIGURES
[0010] This invention is illustrated in the accompanying drawings, throughout which, like reference letters indicate corresponding parts in the various figures.
[0011] The embodiments herein will be better understood from the following description with reference to the drawings, in which:
[0012] Figure 1 depicts/illustrates a system for generation of a secure QR code.
[0013] Figure 2 depicts/illustrates a system for extraction of data from a secure QR code.
[0014] Figure 3A depicts/illustrates an exemplary embodiment of a system for generation of a secure QR code.
[0015] Figure 3B depicts/illustrates an exemplary embodiment of a system for generation of a secure QR code.
[0016] Figure 4A depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code by using an image capturing device.
[0017] Figure 4B depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code by using an image capturing device embedded in the system.
[0018] Figure 4C depicts/illustrates an exemplary embodiment of a system for extraction of data from a secure QR code.
[0019] Figure 5 illustrates a method for generation of a secure QR code.
[0020] Figure 6 illustrates a method extraction of data from a secure QR code.
STATEMENT OF INVENTION
[0021] The present invention discloses a system and method for generation of a secure QR code. The disclosed secure QR code comprises a plurality of security features, wherein the security features are for the protection of transaction data against unauthorized reading/scanning/access. The secure QR code is configured to be read by a customized hardware module for maintaining the security of the data stored in the QR code.
[0022] Furthermore, the method for generating the secure QR code comprises encrypting an input data by using an encryption algorithm. Subsequently, the encrypted data is encoded. Thereafter, a secret XOR key is used to perform an XOR process on the encoded data. A secure QR code can be generated after the XOR process such that the secure QR code cannot be read by any standard QR code reading module or software.
[0023] The system and method also disclose the reading and deciphering of the secure QR code. The system and method for generating the secure QR code comprises performing an XOR demasking process on the secure QR code by using a secret XOR key. Subsequently, the demasked XORed data is decoded. Thereafter, the decoded data is decrypted by using a decryption algorithm to extract the stored data. Thus, the data comprised within the secure QR code can be read after the decryption process.
DETAILED DESCRIPTION
[0024] The embodiments herein and the various features and advantageous details thereof are explained more fully with reference to the non-limiting embodiments that are illustrated in the accompanying drawings and/or detailed in the following description. Descriptions of well-known components and processing techniques are omitted so as to not unnecessarily obscure the embodiments herein. The examples used herein are intended merely to facilitate an understanding of ways in which the embodiments herein may be practiced and to further enable those of skill in the art to practice the embodiments herein. Accordingly, the examples should not be construed as limiting the scope of the embodiments herein.
[0025] The present invention discloses a system and method for generation of a secure QR code. The disclosed secure QR code comprises a plurality of security features, wherein the security features are for the protection of transaction data against unauthorized reading/scanning/access. The secure QR code is configured to be read by a customized hardware module for maintaining the security of the data stored in the QR code.
[0026] Furthermore, the method for generating the secure QR code comprises encrypting an input data by using an encryption algorithm. Subsequently, the encrypted data is encoded. Thereafter, a secret XOR key is used to perform an XOR process on the encoded data. A secure QR code can be generated after the XOR process such that the secure QR code cannot be read by any standard QR code reading module or software. The usage of the XOR key throughout all embodiments of this description depicts one exemplary embodiment. The XOR key has been used throughout the description only for the purposes of clarity in explanation.
[0027] Figure 1 depicts/illustrates a generation system 100 for generation of a secure QR code, in accordance with an embodiment. The generation system 100 receives an input data 102 and processes the data 102 by using a QR code generator 104 to generate a secure QR code 114.
[0028] The data 102 may comprise information related to a user including their private information as well as details of their financial information. The data 102 may comprise one or more of their name, age, date of birth, account details, etc. In an embodiment, the data 102 may vary as per the application of the system 100 in various industries.
[0029] The secure QR code 114 may be generated by the QR code generator 104 such that the secure QR code 114 is not readable by any standard QR code converter or reading software.
[0030] The QR code generator 104 comprises several modules to complete the generation of the secure QR code 114. The QR code generator 104 comprises an input device 106 for receiving one or more inputs to be transformed into a QR code. The QR code generator 104 further comprises an encrypting module 108 for encrypting the received inputs. Subsequently, an encoding module 110 processes the encrypted data to generate an encoded data. Thereafter, the XOR module 112 is used to mask the encoded data by using a secret XOR key. Subsequently, the XORed data is used to generate the secure QR code 114.
[0031] The XORed data can be printed in one or more fonts including a customized Sesh QR font to generate the secure QR code 114.
[0032] The usage of the XOR key throughout all embodiments of this description depicts one exemplary embodiment for clarity in explanation. One or more different masking processes can be used to process the secure QR code 114.
[0033] In an embodiment, different codes can be made specific to different environments comprising the disclosed system, by using a unique key or technique to create QR code families based on requirements of the environments or the application of the disclosed system and method.
[0034] In an alternate embodiment, for different or multiple instances of the generation of the secure QR code 114, one or more sets of codes can be generated for different applications or users. Thus, corresponding to each code, one or more hardware modules comprising the QR code generator 104 and/or the QR code converter 202 may be configured for the same code and/or a different code. Multiple schema/patterns of codes.
[0035] In an embodiment, different environments of QR code generators 104 and QR code converters 202 can be created such that the codes and/or the QR code generators 104 and QR code converters 202 are not inter-operable with each other.
[0036] In an exemplary embodiment, a first QR code generator 104 and a first QR code converter 202 may be present in a first environment comprising customer A, and a second QR code generator 104 and a second QR code converter 202 may be present in a second environment comprising customer B. In case customer A has received a secure QR code 114 generated by the first QR code generator 104, the secure QR code 114 cannot be read by the second QR code converter 202. Similarly, a secure QR code 114 generated for customer B by the second QR code generator 104 cannot be read by the first QR code converter 202. Thus, the disclosed system can be made unique to each environment, depending on the requirements of the environment.
[0037] In an embodiment, multiple sets or groups of code can be generated for the environments comprising unique QR code generators 104 and QR code converter 202, depending on the requirements of the environment.
[0038] Figure 2 depicts/illustrates a reading system 200 for extraction of data from a secure QR code, in accordance with an embodiment. The reading system 200 receives a secure QR code 114 and processes the secure QR code 114 by using a QR code converter 202 to extract an input data 102.
[0039] The secure QR code 114 may have been generated by the QR code generator 104 such that the secure QR code 114 is not readable by any standard QR code converter or reading software. Hence, the QR code converter 202 is required to decipher the data comprised within the secure QR code 114.
[0040] The QR code converter 202 comprises several modules to read the secure QR code 114. In particular, the QR code converter 202 comprises an input device 204 for receiving the secure QR code 114. Subsequently, the secure QR code 114 pattern is extracted from the received data. Further, the secure QR code 144 is processed to generate a secure QR pattern byte array. Thereafter, an XOR module 206 is used to demask the secure QR code 114 by using a secret XOR key. The QR code converter 202 further comprises a decoding module 208 to demask the XORed secure QR code 114 to generate a decoded data. Subsequently, a decrypting module 210 is used for decrypting the decoded secure QR code 114 to extract the data 102.
[0041] In an embodiment, the secure QR code 114 can only be generated by the QR code generator 104. Further, the secure QR code 114 can only be deciphered by the QR code converter 202. Any standard QR code generator or converter in the art cannot generate or interpret the secure QR code 114 as the data after creation or interpretation requires certain keys and processes that cannot be achieved by a standard QR code generator or reading software.
[0042] In a preferred embodiment, the cryptographic algorithm used for the encryption of the data 102 and decryption of the secure QR cod e 114 may be a symmetric key algorithm in which same cryptographic keys are used for both encryption of data 102 and decryption of secure QR code 114.
[0043] In another embodiment, instead of the XOR key, one or more different demasking processes can be used on the secure QR code 114. The demasking process corresponds to the masking process used in the generation of the secure QR code 114. Further, different masking-demasking processes can be made specific to different environment by using a unique key or technique to create varieties of QR code families based on one or more requirements of the environment.
[0044] Figure 3A depicts/illustrates an exemplary embodiment of a generation system 300 for generation of a secure QR code 114, in accordance with an embodiment. In an embodiment, information on a document 302 needs to be converted into a secure QR code 114 such that it cannot be read by standard QR code converters. The generation system 300 comprises the QR code generator 104 which can receive inputs and conv99ert them into secure QR codes 114, as explained above. The QR code generator 104 may capture an image of the document 302 by using an image capturing device 304. The image capturing device 304 may comprise a camera, as is commonly used in the art.
[0045] Figure 3B depicts/ illustrates an exemplary embodiment of a system 310 for generation of a secure QR code 114. In an embodiment, the QR code generator 104 may receive a virtual input data 102 through one or more communication modules (not shown in figure).
[0046] Subsequently, for both figures 3A and 3B, the QR code generator 104 directly converts the received data 102 into the secure QR code 114 by using the modules explained in the QR code generator 104 depicted in figure 1.
[0047] In an embodiment, the QR code generator 104 may display one or more data to be converted into a secure QR code 114, which may be further chosen or confirmed via an input from a user of the QR code generator 104.
[0048] In an embodiment, the QR code generator 104 may be comprised in a single hardware device. Alternatively, the encryption module 108 may be part of one hardware device while another hardware device comprises the encoding module 110 and the XOR module 112. In this case, the encryption module 108 may communicate with the other hardware device to complete the generation of the secure QR code 114.
[0049] In an embodiment, the secure QR code generator 104 can be used in a variety of applications. The inputs to the QR code generator 104 can be digital inputs or physical inputs, and the outputs of the QR code generator 104 can be digital outputs or physical outputs. The physical inputs may be documents or displays comprising the input data 102, and the physical outputs may be printed outputs, when used in combination with a printing device that is part of the same system or an external device.
[0050] In an embodiment, the secure QR code 114 can be generated digitally for digital applications, wherein the input data 102 is a digital data, and the secure QR code is generated in the form of a digital output. The virtual application can be a mobile application such as a banking application or an e-commerce application, among others.
[0051] In an embodiment, the secure QR code 114 can be generated and printed on confidential documents that require strong security measures, wherein the input data 102 is a physical printed input or a digital input, and the secure QR code can be generated in the form of a digital confirmation that can be shared virtually with the customer or printed on a confidential document to be shared with the customer. The physical printed input can be a confidential document, and the secure QR code 114 can be printed on the same.
[0052] In an embodiment, the secure QR code 114 can be generated during a transaction of a customer in a commercial establishment, wherein the input data 102 is a physical printed input, and the secure QR code 114 can be generated in the form of a digital transaction confirmation that can be shared virtually with the customer or printed on a bill to be shared with the customer.
[0053] In an embodiment, a secure QR code 114 needs to be deciphered in order to extract data 102 comprised in the secure QR code 114. Since the secure QR code 114 cannot be read by standard QR code converters, the disclosed system comprises a QR code converter 202 which can receive secure QR codes 114 and extract the data encrypted in the secure QR codes 114.
[0054] Figures 4A-4C depict various exemplary embodiments of the QR code converter 202, according to different embodiments arising from various applications or environments wherein the disclosed system may be used.
[0055] Figure 4A depicts/illustrates an exemplary embodiment of a reading system 400 for extraction of data from a secure QR code 114 printed on a document 402 by using an image capturing device 404, in accordance with an embodiment. In this embodiment, the image capturing device 404 and the QR code converter 202 may be located in different hardware modules. The image capturing device 404 captures an image of the secure QR code 114 present on the document 402, and subsequently shares the image of the secure QR code 114 with the QR code converter 202.
[0056] In an embodiment, the image capturing device 404 may comprise a camera 406, as is commonly used in the art. The image capturing device 404 may be a smartphone, a webcam, a laptop, or a camera, among other devices which comprise a camera.
[0057] In an embodiment, the document 402 may be a paper, a certificate, a book, a brochure, a screen, or a digital display, among others.
[0058] Figure 4B depicts/illustrates an exemplary embodiment of a system 410 for extraction of data from a secure QR code 114 by using an image capturing device 412 embedded in the secure QR code converter 202. In this embodiment, the image capturing device 412 and the QR code converter 202 may be comprised in a single hardware device. The image capturing device 412 captures an image of the secure QR code 114 present on the document 402.
[0059] Figure 4C depicts/illustrates an exemplary embodiment of a system 414 for extraction of data from a secure QR code 114. In an embodiment, the QR code converter 202 may receive a virtual input data comprising the secure QR code 114 through one or more communication modules present in the QR code converter 202 (not shown in figure). In a further embodiment, the QR code converter 202 may receive the virtual input data from a third-party device or an external source.
[0060] Subsequently, for figures 4A, 4B and 4C, the QR code converter 202 extracts the data 102 from the received secure QR code 114 by using the modules explained in the QR code converter 202 of figure 2.
[0061] In a further embodiment, with respect to figures 3A, 3B, 4A, 4B and 4C, one or more modules of the QR code generator 104 and/or QR code converter 202 may be located, embedded, or coded within one or more devices such as a computer, a laptop, an embedded chip, a Printed Circuit Board, a mobile application, a hand-held device, a wearable device, and a dongle, among others. Thus, the QR code generator 104 and/or QR code converter 202 can be implemented in the form of the devices mentioned above.
[0062] In a further embodiment, the QR code converter 202 may display the secure QR code 114, which may be further chosen or confirmed via an input from a user of the QR code converter 202.
[0063] In an embodiment, the QR code generator 104 and the QR code converter 202 may be comprised in a single device. Alternatively, the QR code generator 104 and the QR code converter 202 may be comprised in two separate devices. The two separate devices may be present at the same location to achieve both generation and reading of the secure QR code 114. Alternatively, the two separate devices may be present at two different locations such that the QR code generation occurs in one location and the QR code reading occurs in another location for improved security, as per the requirements of the particular application of the disclosed systems.
[0064] In another alternative embodiment, an image of a document comprising the secure QR code 114 is captured and the image of the secure QR code 114 is directly shared with the QR code converter 202, which may be located in a hardware module. Subsequently, the QR code converter 202 deciphers the secure QR code 114 to extract the data 102.
[0065] Figure 5 illustrates a method 500 for generation of a secure QR code, in accordance with an embodiment. As depicted at step 502, input data which is to be converted into a secure QR code is received from a user. Thereafter, the received data is encrypted by using an encryption algorithm. The encryption algorithm may be a symmetric key algorithm in a preferred embodiment, as depicted at step 504. Subsequently, the encrypted data is encoded such that its size is reduced and it can comply with any software or hardware module, as depicted at step 506. Thereafter, the data is processed with a secret XOR key such that the secure QR code becomes unreadable, as depicted at step 508. Thus, the secure QR code is printed, as depicted at step 510.
[0066] Figure 6 illustrates a method for extraction of data from a secure QR code. As depicted at step 602, a secure QR code which is to be interpreted into readable data is captured, collected or received. Thereafter, the secure QR code is received, the method 600 extracts one or more byte arrays from the system received secure QR code pattern. Subsequently, the arrays are processed with a secret XOR key to demask the arrays such that the secure QR code becomes readable, as depicted at step 604. Subsequently, the data is decoded, as depicted at step 606. Thereafter, the collected data is decrypted by using a decryption algorithm and decryption key, as depicted at step 608. Further, the readable data is extracted from the decrypted data, as depicted at step 610.
[0067] In a preferred embodiment, the data 102 comprises information related to an account number of a customer, passbook details, customer ID, customer name and the like.
[0068] The advantages of the current invention include the prevention of any unauthorized access to the private or confidential data of a user. Therefore, the disclosed system and method prevents duplication and/or misuse of the confidential data. Since the secure QR codes can only be read by a customized hardware module, the system prevents unauthorized access to the confidential data by using generic QR code converters. The implementation of the disclosed secure QR code system and method in a financial industry such as the banking industry can set a new standard in data security. The usage of the secure QR code can result in reduced data protection and corresponding data security costs, as well as a minimization of data security compliance costs, which will further benefit the banking industry and customers.
[0069] Applications of the current invention include banking, secure documents and certificates, implementation of the disclosed security features in confidential publications and for transmission/exchange of data through secure QR codes between authorized parties. Further, the current application can also be used in various other industries that use a secure QR code, such as pharmaceuticals, manufacturing industries, retail, e-commerce, etc.
[0070] The foregoing description of the specific embodiments will so fully reveal the general nature of the embodiments herein that others can, by applying current knowledge, readily modify and/or adapt for various applications such specific embodiments without departing from the generic concept, and, therefore, such adaptations and modifications should and are intended to be comprehended within the meaning and range of equivalents of the disclosed embodiments. It is to be understood that the phraseology or terminology employed herein is for the purpose of description and not of limitation. Therefore, while the embodiments herein have been described in terms of preferred embodiments, those skilled in the art will recognize that the embodiments herein can be practiced with modification within the scope of the embodiments as described here.
,CLAIMS:We claim:
1. A system for generation and reading of a secure QR code (114), comprising:
a generation system (100) for generating the secure QR code (114), wherein the generation system (100) comprises:
a customized QR code generator (104) for receiving and processing an input data (102) to generate the secure QR code (114) characterized in that the QR code generator (104) comprises:
an input device (106) for receiving one or more input data (102);
an encrypting module (108) for encrypting received input data (102);
an encoding module (110) for processing encrypted data to generate an encoded data; and
a reading system (200) for extracting the input data (102) from the secure QR code (114), wherein the reading system (200) comprises:
a customized QR code converter (202) for receiving and processing the secure QR code (114) to extract the input data (102).
2. The system as claimed in claim 1, wherein the customized QR code generator (104) comprises an XOR module (112) to mask the encoded data by using a secret XOR key to generate the secure QR code (114).
3. The system as claimed in claim 1, wherein the customized QR code converter (202) comprises:
an input device (204) for receiving the secure QR code (114);
an XOR module (206) for demasking the received secure QR code (114) by using a secret XOR key;
a decoding module (208) for decoding the demasked secure QR code; and
a decrypting module (210) for decrypting the decoded secure QR code to extract the input data (102).
4. The system as claimed in claim 1, wherein the customized QR code generator (104) comprises one or more of:
an image capturing device (304) for capturing an image of a document (302) for receiving the input data (102); and
one or more communication modules for receiving a virtual input data comprising the input data (102).
5. The system as claimed in claim 1, wherein the reading system (200) comprises one or more of:
an image capturing device (404) for capturing an image of the secure QR code (114) printed on a document (402) and sharing the image of the secure QR code (114) with the QR code converter (202);
an image capturing device (412) embedded in the secure QR code converter (202) for capturing an image of the secure QR code (114) printed on a document (402); and
one or more communication modules for receiving a virtual input data comprising the secure QR code (114).
6. A method for generating and reading a secure QR code (114), the method comprising:
generating the secure QR code (114) by using a generation system (100), wherein the generating is characterized by:
receiving an input data (102) by using an input device (106);
encrypting the received input data (102) by using an encrypting module (108);
encoding the encrypting data by using an encoding module (110); and
generating the secure QR code (114) by using a customized QR code generator (104); and
extracting the input data (102) by using a reading system (200), wherein the extracting comprises:
receiving the secure QR code (114);
processing the received secure QR code (114); and
extracting the input data (102) by using a customized QR code converter (202).
7. The method as claimed in claim 6, wherein generating the secure QR code (114) comprises:
processing the extracted data by using a secret XOR key; and
generating the secure QR code; and
8. The method as claimed in claim 6, wherein decrypting the secure QR code (114) comprises:
receiving a secure QR code (114), by using an input device (204);
demasking the secure QR code (114) with a secret XOR key, by using an XOR module (206);
decoding the processed secure QR code, by using a decoding module (208);
decrypting the decoded secure QR code data, by using a decrypting module (210); and
extracting the data from the secure QR code.
9. The method as claimed in claim 6, wherein receiving an input data (102) comprises one or more of:
capturing an image of a document (302) by using an image capturing device (304); and
receiving a virtual input data comprising the input data (102) by using one or more communication modules.
10. The method as claimed in claim 6, wherein receiving the secure QR code (114) comprises one or more of:
capturing an image of the secure QR code (114) printed on a document (402) by using an image capturing device (404), and sharing the image of the secure QR code (114) with the QR code converter (202);
capturing an image of the secure QR code (114) printed on a document (402) by using an image capturing device (412) embedded in the secure QR code converter (202); and
receiving a virtual input data comprising the secure QR code (114) by using one or more communication modules.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 201921016544-IntimationOfGrant30-04-2024.pdf | 2024-04-30 |
| 1 | 201921016544-STATEMENT OF UNDERTAKING (FORM 3) [25-04-2019(online)].pdf | 2019-04-25 |
| 2 | 201921016544-PatentCertificate30-04-2024.pdf | 2024-04-30 |
| 2 | 201921016544-PROVISIONAL SPECIFICATION [25-04-2019(online)].pdf | 2019-04-25 |
| 3 | 201921016544-POWER OF AUTHORITY [25-04-2019(online)].pdf | 2019-04-25 |
| 3 | 201921016544-Annexure [05-04-2024(online)].pdf | 2024-04-05 |
| 4 | 201921016544-FORM 3 [05-04-2024(online)].pdf | 2024-04-05 |
| 4 | 201921016544-FORM 1 [25-04-2019(online)].pdf | 2019-04-25 |
| 5 | 201921016544-PETITION UNDER RULE 137 [05-04-2024(online)].pdf | 2024-04-05 |
| 5 | 201921016544-DRAWINGS [25-04-2019(online)].pdf | 2019-04-25 |
| 6 | 201921016544-RELEVANT DOCUMENTS [05-04-2024(online)].pdf | 2024-04-05 |
| 6 | 201921016544-Proof of Right (MANDATORY) [09-05-2019(online)].pdf | 2019-05-09 |
| 7 | 201921016544-Written submissions and relevant documents [05-04-2024(online)].pdf | 2024-04-05 |
| 7 | 201921016544-ORIGINAL UR 6(1A) FORM 1 & FORM 3-130519.pdf | 2019-08-07 |
| 8 | 201921016544-DRAWING [25-04-2020(online)].pdf | 2020-04-25 |
| 8 | 201921016544-Annexure [21-03-2024(online)].pdf | 2024-03-21 |
| 9 | 201921016544-Correspondence to notify the Controller [21-03-2024(online)].pdf | 2024-03-21 |
| 9 | 201921016544-CORRESPONDENCE-OTHERS [25-04-2020(online)].pdf | 2020-04-25 |
| 10 | 201921016544-COMPLETE SPECIFICATION [25-04-2020(online)].pdf | 2020-04-25 |
| 10 | 201921016544-US(14)-HearingNotice-(HearingDate-01-04-2024).pdf | 2024-03-07 |
| 11 | 201921016544-Request Letter-Correspondence [25-05-2020(online)].pdf | 2020-05-25 |
| 11 | 201921016544-SER.pdf | 2024-03-01 |
| 12 | 201921016544-CLAIMS [31-01-2024(online)].pdf | 2024-01-31 |
| 12 | 201921016544-Power of Attorney [25-05-2020(online)].pdf | 2020-05-25 |
| 13 | 201921016544-COMPLETE SPECIFICATION [31-01-2024(online)].pdf | 2024-01-31 |
| 13 | 201921016544-Form 1 (Submitted on date of filing) [25-05-2020(online)].pdf | 2020-05-25 |
| 14 | 201921016544-CERTIFIED COPIES TRANSMISSION TO IB [25-05-2020(online)].pdf | 2020-05-25 |
| 14 | 201921016544-CORRESPONDENCE [31-01-2024(online)].pdf | 2024-01-31 |
| 15 | 201921016544-FER_SER_REPLY [31-01-2024(online)].pdf | 2024-01-31 |
| 15 | 201921016544-Power of Attorney [12-08-2020(online)].pdf | 2020-08-12 |
| 16 | 201921016544-Form 1 (Submitted on date of filing) [12-08-2020(online)].pdf | 2020-08-12 |
| 16 | 201921016544-FORM 3 [31-01-2024(online)].pdf | 2024-01-31 |
| 17 | 201921016544-FER.pdf | 2023-08-04 |
| 17 | 201921016544-Covering Letter [12-08-2020(online)].pdf | 2020-08-12 |
| 18 | 201921016544-CERTIFIED COPIES TRANSMISSION TO IB [12-08-2020(online)].pdf | 2020-08-12 |
| 18 | 201921016544-FORM 18 [17-03-2023(online)].pdf | 2023-03-17 |
| 19 | Abstract1.jpg | 2021-10-19 |
| 20 | 201921016544-CERTIFIED COPIES TRANSMISSION TO IB [12-08-2020(online)].pdf | 2020-08-12 |
| 20 | 201921016544-FORM 18 [17-03-2023(online)].pdf | 2023-03-17 |
| 21 | 201921016544-Covering Letter [12-08-2020(online)].pdf | 2020-08-12 |
| 21 | 201921016544-FER.pdf | 2023-08-04 |
| 22 | 201921016544-Form 1 (Submitted on date of filing) [12-08-2020(online)].pdf | 2020-08-12 |
| 22 | 201921016544-FORM 3 [31-01-2024(online)].pdf | 2024-01-31 |
| 23 | 201921016544-FER_SER_REPLY [31-01-2024(online)].pdf | 2024-01-31 |
| 23 | 201921016544-Power of Attorney [12-08-2020(online)].pdf | 2020-08-12 |
| 24 | 201921016544-CORRESPONDENCE [31-01-2024(online)].pdf | 2024-01-31 |
| 24 | 201921016544-CERTIFIED COPIES TRANSMISSION TO IB [25-05-2020(online)].pdf | 2020-05-25 |
| 25 | 201921016544-Form 1 (Submitted on date of filing) [25-05-2020(online)].pdf | 2020-05-25 |
| 25 | 201921016544-COMPLETE SPECIFICATION [31-01-2024(online)].pdf | 2024-01-31 |
| 26 | 201921016544-CLAIMS [31-01-2024(online)].pdf | 2024-01-31 |
| 26 | 201921016544-Power of Attorney [25-05-2020(online)].pdf | 2020-05-25 |
| 27 | 201921016544-Request Letter-Correspondence [25-05-2020(online)].pdf | 2020-05-25 |
| 27 | 201921016544-SER.pdf | 2024-03-01 |
| 28 | 201921016544-COMPLETE SPECIFICATION [25-04-2020(online)].pdf | 2020-04-25 |
| 28 | 201921016544-US(14)-HearingNotice-(HearingDate-01-04-2024).pdf | 2024-03-07 |
| 29 | 201921016544-Correspondence to notify the Controller [21-03-2024(online)].pdf | 2024-03-21 |
| 29 | 201921016544-CORRESPONDENCE-OTHERS [25-04-2020(online)].pdf | 2020-04-25 |
| 30 | 201921016544-Annexure [21-03-2024(online)].pdf | 2024-03-21 |
| 30 | 201921016544-DRAWING [25-04-2020(online)].pdf | 2020-04-25 |
| 31 | 201921016544-ORIGINAL UR 6(1A) FORM 1 & FORM 3-130519.pdf | 2019-08-07 |
| 31 | 201921016544-Written submissions and relevant documents [05-04-2024(online)].pdf | 2024-04-05 |
| 32 | 201921016544-Proof of Right (MANDATORY) [09-05-2019(online)].pdf | 2019-05-09 |
| 32 | 201921016544-RELEVANT DOCUMENTS [05-04-2024(online)].pdf | 2024-04-05 |
| 33 | 201921016544-DRAWINGS [25-04-2019(online)].pdf | 2019-04-25 |
| 33 | 201921016544-PETITION UNDER RULE 137 [05-04-2024(online)].pdf | 2024-04-05 |
| 34 | 201921016544-FORM 1 [25-04-2019(online)].pdf | 2019-04-25 |
| 34 | 201921016544-FORM 3 [05-04-2024(online)].pdf | 2024-04-05 |
| 35 | 201921016544-Annexure [05-04-2024(online)].pdf | 2024-04-05 |
| 35 | 201921016544-POWER OF AUTHORITY [25-04-2019(online)].pdf | 2019-04-25 |
| 36 | 201921016544-PatentCertificate30-04-2024.pdf | 2024-04-30 |
| 36 | 201921016544-PROVISIONAL SPECIFICATION [25-04-2019(online)].pdf | 2019-04-25 |
| 37 | 201921016544-STATEMENT OF UNDERTAKING (FORM 3) [25-04-2019(online)].pdf | 2019-04-25 |
| 37 | 201921016544-IntimationOfGrant30-04-2024.pdf | 2024-04-30 |
| 38 | 201921016544-POA [17-07-2025(online)].pdf | 2025-07-17 |
| 39 | 201921016544-FORM 13 [17-07-2025(online)].pdf | 2025-07-17 |
| 40 | 201921016544-PROOF OF ALTERATION [30-07-2025(online)].pdf | 2025-07-30 |
| 41 | Form 13 Disposed Off – Patent Nos. 536024.pdf | 2025-08-07 |
| 1 | SearchHistoryE_31-07-2023.pdf |