Sign In to Follow Application
View All Documents & Correspondence

System And Method For Providing Access To Confidential Document Based On User Trustworthiness

Abstract: This disclosure relates generally to a system and method for providing access to confidential document and controlling access rights based on a user trustworthiness. Whenever, the user accesses any information from a confidential document, the system captures historical user accessed information, previously used access rights, violation attempts, and access time details from a provenance database to authenticate the user’s trustworthiness. The system evaluates risk to the information based on the historical access rights to the user and recommends trustworthiness level to the user. Further, the system controls the access rights on the confidential document dynamically based on each change in the user context details. Furthermore, the system is configured to identify type of document based on the information in the document and to category the document. [To be published with FIG. 2]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
11 March 2020
Publication Number
38/2021
Publication Type
INA
Invention Field
ELECTRONICS
Status
Email
kcopatents@khaitanco.com
Parent Application

Applicants

Tata Consultancy Services Limited
Nirmal Building, 9th Floor, Nariman Point Mumbai 400021 Maharashtra, India

Inventors

1. GOPU, Srinivas Reddy
Tata Consultancy Services Limited Deccan Park, Plot No 1, Survey No. 64/2, Software Units Layout , Serilingampally Mandal, Madhapur Hyderabad 500034 Telangana, INDIA
2. REDDY, Rajidi Satish Chandra
Tata Consultancy Services Limited Deccan Park, Plot No 1, Survey No. 64/2, Software Units Layout , Serilingampally Mandal, Madhapur Hyderabad 500034 Telangana, INDIA

Specification

FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION (See Section 10 and Rule 13)
Title of invention:
SYSTEM AND METHOD FOR PROVIDING ACCESS TO CONFIDENTIAL DOCUMENT BASED ON USER TRUSTWORTHINESS
Applicant
Tata Consultancy Services Limited A company Incorporated in India under the Companies Act, 1956
Having address:
Nirmal Building, 9th floor,
Nariman point, Mumbai 400021,
Maharashtra, India
Preamble to the description
The following specification particularly describes the invention and the manner in which it is to be performed.

TECHNICAL FIELD [001] The disclosure herein generally relates to the field of providing access to confidential document, and, more particularly, to a system and method for providing access to confidential document and controlling one or more access rights based on a user trustworthiness.
BACKGROUND [002] In the existing arrangements, most of the time a document owner provides access rights on their documents without knowing the user’s trustworthiness. In some cases, the document owner provides access to the users based on a user role or a user group. Some users in the user group or some users with the same user role can misuse the access to the information in the enterprise applications. The document owner provides the access to the users without knowing the user’s trustworthiness. The scope of misuse to the information is very high when providing access without knowing the user trustworthiness.
[003] In some cases, document owners provide access on their documents to users who never shows interest in access. The uninterested users never handle the document carefully. In most of the cases, the information misuse happens when a change in user authentication context or when illegitimate users authenticated with the shared credentials. The current applications never control the access rights of the users when change in user authentication context or when illegitimate users authenticated with the shared credentials. Furthermore, there are some legitimate users share their user credentials to illegitimate users to provide access on the owner’s document for their convenience. The illegitimate users use different user context and may use legitimate user assigned access rights to copy or download the information without knowing to the legitimate user.
SUMMARY [004] Embodiments of the present disclosure present technological improvements as solutions to one or more of the above-mentioned technical

problems recognized by the inventors in conventional systems. Herein, a system and method for providing access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user are provided.
[005] In one aspect, a processor-implemented method includes receiving at least one request to authenticate at least one user to provide an access on at least one confidential document, extracting one or more information of the at least one user from a provenance database. Wherein, the one or more information of the at least one user includes one or more identification of the at least one user, a location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights which has been provided earlier on the confidential document to the at least one user. Further, the processor-implemented method includes analyzing the extracted one or more information of the at least one user to identify an abnormal access by the at least one user based on the one or more historical access rights. The abnormal access includes violation of one or more access rights given to the at least one user in the historical user access details. It is to be noted that a committed as well as an attempt to commit both are included in the abnormal access.
[006] Further, the processors-implemented method includes evaluating a risk to the at least one confidential document based on the identified abnormal access by the at least one user, recommending a trustworthiness level of the at least one user to provide access on the at least one confidential document based on the evaluated risk to the at least one confidential document by the at least one user and controlling one or more access rights on information of the at least one confidential document based on at least one change in in one or more information of the at least one user. It is to be noted that the controlling is dynamic based on each change in one or more information of the at least one user.

[007] In another aspect, a system for providing access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user is provided. The system includes at least one memory storing a plurality of instructions, and one or more hardware processors communicatively coupled with at least one memory, wherein one or more hardware processors are configured to execute one or more modules. Further, the system includes a receiving module configured to receive at least one request to authenticate at least one user to provide an access on at least one confidential document, an extraction module configured to extract one or more information of the at least one user from a provenance database. Wherein, the one or more information includes one or more identification of the at least one user, a predefined location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights given to the at least one user.
[008] Furthermore, the system includes an analyzing module configured to analyze the extracted one or more information of the at least one user to identify an abnormal access by the at least one user based on the one or more historical access rights. The abnormal access includes violation of one or more access rights given to the at least one user in the historical user access details. It is to be noted that a committed as well as an attempt to commit both are included in the abnormal access. An evaluation module of the system is configured to evaluate a risk to the at least one confidential document based on the identified abnormal access by the at least one user. Further, the system comprises a recommendation module which is configured to recommend a trustworthiness level of the at least one user to provide access on the at least one confidential document based on the evaluated risk to the at least one confidential document by the at least one user. A controlling module of the system is configured to control one or more access rights on information of the at least one confidential document based on at least one change in in one or more information of the at least one user. It is to be noted that the

controlling is dynamic based on each change in one or more information of the at least one user.
[009] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS [010] The accompanying drawings, which are incorporated in and constitute a part of this disclosure, illustrate exemplary embodiments and, together with the description, serve to explain the disclosed principles:
[011] FIG. 1 illustrates an exemplary system for providing access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user according to some embodiments of the present disclosure.
[012] FIG. 2 is a flow diagram illustrating to categorize trustworthiness level of the user based on abnormal access to document in accordance with some embodiments of the present disclosure.
[013] FIG. 3 illustrates a schematic diagram to categorize trustworthiness level of the user in accordance with some embodiments of the present disclosure.
[014] FIG. 4 is a flow diagram illustrating to provide access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user in accordance with some embodiments of the present disclosure.

[015] FIG. 5 illustrates a schematic diagram to illustrate change in assigned access rights on changing user context details in accordance with some embodiments of the present disclosure.
DETAILED DESCRIPTION OF EMBODIMENTS [016] Exemplary embodiments are described with reference to the accompanying drawings. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. Wherever convenient, the same reference numbers are used throughout the drawings to refer to the same or like parts. While examples and features of disclosed principles are described herein, modifications, adaptations, and other implementations are possible without departing from the scope of the disclosed embodiments. It is intended that the following detailed description be considered as exemplary only, with the true scope being indicated by the following claims.
[017] Referring now to the drawings, and more particularly to FIG. 1 through FIG. 5, where similar reference characters denote corresponding features consistently throughout the figures, there are shown preferred embodiments and these embodiments are described in the context of the following exemplary system and/or method.
[018] The embodiments herein provide a system and method providing access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user.
[019] Referring FIG. 1, illustrating a system (100) for providing access to at least one confidential document to at least one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user. In the preferred embodiment, the system (100) comprises at least one memory (102) with a plurality of instructions,

at least one user interface (104), and one or more hardware processors (106) which are communicatively coupled with the at least one memory (102) to execute modules therein.
[020] The hardware processor (106) may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the hardware processor (106) is configured to fetch and execute computer-readable instructions stored in the memory (102). Further, the system comprises a receiving module (108), an extraction module (110), an analyzing module (112), an evaluation module (114), a recommendation module (116) and a controlling module (118).
[021] In the preferred embodiment of the disclosure, the receiving module (108) of the system (100) is configured to receive at least one request to authenticate at least one user to provide an access to the at least one confidential document. It would be appreciated that providing access to the at least one confidential document includes assigning one or more access rights on the at least one confidential document. Herein, the one or more access rights include view, edit and copy information of the at least one confidential document.
[022] In the preferred embodiment of the disclosure, the extraction module (110) of the system (100) is configured to extract one or more information of the at least one user from a provenance database. Herein, the one or more information of the at least one user includes one or more identification of the at least one user, a location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights given to the at least one user. It is to be noted that the one or more historical access rights were given in at least one of the earlier transactions with the at least one user.

[023] It would be appreciated that the provenance database captures details of one or more documents from a creation to a deletion of the documents, and one or more details of the users who have been assigned one or more access rights in one of historical transaction. Herein, the provenance database comprises one or more historical access details of the at least one user, one or more historical access rights, one or more accessed time details, location of the at least one user from where the at least one confidential document is accessed, and details on the abnormal access or attempt made for abnormal access.
[024] In the preferred embodiment of the disclosure, the analyzing module (112) of the system (100) is configured to analyze the extracted one or more information of the at least one user to identify an abnormal access by the at least one user. The abnormal access includes violation of one or more access rights. It is to be noted that an attempt to commit an action, which is unassigned to the at least one user, is also included in the abnormal access by the at least one user.
[025] In the preferred embodiment of the disclosure, the evaluation module (114) of the system (100) is configured to evaluate a risk to the at least one confidential document based on the one or more historical access details and the identified abnormal access by the at least one user. It is to be noted that the risk evaluation is dynamic in nature based on each change in one or more information of the at least one user and also an attempt for abnormal access to the document by the at least one user.
[026] In the preferred embodiment of the disclosure, the recommendation module (116) of the system (100) is configured to recommend a trustworthiness level of the at least one user based on the evaluated risk to the at least one confidential document from the at least one user.
[027] Referring FIG. 2, a flow diagram (200), wherein based on the one or more historical access details, the system identifies that the user had attempted with an unassigned access right on the information related to a document. The user

attempts with unassigned copy access right to copy information from the at least one confidential document. The attempt with unassigned access rights is an abnormal access to the document. The system is configured to evaluates risk based on the attempted abnormal access. Herein, the system recommends trustworthiness level medium, as the user has not violated one or more conditions related to the at least one confidential document. The system recommends trustworthiness of the user as high, medium low, and very low as shown in FIG. 3.
[028] In another embodiment, wherein a user doesn’t have a historical information of previously accessed at least one confidential document in the provenance database, the system is configured to provide access to the content in a predefined restricted mode of display. The system is configured to protect the at least one confidential document by encrypting before download when one or more changes in the one or more information of the user.
[029] In the preferred embodiment of the disclosure, the controlling module (118) of the system (100) is configured to control one or more access rights on information of the at least one confidential document based on at least one change in in one or more information of the at least one user. It is to be noted that the controlling is dynamic based on each change in one or more information of the at least one user.
[030] It would be appreciated that the system (100) captures the at least one user machine details like hostname, IP address and location to identify the at least one user legitimacy based on the at least one user context. It captures these details in provenance database. The application limits the assigned one or more access rights to the at least one user to protect the at least one confidential document when user context changes.
[031] Referring FIG. 4, a flow chart to illustrate a processor-implemented method (400) for providing access to at least one confidential document to at least

one user based on the user trustworthiness and controlling one or more access rights based on each change in one or more information of the at least one user. The method comprises one or more steps as follows.
[032] Initially, at the step (402), receiving at least one request to authenticate the at least one user to provide an access to the at least one confidential document. It would be appreciated that providing access to the at least one confidential document includes assigning one or more access rights on the at least one confidential document.
[033] In the preferred embodiment of the disclosure, at the next step (404), extracting one or more information of the at least one user from a provenance database. Herein, the one or more information of the at least one user includes one or more identification of the at least one user, a location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights given to the at least one user.
[034] In the preferred embodiment of the disclosure, at the next step (406), analyzing the extracted one or more information of the at least one user to identify an abnormal access by the at least one user. The abnormal access includes violation of one or more access rights. It is to be noted that an attempt to commit an action, which is unassigned to the at least one user, is also included in the abnormal access by the at least one user.
[035] In the preferred embodiment of the disclosure, at the next step (408), evaluating a risk to the at least one confidential document based on the one or more historical access details and the identified abnormal access by the at least one user. It is to be noted that the risk evaluation is dynamic in nature based on each change in one or more information of the at least one user and also an attempt for abnormal access to the document by the at least one user.
[036] In the preferred embodiment of the disclosure, at the next step (410), recommending recommend a trustworthiness level of the at least one user based on

the evaluated risk to the at least one confidential document from the at least one user.
[037] In the preferred embodiment of the disclosure, at the last step (412), controlling one or more access rights on information of the at least one confidential document based on at least one change in in one or more information of the at least one user. It is to be noted that the controlling is dynamic based on each change in one or more information of the at least one user.
[038] Referring FIG. 5, wherein a user is provided with view, and edit access rights to access a confidential document. Herein, based on each change in context of the one or more information of the user, the system dynamically changes the assigned one or more access rights or deny the access already provided to the confidential document.
[039] The written description describes the subject matter herein to enable any person skilled in the art to make and use the embodiments. The scope of the subject matter embodiments is defined by the claims and may include other modifications that occur to those skilled in the art. Such other modifications are intended to be within the scope of the claims if they have similar elements that do not differ from the literal language of the claims or if they include equivalent elements with insubstantial differences from the literal language of the claims.
[040] The embodiments of present disclosure herein address unresolved problem of a document owner who provides access rights on their documents without knowing the user’s trustworthiness. The document owner provides access to the users based on a user role or a user group or a user wise. Some users in the user group or some users with the same user role can misuse the access to the information in the enterprise applications. The document owner provides the access to the users without knowing the user’s trustworthiness. The scope of misuse to the information is very high when providing access without knowing the user trustworthiness. Furthermore, there are some legitimate users share their user

credentials to illegitimate users to provide access on the owners document for their convenience. The illegitimate users use different user context and may use legitimate user assigned access rights to copy or download the information without knowing to the legitimate user.
[041] It is to be understood that the scope of the protection is extended to such a program and in addition to a computer-readable means having a message therein; such computer-readable storage means contain program-code means for implementation of one or more steps of the method, when the program runs on a server or mobile device or any suitable programmable device. The hardware device can be any kind of device which can be programmed including e.g. any kind of computer like a server or a personal computer, or the like, or any combination thereof. The device may also include means which could be e.g. hardware means like e.g. an application-specific integrated circuit (ASIC), a field-programmable gate array (FPGA), or a combination of hardware and software means, e.g. an ASIC and an FPGA, or at least one microprocessor and at least one memory with software processing components located therein. Thus, the means can include both hardware means, and software means. The method embodiments described herein could be implemented in hardware and software. The device may also include software means. Alternatively, the embodiments may be implemented on different hardware devices, e.g. using a plurality of CPUs.
[042] The embodiments herein can comprise hardware and software elements. The embodiments that are implemented in software include but are not limited to, firmware, resident software, microcode, etc. The functions performed by various components described herein may be implemented in other components or combinations of other components. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can comprise, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.

[043] The illustrated steps are set out to explain the exemplary
embodiments shown, and it should be anticipated that ongoing technological
development will change the manner in which particular functions are performed.
These examples are presented herein for purposes of illustration, and not limitation.
Further, the boundaries of the functional building blocks have been arbitrarily
defined herein for the convenience of the description. Alternative boundaries can
be defined so long as the specified functions and relationships thereof are
appropriately performed. Alternatives (including equivalents, extensions,
variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope of the disclosed embodiments. Also, the words “comprising,” “having,” “containing,” and “including,” and other similar forms are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items. It must also be noted that as used herein and in the appended claims, the singular forms “a,” “an,” and “the” include plural references unless the context clearly dictates otherwise.
[044] Furthermore, one or more computer-readable storage media may be utilized in implementing embodiments consistent with the present disclosure. A computer-readable storage medium refers to any type of physical memory on which information or data readable by a processor may be stored. Thus, a computer-readable storage medium may store instructions for execution by one or more processors, including instructions for causing the processor(s) to perform steps or stages consistent with the embodiments described herein. The term “computer-readable medium” should be understood to include tangible items and exclude carrier waves and transient signals, i.e., be non-transitory. Examples include random access memory (RAM), read-only memory (ROM), volatile memory, nonvolatile memory, hard drives, CD ROMs, DVDs, flash drives, disks, and any other known physical storage media.

[045] It is intended that the disclosure and examples be considered as exemplary only, with a true scope of disclosed embodiments being indicated by the following claims.

We Claim:
1. A processor-implemented method comprising:
receiving, via one or more hardware processors, at least one request to authenticate at least one user to access at least one confidential document with one or more access rights;
extracting, via one or more hardware processors, one or more information of the at least one user from a provenance database, wherein the one or more information includes one or more identification of the at least one user, a location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights given to the at least one user;
analyzing, via one or more hardware processors, the extracted one or more historical access rights given to the at least one user to identify an abnormal access to at least one document in at least one historical transaction, wherein the at least one document in the at least one historical transaction includes both a confidential document and a non-confidential document;
evaluating, via one or more hardware processors, a risk to the at least one confidential document based on the identified abnormal access by the at least one user;
recommending, via one or more hardware processors, a trustworthiness level to the at least one user based on the evaluated risk to provide an access to the at least one confidential document, wherein the access includes one or more access rights on the at least one confidential document; and
controlling, via one or more hardware processors, the one or more access rights on the at least one confidential document based on at least one change in the one or more information of the at least one user.

2. The method claimed in claim 1, wherein the abnormal access includes violation of one or more access rights given to the at least one user.
3. The method claimed in claim 1, wherein the change in the at least one user context includes change in hostname of the at least one user machine, change in an internet protocol (IP) address of the at least one user machine, and change in a location of the at least one user.
4. The method claimed in claim 1, wherein the risk evaluation is dynamic based on each change in one or more information of the at least one user.
5. The method claimed in claim 1, wherein the trustworthiness level is scaled based on a predefined category against the evaluated risk, wherein the predefined categories very low, low, medium, high and very high.
6. The system comprising:
at least one user interface;
at least one memory storing a plurality of instructions;
one or more hardware processors communicatively coupled with at least one memory, wherein one or more hardware processors are configured to execute one or more modules;
a receiving module configured to receive at least one request to authenticate at least one user to access on at least one confidential document with one or more access rights;
an extraction module configured to extract one or more information of the at least one user from a provenance database, wherein the one or more information includes one or more identification of the at least one user, a location of the at least one user, an internet protocol (IP) address of a machine of the at least one user, and one or more historical access rights given to the at least one user;

an analyzing module configured to analyze the extracted one or more historical access rights given to the at least one user to identify an abnormal access to a document in at least one historical transaction;
an evaluation module configured to evaluate a risk to the at least one confidential document based on the identified abnormal access by the at least one user;
a recommendation module configured to recommend a trustworthiness level to the at least one user based on the evaluated risk to provide an access to the at least one confidential document based on the recommended trustworthiness level to the at least one user, wherein the access includes one or more access rights on the at least one confidential document; and
a controlling module configured to control the one or more access rights on the at least one confidential document based on at least one change in the one or more information of the at least one user.
7. The system claimed in claim 6, wherein the trustworthiness level is scaled based on a predefined category against the evaluated risk, wherein the predefined categories very low, low, medium, high and very high.
8. The system claimed in claim 6, wherein the abnormal access includes violation of one or more access rights given to the at least one user.
9. The system claimed in claim 6, wherein the risk evaluation is dynamic
based on each change in one or more information of the at least one user.
10. The system claimed in claim 6, wherein the change in the at least one user
context includes change in hostname of the at least one user machine,
change in an internet protocol (IP) address of the at least one user machine,
and change in a location of the at least one user.

Documents

Application Documents

# Name Date
1 202021010410-Correspondence to notify the Controller [22-08-2024(online)].pdf 2024-08-22
1 202021010410-STATEMENT OF UNDERTAKING (FORM 3) [11-03-2020(online)].pdf 2020-03-11
2 202021010410-RELEVANT DOCUMENTS [22-08-2024(online)].pdf 2024-08-22
2 202021010410-REQUEST FOR EXAMINATION (FORM-18) [11-03-2020(online)].pdf 2020-03-11
3 202021010410-US(14)-HearingNotice-(HearingDate-04-09-2024).pdf 2024-08-14
3 202021010410-FORM 18 [11-03-2020(online)].pdf 2020-03-11
4 202021010410-Written submissions and relevant documents [02-05-2024(online)].pdf 2024-05-02
4 202021010410-FORM 1 [11-03-2020(online)].pdf 2020-03-11
5 202021010410-FIGURE OF ABSTRACT [11-03-2020(online)].jpg 2020-03-11
5 202021010410-Correspondence to notify the Controller [12-04-2024(online)].pdf 2024-04-12
6 202021010410-FORM-26 [12-04-2024(online)].pdf 2024-04-12
6 202021010410-DRAWINGS [11-03-2020(online)].pdf 2020-03-11
7 202021010410-US(14)-HearingNotice-(HearingDate-18-04-2024).pdf 2024-03-18
7 202021010410-DECLARATION OF INVENTORSHIP (FORM 5) [11-03-2020(online)].pdf 2020-03-11
8 202021010410-COMPLETE SPECIFICATION [11-03-2020(online)].pdf 2020-03-11
8 202021010410-CLAIMS [18-04-2022(online)].pdf 2022-04-18
9 202021010410-FER_SER_REPLY [18-04-2022(online)].pdf 2022-04-18
9 Abstract1.jpg 2020-03-14
10 202021010410-FER.pdf 2021-11-22
10 202021010410-Proof of Right [04-09-2020(online)].pdf 2020-09-04
11 202021010410-FORM-26 [16-10-2020(online)].pdf 2020-10-16
12 202021010410-FER.pdf 2021-11-22
12 202021010410-Proof of Right [04-09-2020(online)].pdf 2020-09-04
13 202021010410-FER_SER_REPLY [18-04-2022(online)].pdf 2022-04-18
13 Abstract1.jpg 2020-03-14
14 202021010410-CLAIMS [18-04-2022(online)].pdf 2022-04-18
14 202021010410-COMPLETE SPECIFICATION [11-03-2020(online)].pdf 2020-03-11
15 202021010410-DECLARATION OF INVENTORSHIP (FORM 5) [11-03-2020(online)].pdf 2020-03-11
15 202021010410-US(14)-HearingNotice-(HearingDate-18-04-2024).pdf 2024-03-18
16 202021010410-DRAWINGS [11-03-2020(online)].pdf 2020-03-11
16 202021010410-FORM-26 [12-04-2024(online)].pdf 2024-04-12
17 202021010410-Correspondence to notify the Controller [12-04-2024(online)].pdf 2024-04-12
17 202021010410-FIGURE OF ABSTRACT [11-03-2020(online)].jpg 2020-03-11
18 202021010410-FORM 1 [11-03-2020(online)].pdf 2020-03-11
18 202021010410-Written submissions and relevant documents [02-05-2024(online)].pdf 2024-05-02
19 202021010410-US(14)-HearingNotice-(HearingDate-04-09-2024).pdf 2024-08-14
19 202021010410-FORM 18 [11-03-2020(online)].pdf 2020-03-11
20 202021010410-REQUEST FOR EXAMINATION (FORM-18) [11-03-2020(online)].pdf 2020-03-11
20 202021010410-RELEVANT DOCUMENTS [22-08-2024(online)].pdf 2024-08-22
21 202021010410-STATEMENT OF UNDERTAKING (FORM 3) [11-03-2020(online)].pdf 2020-03-11
21 202021010410-Correspondence to notify the Controller [22-08-2024(online)].pdf 2024-08-22

Search Strategy

1 SearchStrategyE_11-11-2021.pdf