Abstract: The present invention relates to a system with dual level authorization technique for providing secure remote operations in an automobile. The system comprising a telematic device 102 attached to a smart key Mechatronic/Electronic locking system placed inside a vehicle 106. The telematic device 102 installed inside the vehicle 106 is configured with GPS, RF, BLE and LF connectivity. GPS connectivity allows the telematic device 102 to communicate with one of geo satellite so as to acquire location coordinates of the vehicle 106. The telematic device 102 is also equipped with inbuilt facility to generate a time varying PIN and share the same with PAP server 110 periodically. Further, the telematic device 102 may be configured to communicate with other wireless device such as a user handheld device 108. It is must for the invention that the user device 108, telematic device 102 and the PAP server 110 work in conjunction with each other to provide dual level authorization to the vehicle using time-varying PENT.
[0001]The present invention relates to a system and method for providing secured
remote operations in automobiles. More particularly, the present invention relates to dual level authentication techniques to provide remote authorization in automobiles using a handheld device.
BACKGROUND OF THE INVENTION:
[0002] Automobile industry has shown tremendous advancement in last few decades.
The advancement has been in every niche of technology, be it making engines lighter and faster, improvement in aerodynamics etc. One such area where automobile industry has made tremendous improvement is making automobiles smartly operated using remote keyless entry systems. These systems are designed to permit the owner to operate a vehicle smartly from a distance without using a mechanical key. However, these systems have their own disadvantages i.e. if the smart key gets into the hands of other person who is not an authorized user, he/she may use the same to steal/misuse others vehicle.
[0003] Further advancing on this technology, systems for remotely operating vehicles
using smart phone of a user were introduced. These systems function on the basis principle of sending a secured password/code/PIN from the user mobile to an authentication system installed inside the vehicle. The authentication system then allows or disallows the user access to the vehicle based on authentication. However, these conventional systems suffer various disadvantages such as the password/code/PIN used for authentication are generated by a central system either at the manufacturing end or by a server. Said password/code/PIN is sent to the user device. Further, said password/code/PIN is transmitted to the vehicle having a fixed private key. This private key is matched with the public key received from the user device and access is provided. However, said systems do not allow the password/code/PIN to be changes dynamically, which still does not make the system theft proof. Further, these systems are costly and are not reliable.
[0004] Thus, there exist a need for the system that may be used to remotely operate
vehicle in a more secured manner. Further, there exist a need for the system that may not depend on the manufacturer password/code/PIN, instead is capable of generating dynamic password/code/PIN varying with time to make the system theft proof.
SUMMARY OF THE INVENTION:
[0005] Before the present method, apparatus and hardware enablement's are described, it
is to be understood that this invention is not limited to the particular systems, and methodologies described, as there can be multiple possible embodiments of the present invention which are not expressly illustrated in the present disclosure. It is also to be understood that the terminology used in the description is for the purpose of describing the particular versions or embodiments only and is not intended to limit the scope of the present invention which will be limited only by the appended claims.
[0006] In an aspect the present invention discloses a method for providing secure
authorization of a vehicle via user device using the steps of receiving, by a PAP server, a PIN generated by a telematic device and assigning, by the PAP server, location coordinates and unique ID of the vehicle to the PIN to generate a modified PIN and sharing the modified PIN with the telematic device. The method further comprises evaluating, by the telematic device, to confirm that the secure PIN shared with the PAP server and the modified PIN received from the PAP server match with each other and transmitting, by the telematic device, location coordinates and unique ID of the user device with the PAP server. In addition, said method discloses evaluating, by the PAP server, the location coordinates and the unique ID of the vehicle with the location coordinates and unique ID of the user device, wherein if the two are found same then the PAP server gives approval to the vehicle to be accessed through the user device.
[0007] In another aspect, the present invention further comprises performing a primary
authentication process prior to receiving, by the PAP server, the secure PIN generated by the telematic device.
[0008] In yet another aspect, the present invention discloses that the PAP server is
configured to receive a non-repetitive, time varying PEST from the telematic device on periodic basis.
[0009] In still another aspect, the present invention discloses evaluating the secured PIN
with the modified PIN by comparing only the PEST portion of the modified with the secured PIN.
[0010] In yet another aspect of the present invention the PAP server is configured to
receive the location coordinates and the unique ID of the vehicle subsequent to receiving secured PIN.
[0011] In still another aspect, the present invention discloses a system for providing
secure authorization of a vehicle. Said system comprises a telematic device placed inside the vehicle, a user device communicatively coupled to the telematics device and a PAP server communicatively coupled to the telematic device and the user device, wherein the PAP server is configured to receive a PEST from the telematic device, assign location coordinates and unique ID of the vehicle to the PIN to generate modified PIN and share the modified PIN with the telematic device. Further, the system discloses that the telematic device is configured to evaluate the secure PIN shared with the PAP server and the modified PEST received from the PAP server to confirm if the two matches with each other and transmit location coordinates and unique ID of the user device with the PAP server. The system further discloses that said PAP server is further configured to evaluate the location coordinates and the unique ID of the vehicle with the location coordinates and unique ID of the user device, if the two are found same, the PAP server gives approval to the vehicle to be accessed through the user device.
[0012] In yet another aspect, the present invention discloses that the telematic device and
the user device depend upon a geo-stationery satellite to receive their location coordinates.
[0013] In still another aspect of the present invention the user device and the vehicle
share a common unique ID.
[0014] In yet another aspect, the present invention discloses that the telematic device
includes a microcontroller configured to generate time varying and non-repetitive secure PEST periodically.
OBJECTS OF THE INVENTION:
[0015] The main object, of the present invention is to provide secured system for remote
operations of automobiles.
[0016] Another main object, of the present invention is to provide a dual level anti-theft
system for providing secure authorization of a vehicle for remotely operating the automobiles.
[0017] Yet another object, of the present invention is to provide an anti-theft system for
securing remote operations in automobiles with time varying PIN generation facility.
[0018] Still another object, of the present invention is to provide cost effective, reliable
and more secured anti-theft system for remote operations in automobiles.
[0019] Yet another object, of the present invention is to provide a decentralized security
system with no need for secure PIN to be programmed at the manufacturing time.
BRIEF DESCRIPTION OF DRAWINGS:
[0020] The novel features and characteristic of the disclosure are set forth in the
appended claims. The disclosure itself, however, as well as a preferred mode of use, further objectives, and advantages thereof, will best be understood by reference to the following detailed description of an illustrative embodiment when read in conjunction with the accompanying drawings. One or more embodiments are now described, by way of example only, with reference to the accompanying drawings wherein like reference numerals represent like elements and in which:
[0021] Fig. 1 illustrates a system for providing secured authorization (for remote
operations) of automobiles using handheld device, by way of block diagram.
[0022] Fig. 2 illustrates perspective view of a system for providing secured authorization
(for remote operations) of automobiles using handheld device, according to various embodiments.
[0023] Fig 3 illustrates method steps for providing secured authorization (for remote operations) of automobiles using dual-level authentication, by way of flow diagram.
[0024] Figs 4(a) and 4(b) explain two exemplary embodiments of system disclosed in figure 1.
[0025] The figures depict embodiments of the disclosure for purposes of illustration only.
One skilled in the art will readily recognize from the following description that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles of the disclosure described herein.
DETAILED DESCRIPTION OF DRAWINGS:
[0026] Some embodiments of this invention, illustrating all its features, will now be
discussed in detail.
[0027] The words "comprising," "having," "containing," and "including," and other
forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items or meant to be limited to only the listed item or items.
[0028] It must also be noted that as used herein and in the appended claims, the singular
forms "a," "an," and "the" include plural references unless the context clearly dictates otherwise. Although any systems and methods similar or equivalent to those described herein can be used in the practice or testing of embodiments of the present invention, the preferred systems and methods are now described.
[0029] The elements illustrated in the figures inter-operate as explained in more detail
below. Before setting forth the detailed explanation, however, it may be noted that all of the discussion below, regardless of the particular implementation being described, is exemplary in nature, rather than limiting.
[0030] The techniques described herein may be implemented using one or more
computer programs executing on (or executable by) a programmable computer including any
6
combination of any number of the following: a processor/microcontroller, a sensor, a storage medium readable and/or writable by the processor (including, for example, volatile and non-volatile memory and/or storage elements), plurality of input units, plurality of output devices and networking devices.
[0031] Each computer program within the scope of the claims below may be
implemented in any programming language, such as assembly language, machine language, a high-level procedural programming language, or an object-oriented programming language. The programming language may, for example, be a compiled or interpreted programming language. Each such computer program may be implemented in a computer program product tangibly embodied in a machine-readable storage device for execution by a computer processor.
[0032] Method steps as disclosed by the present disclosure may be performed by one or
more computer processors executing a program tangibly embodied on a non-transitory computer-readable medium to perform functions of the invention by operating on input and generating output. Suitable processors include, by way of example, both general and special purpose microprocessors. Generally, the processor receives (reads) instructions and content from a memory (such as a read-only memory and/or a random- access memory) and writes (stores) instructions and content to the memory. Storage devices suitable for tangibly embodying computer program instructions and content include, for example, all forms of non-volatile memory, such as semiconductor memory devices, including EPROM, EEPROM, and flash memory devices; magnetic disks such as internal hard disks and removable disks; magneto-optical disks; and CD-ROMs. Any of the foregoing may be supplemented by, or incorporated in, specially designed ASICs (application-specific integrated circuits) or FPGAs (Field-Programmable Gate Arrays).
[0033] As shown in figure 1, system 100 comprises a telematic device 102 attached to a
smart key mechatronic locking system 104 that includes features such as electric steering lock and engine immobilization and is placed inside a vehicle 106, wherein the vehicle 106 may be two-wheeler, three-wheeler, four-wheeler or any other like vehicle and shall not be restricted in any sense to any one category of vehicle. The telematic device 102 installed inside the vehicle
7
106 is configured with RF, LF, BLE, GPS and GSM connectivity’s. This allows the telematic device 102 to communicate with one of geo satellite 112 so as to acquire location coordinates of the vehicle. In an exemplary embodiment, the telematic device 102 may depend upon the geo-stationery satellite 112 to receive its location co-ordinates. The telematic device 102 is also equipped with inbuilt facility to communicate with other wireless device such as a user handheld device 108. In an embodiment, the handheld device 108 may include one of smart phone, laptop, personal computer or any like device. In another exemplary embodiment, the user device 108 may also depend upon the geo-stationery satellite 112 to receive its location co-ordinates. The system 100 further includes a PIN access propagation (PAP) server 110 remotely in communication with the telematic device 102 and the user device 108. In an embodiment, the term PIN access propagation (PAP) server 110 and server 110 may be used interchangeably in the specification. Said server 110 plays an important role in providing dual-level authentication mechanism in the system 100. Further, the detailed working of said system is explained in relation with figure 2, discussed in below paragraphs.
[0034] Figure 2 discloses the functionality of system 100 disclosed in figure 1. The
telematic device 102 is configured to generate a time varying code or PIN for secure authentication. In an exemplary embodiment, the telematic device 102 may include a microcontroller (not shown) that may be configured to constantly generate a PIN that varies with time and never repeats itself. In another embodiment, the telematic device 102 is operatively connected to the smart key mechanical system 104 such that when the telematic device 102 gets dual-level authentication clearance, it sends a signal to the smart key mechatronic locking system 104 to be accessed by a user device (not shown). In another embodiment, we assume that the smart key mechatronic locking system 104 is initially in locked condition and cannot be accessed through a user device 108. In an example, the smart key mechatronic locking system 104 may be configured to control various functionalities in the vehicle 106 such as steering lock, door lock, ignition control etc. and shall not be limited to any one functionality. As discussed above the telematic device 102 generates the secured code or PIN and shares the same periodically with the server 110. Now, whenever an authorized user having as user device 108 approaches a vehicle 106 and tries to gain access to the vehicles 106, it sends a PIN request to the server 110. As shown in figure 2 the user device 108 and the server 110 may remain connected to each other though web presence 202. In reply, the server 110 authenticates the PIN request from the user
8
device 108. The authentication includes a predetermined authentication process that may depend on several factors not disclosed explicitly in the specification. This type of authentication in the present specification is referred as the first level authentication. In an exemplary embodiment, the first level of authentication is either through the password and or through special queries posed by the server 110 to the user device108. To make such authentication possible answers, passwords and other form of identification are pre-saved on both sides during registration process when the user is registering for this service as an authentic user. It may be further appreciated that the first level of authentication is just a query/response session between the server and the user device where correct responses to the queries establish authenticity of the user.
[0035] After clearing the first level of authentication, the telematic device 102 shares the
latest code/PIN generated with the user device 108 using the wireless link. The user device 108 then shares this code/PIN with the server 110. After receiving the secured code/PIN from the telematic device 102, via the user device 108, said server 110 attaches geo-location coordinates and unique ID to it and send it back to the telematic device 102 using the wireless link. In an exemplary embodiment, the PAP server 110 is configured to assign location coordinates and unique ID of the vehicle 106 to the PIN to generate modified PIN and share the modified PIN with the telematic device 102. In another exemplary embodiment, it may be noted that the geo-location coordinates and said unique ID relates of the vehicle 106 and may be shared with the server 108 by the telematic device 102 installed inside the vehicle 106 subsequent to sharing the secured PIN. The telematic device 102 now evaluates whether the code or PIN generated by itself is same as the code or PIN shared by user device 108 with the server 110. In case the two are same, the telematic device 102 shares the unique ID and geo-location of user device 108 with the server 110 using at least one of GSM, CDMA, Bluetooth and like technologies. The server 110 now evaluates whether the geo-location and unique ID of the vehicle shared in the previous step matches with the geo-location and unique ID of the user device 108 thus shared. If the two are same, then the PAP server 110 authenticates the same and gives OK signal to the telematic device 102 to give user device 108 access of smart key mechatronic locking system 104 remotely. In a particular embodiment, it may be noted that to make the above authentication possible the user device 108 and the vehicle 106 must share a common or corresponding unique ID.
9
[0036] Figure 3 discloses various steps of method performed by the system 100 of figure
1. The method starts with step 302, where the telematic device 102 generates a code/PIN that varies with time. In step 304, the telematic device 102 sends the code/PIN generated to the server 110 periodically via the wireless communication. Step 306, discloses that whenever the user tries to gain access to the vehicle 106 via the user device 108, it shares an authentication request with the server 110. Server 110, in step 308, performs an authentication process, wherein if the authentication is approved the method moves to next step 310. In step 310, the telematic device 102 shares a code or PIN with the server 110. In particular, the code or PIN is shared with server 110 via the user device 108. In an alternative embodiment, it may be said that the PAP server 110 is configured to receive the PIN generated by the telematic device 102. The server 110 then assigns the geo-location and the unique ID of the vehicle 106, received from telematic device 102, with the code or PIN thus received, in step 312 to generate a modified PIN. In step 314, the server 110, then sends the modified PIN to the telematic device 102. The telematic device 102 then compares or evaluates the PIN generated by itself with the modified PIN shared by the PAP server 110 with the telematic device 102, in step 316. If the two are found to be same, then in step 318 the telematic device 102 transmits the geo-location and the unique ID of the user device 108 to the server 110. In an exemplary embodiment, the telematic device 102 may be configured to attain location co-ordinates and unique ID of the user device 108 via one of Bluetooth, GSM, CDMA and like techniques. The server 110, in step 320, evaluates to confirm whether the geo-location and unique ID received in step 312 matches with the geo-location and unique ID received in step 318, if found matching server 110 gives OK signal to the telematic device 102. The telematic device 102 in return gives access of the vehicle 106 to the user via user device 108.
[0037] Figures 4(a) and 4(b) discuss two different scenarios, in real time, where the
present system can be very advantageous viz-a-viz the conventional systems. In one example, if FOB is stolen the thief will not be able to steal the vehicle 106 since user device 108 is still in possession of the user. In particular, time-varying PIN authorization process as discussed in figure 3, which can only be performed by the user device 108, will prevent the thief from stealing the vehicle 106. In another embodiment, if the FOB is lost and the user needs some emergency access method to enter /start the vehicle 106. In such scenario, user device 108 based PIN method can provide some easy steps for the user using the user device to access the vehicle
10
which when compared to the prevalent tedious methods, where the user needs to operate some complex pattern consisting of ignition key /door operations, is much more safe and secure.
[0038] It may be clear to those skilled in the art, the presently disclosed system and
method may be used either independently or in combination with existing technologies being implemented for providing secured remote authorization of the vehicles using the user device.
[0039] While various aspects and embodiments have been disclosed herein, other aspects
and embodiments will be apparent to those skilled in the art. It may be pertinent to note that various aspects and embodiments disclosed herein are for purposes of illustration and are not intended to be limiting, with the true scope being indicated by the following claims.
ADVANTAGES OF THE INVENTION:
[0040] In an example, present invention discloses dual-level user device-based vehicle
authorization system using time varying PIN to provide additional authentication. So, if FOB is stolen the thief will not be able to steal the vehicle since user device-based time-varying PIN authentication will fail.
[0041] In another example, present invention discloses, if the FOB is lost and the user
needs some emergency access method to enter /start the vehicle user device-based PIN method can provide some easy steps for the user with user device to access the vehicle (compared to the prevalent tedious methods where the user needs to operate some complex pattern consisting of ignition key /door operations).
[0042] In yet another embodiment, present invention allows the usage of app-based ride
sharing that facilitates multiple users to access the vehicle in secured manner.
We claim:
A method for providing secure authorization of a vehicle via user device, the method
comprising:
receiving, by a PAP server, a PIN generated by a telematic device;
assigning, by the PAP server, location coordinates and unique ID of the vehicle to the
PIN to generate a modified PEST and sharing the modified PIN with the telematic device;
evaluating, by the telematic device, to confirm that the secure PIN shared with the PAP
server and the modified PIN received from the PAP server match with each other;
transmitting, by the telematic device, location coordinates and unique ID of the user
device with the PAP server;
evaluating, by the PAP server, the location coordinates and the unique ID of the vehicle
with the location coordinates and unique ID of the user device, wherein if the two are
found same then the PAP server gives approval to the vehicle to be accessed through the
user device.
The method as claimed in claim 1, further comprises performing a primary authentication process prior to receiving, by the PAP server, the secure PIN generated by the telematic device.
The method as claimed in claim 1, wherein the PAP server is configured to receive a non-repetitive, time varying PIN from the telematic device on periodic basis.
The method as claimed in claim 1, wherein evaluating the secured PIN with the modified PIN comprises comparing only the PIN portion of the modified with the secured PIN.
The method as claimed in claim 1, wherein the PAP server is configured to receive the location coordinates and the unique ID of the vehicle subsequent to receiving secured PIN.
A system for providing secure authorization of a vehicle, the system comprising:
a telematic device placed inside the vehicle;
a user device communicatively coupled to the telematics device; and
a PAP server communicatively coupled to the telematic device and the user device, wherein the PAP server is configured to receive a PEST from the telematic device, assign location coordinates and unique ID of the vehicle to the PEST to generate modified PIN and share the modified PEST with the telematic device;
said telematic device configured to evaluate the secure PEST shared with the PAP server and the modified PEST received from the PAP server to confirm if the two matches with each other; and transmit location coordinates and unique ID of the user device with the PAP server;
wherein said PAP server is further configured to evaluate the location coordinates and the unique ID of the vehicle with the location coordinates and unique ID of the user device, if the two are found same, the PAP server gives approval to the vehicle to be accessed through the user device.
The system as claimed in claim 6, wherein the telematic device and the user device depend upon a geo-stationery satellite to receive their location coordinates.
The system as claimed in claim 6, wherein the user device and the vehicle share a common unique ID.
The system as claimed in claim 6, wherein the telematic device includes a microcontroller configured to generate time varying and non-repetitive secure PEST periodically.
| # | Name | Date |
|---|---|---|
| 1 | 201711039746-STATEMENT OF UNDERTAKING (FORM 3) [08-11-2017(online)].pdf | 2017-11-08 |
| 2 | 201711039746-PROVISIONAL SPECIFICATION [08-11-2017(online)].pdf | 2017-11-08 |
| 3 | 201711039746-POWER OF AUTHORITY [08-11-2017(online)].pdf | 2017-11-08 |
| 4 | 201711039746-FORM 1 [08-11-2017(online)].pdf | 2017-11-08 |
| 5 | 201711039746-DRAWINGS [08-11-2017(online)].pdf | 2017-11-08 |
| 6 | 201711039746-DECLARATION OF INVENTORSHIP (FORM 5) [08-11-2017(online)].pdf | 2017-11-08 |
| 7 | abstract.jpg | 2017-12-22 |
| 8 | 201711039746-DRAWING [06-11-2018(online)].pdf | 2018-11-06 |
| 9 | 201711039746-CORRESPONDENCE-OTHERS [06-11-2018(online)].pdf | 2018-11-06 |
| 10 | 201711039746-COMPLETE SPECIFICATION [06-11-2018(online)].pdf | 2018-11-06 |
| 11 | 201711039746-FORM 18 [16-11-2018(online)].pdf | 2018-11-16 |
| 12 | 201711039746-FER.pdf | 2020-08-17 |
| 13 | 201711039746-OTHERS [14-12-2020(online)].pdf | 2020-12-14 |
| 14 | 201711039746-FER_SER_REPLY [14-12-2020(online)].pdf | 2020-12-14 |
| 15 | 201711039746-COMPLETE SPECIFICATION [14-12-2020(online)].pdf | 2020-12-14 |
| 16 | 201711039746-CLAIMS [14-12-2020(online)].pdf | 2020-12-14 |
| 17 | 201711039746-Response to office action [13-05-2022(online)].pdf | 2022-05-13 |
| 18 | 201711039746-US(14)-HearingNotice-(HearingDate-04-01-2024).pdf | 2023-12-13 |
| 19 | 201711039746-FORM-26 [28-12-2023(online)].pdf | 2023-12-28 |
| 20 | 201711039746-Correspondence to notify the Controller [02-01-2024(online)].pdf | 2024-01-02 |
| 21 | 201711039746-Written submissions and relevant documents [19-01-2024(online)].pdf | 2024-01-19 |
| 22 | 201711039746-PETITION UNDER RULE 137 [19-01-2024(online)].pdf | 2024-01-19 |
| 23 | 201711039746-PatentCertificate31-01-2024.pdf | 2024-01-31 |
| 24 | 201711039746-IntimationOfGrant31-01-2024.pdf | 2024-01-31 |
| 1 | SearchStrategyMatrixE_13-08-2020.pdf |