Abstract: The present disclosure relates to system(s) and method(s) for activating a safety mode in a mission critical environment. The system is configured to receive a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment. In one embodiment the image pattern is generated based on a user manipulated variable and a set of data attributes associated with the data packet. Further, the system is configured to extract the user manipulated variable and the set of data attributes from the image pattern and compute a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet. Further, the system is configured to activate a safety mode if the weighted sum is deviated from the weight, in a predefined weighted sequence, corresponding to the data packet.
CROSS-REFERENCE TO RELATED APPLICATIONS AND PRIORITY
[001] The present application does not claim priority from any patent application.
TECHNICAL FIELD
[002] The present disclosure in general relates to the field of safety critical systems. More particularly, the present invention relates to a system and method for triggering safety mode in the safety critical systems.
BACKGROUND
[003] Safety critical systems are computer based systems when malfunctioned can risk human lives. For example, an onboard computer of an aircraft is a type of safety critical systems, since malfunction of the onboard computer while flying an aircraft can risk human lives. Similarly, industrial control systems that control chemical plants may also be considered as safety critical systems. Computer malfunction in an industrial control system can lead to explosion. Safety critical systems are governed by safety standards and one such requirement in safety standard mandates the use of safety protocol when information is passed from one module of the safety critical systems to another. If messages are not received on time and in sequence or deleted or received out of sequence, the safety critical system understand it as a malfunction and activates a safety layer also known as safety mode that won’t harm human lives.
[004] A safety layer is an additional layer that is added to protocol data layer and ensures receiver is notified of any malfunction in communication to take necessary action. Below table 1 is a representation of safety layer between receiver and sender. Some of the standard techniques used in safety layer implementation are as follows:
o A sequence number is appended to each message sent in safety critical system, so the receiver can check if messages are received in order and also confirm if there is deletion or insertion in the sequence or duplicated.
o Further, a CRC checksum may also be introduced to check if messages are corrupted at the receiver end.
3
o In some implementations, messages are time stamped and rejected at receiver if arrived late.
Table 1: Represents the potential errors (as rows) and corrective action that needs to be implemented in safety layer (as columns)
[005] Despite of these safety measures, the safety layer fails in case of a middle man attack. Since the sequence number, timestamp and other data packet attributes can be easily realized and manipulated by a hacker, it becomes difficult to ensure safety and security from hackers in the safety critical systems. Further, the use of sequence numbering in safety layer has many drawbacks. It is very easy for unauthorized nodes to read the sequence number and send messages using the subsequent sequence number masquerading as an authorized node. Secondly, sequence number does not have any signature on its own to check if message is sent by authorized node. An unauthorized node can easily intercept the sent data and identify the sequence number.
SUMMARY
[006] This summary is provided to introduce aspects related to systems and methods for activating a safety mode in a mission critical environment and the aspects are further described below in the detailed description. This summary is not intended to identify essential features of the claimed subject matter nor is it intended for use in determining or limiting the scope of the claimed subject matter.
4
[007] In one embodiment, a system for activating a safety mode in a mission critical environment is illustrated. The system comprises a processor coupled to a memory, wherein the processor is configured to execute programmed instructions stored in the memory. The processor may execute a programmed instruction stored in the memory to receive a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment. In one embodiment, the transmitter device may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information. Further, the user manipulated variable may be selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet. Further, the processor may execute a programmed instruction stored in the memory to extract the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data. Further, the processor may execute a programmed instruction stored in the memory to compute a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet. Furthermore, the processor may execute a programmed instruction to activate a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
[008] In one embodiment, a method for activating a safety mode in a mission critical environment is illustrated. The method may comprise receiving a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment. In one embodiment, the transmitter device may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information. Further, the user manipulated variable may be selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet. The method may further comprise extracting the user manipulated
5
variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data. The method may further comprise computing a weighted sum of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet. The method may further comprise activating a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
[009] In one embodiment, a non-transitory computer readable medium embodying a program executable in a computing device for activating a safety mode in a mission critical environment is disclosed. The program comprises a program code for receiving a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment. In one embodiment the transmitter device may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information. Further, the user manipulated variable is selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet. The program comprises a program code for extracting the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data. The program comprises a program code for computing a weighted sum of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet. The program comprises a program code for activating a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
BRIEF DESCRIPTION OF DRAWINGS
[0010] The detailed description is described with reference to the accompanying figures. In the figures, the left-most digit(s) of a reference number identifies the figure in which the reference number first appears. The same numbers are used throughout the drawings to refer like features and components.
6
[0011] Figure 1 illustrates a network implementation of a system for activating a safety mode in a mission critical environment, in accordance with an embodiment of the present subject matter.
[0012] Figure 2 illustrates the system for activating a safety mode in a mission critical environment, in accordance with an embodiment of the present subject matter.
[0013] Figure 3 illustrates a flow diagram for activating a safety mode in a mission critical environment using the system, in accordance with an embodiment of the present subject matter.
[0014] Figure 4 illustrates a graphical representation of a predefined weighted sequence for activating a safety mode in a mission critical environment using the system, in accordance with an embodiment of the present subject matter.
DETAILED DESCRIPTION
[0015] The present subject matter relates to a system for activating a safety mode in a mission critical environment is illustrated. The system comprises a processor coupled to a memory. The processor is configured to execute programmed instructions stored in the memory. In one embodiment, the processor may execute a programmed instruction to receive a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment. In one example, the mission critical environment may be a flight navigation environment, wherein the system corresponds to an onboard computer of an aircraft and the transmitter device may be an engine control unit of the aircraft. The system (receiver device) and the transmitter device (sender device) may be connected through a wired or wireless communication network for exchanging mission critical data in the form of data packet. The data packet is appended with an image pattern corresponding to the data packet.
[0016] In one embodiment, the image pattern may be in the form of pure data or an image having features. The features define the characteristics of image pattern. Just like for a human, the height, weight, skin/hair color, shoulder length, are some of features that can identify the human, in case of images, features may be edges
7
/gradients, corners, blobs, and no of pixels in the image pattern. The image pattern is created at the transmitter device. The image pattern has features at specific location or “interest points” and is generated by a pattern generator at the transmitter device using a predefined pattern generation data.
[0017] In one embodiment, the transmitter device may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet, such that each of interest points in the image pattern stores information of a user manipulated variable or a data attribute from the set of data attributes. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information (or data itself) associated with the data packet. Further, the user manipulated variable is selected by the transmitter device such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet. The predefined weighted sequence may be a sequence generated by a non-recursive function or a non-linear function. The predefined weighted sequence may also be generated by a random sequence generator. Further, each data point (weight) in the predefine weighted sequence (WS) is used for calibrating the user manipulated variable such that the reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to the weight corresponding to the data packet. In one embodiment, the predefined weighted sequence (WS) may repeat after 1 million data packets are transmitted between the system and the transmitter device. The predefined weighted sequence (WS) may be in the form of a graph 400a or 400b represented in figure 4.
[0018] In one example, the user manipulated variable (f1), and set of data attributes including the data throughput (f2), the timestamp (f3), and the data information (f4) associated with the data packet (P1) are embedded into the image pattern (I1). The data attributes f2, f3, and f4 depend on the data packet (P1) and hence cannot be altered. Further, in order to fix/ determine the value of the user manipulated variable (f1), the transmitter device is configured to identify a weight (W1), from the predefined weighted sequence (WS), corresponding to the data packet (P1). Further, the transmitter device is configured to use a weighted function given by equation (1) in order to determine the value of f1 for the data packet (P1).
8
[0019] W1 = a.f1n1 + b.f2n2 ………………. Equation (1)
[0020] Since, a, b, n1, n2 are pre-shared constants for the data packet (P1), the value of the user manipulated variable (f1) can be easily determined using f2, W1, a, b, n1, and n2. Wherein the constants a, b, n1, and n2 are pre-shared constants, wherein the transmitter device is made aware of these constants during initial master configuration of the system and the transmitter device. Once the value of f1 is determined, in the next step, the values corresponding to f1, f2, f3, and f4 are used to generate the image pattern using the a predefined pattern generation data available with the transmitter device.
[0021] Further, once the data packet and the image pattern is received from the transmitter device, in the next step, the processor may execute a programmed instruction to extract the user manipulated variable (f1) and the set of data attributes associated with the data packet from the image pattern based on the predefined pattern generation data. The predefined pattern generation data is a part of a pre-shared data which is shared between the system and the transmitter device. The predefined pattern generation data enable the system to identify the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1) from their respective locations (data points) in the image pattern (I1). In one embodiment, for the purpose of extracting the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1), the processor is configured to look for specific interest points in image pattern that are realised from the predefined pattern generation data and extract the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1). Since the predefined pattern generation data is only available with the transmitter device and the system, the set of data attributes and the user manipulated variable is safeguarded in case of a middle man attack.
[0022] Further, once the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1) are extracted from the image pattern, in the next step, the processor may execute a programmed instruction to compute a weighted sum (Wf), of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet using the weighted function given by equation (2).
[0023] Weighted sum (Wf) = a.f1n1 + b.f2n2 ………………………Equation (2)
[0024] Further, the processor is configured to compare the Weighted sum (Wf) with the weight (W1), from the predefined weighted sequence (WS), corresponding to the data packet (p1). If Wf is not equal to W1, the system identifies that there has been
9
some alteration in the image pattern or the data packet (P1) and activate a safety mode in the mission critical environment since the weighted sum (Ws) is deviated from the weight (W1), in the predefined weighted sequence, corresponding to the data packet (P1). This checking of weighted sum ensures that no data packet was inserted, deleted or duplicated. As the image pattern has features representing the data information (f4), these features may again be checked, by the system, against the data packet and if there is mismatch, the system is configured to raise a mismatch error. Similarly the timestamp (f3) may be checked against the master timestamp and if deviation is more than the designed latency, time out error may be raised by the system. By making use of the image pattern, the system enables a combined error check for sequencing number, time stamping and checksum error checking into one implementable technique.
[0025] While aspects of described system and method for activating a safety mode in a mission critical environment may be implemented in any number of different computing systems, environments, and/or configurations, the embodiments are described in the context of the following exemplary system.
[0026] Referring now to Figure 1, a network implementation 100 of a Master or receiver system, hereafter referred to as the system 102 for activating a safety mode in a mission critical environment is illustrated. Typically, the system 102 may be a Programmable Logic Controller (PLC) system. It will be understood that the system 102 may be accessed by multiple field devices 104-1, 104-2, 104-3,…104-n connected to the system 102, by a Network 106, collectively referred to as field devices 104 hereinafter, or applications residing on the field devices 104. Examples of the field devices 104 may include, but are not limited to, a process flow transmitters, pressure transmitters, and control valves.
[0027] In one implementation, the network 106 may be a wireless network, a wired network or a combination thereof. The network 106 may be an industrial protocol network, connecting the field devices (104) to the system (102), such as a Fieldbus, a Profibus or any of the proprietary communication protocols. Further the network 106 may include a variety of network devices, including routers, bridges, and the like. Further, the system 102 is connected to a field device 104, hereafter referred
10
to as a transmitter device 104-1 through the network 106. The transmitter device 104-1 is configured to maintain a pre-shared data 108. The pre-shared data 108 includes a set of constants (a, b, n1, and n2) a weighted function, a Predefined Weighted Sequence (WS) and a predefined pattern generation data. In one embodiment, the system 102 is also configured to maintain a copy of the pre-shared data 108 corresponding to the field devices 104. Initially, the system 102 is configured to receive a data packet and an image pattern corresponding to the data packet from the transmitter device 104-1 in a mission critical environment. The data packet is configured to store mission critical data to be transmitted by the transmitter device 104-1 to the system 102. In one embodiment, the transmitter device 104-1 may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information. Further, the user manipulated variable may be selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in the predefined weighted sequence, corresponding to the data packet. Further, the system 102 may extract the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on the predefined pattern generation data. Further, the system 102 may compute a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet. Furthermore, the system 102 may activate a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet. The process of activating a safety mode in a mission critical environment is further elaborated with respect to figure 2.
[0028] Referring now to Figure 2, the system 102 is illustrated in accordance with an embodiment of the present subject matter. In one embodiment, the system 102 may include at least one processor 202, an input/output (I/O) interface 204, and a memory 206. The at least one processor 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one
11
processor 202 is configured to fetch and execute computer-readable instructions stored in the memory 206.
[0029] The I/O interface 204 may include a variety of protocol interfaces, for example, Fieldbus , Modbus, profibus interface and the like. The I/O interface 204 may allow the system 102 to interact with the field devices 104. Further, the I/O interface 204 may enable the system 102 to communicate with other computing devices, such as web servers and external data server/ Terminal PC 112. The I/O interface 204 may include one or more ports for connecting a number of devices to one another or to another server.
[0030] The memory 206 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. The memory 206 may include modules 208 and data 210.
[0031] The modules 208 include routines, programs, objects, components, data structures, etc., which perform particular tasks, functions or implement particular abstract data types. In one implementation, the modules 208 may include a communication module 212, a data analysis module 214, a weighted sum generation module 216, a safety layer activation module 218 and other modules 220. The other modules 220 may include programs or coded instructions that supplement applications and functions of the system 102. The data 210, amongst other things, serves as a repository for storing data processed, received, and generated by one or more of the modules 208. The data 210 may also include a local repository 226, and other data 228.
[0032] In one embodiment, the local repository 226 is configured to store a copy of pre-shared data 108. The pre-shared data 108 includes a set of constants (a, b, n1, and n2) a weighted function, a Predefined Weighted Sequence (WS) and a predefined pattern generation data.
[0033] In one embodiment, the communication module 212 is configured to communicate with the transmitter device 104-1 via I/O interface 204 and receive a data
12
packet and an image pattern corresponding to the data packet from a transmitter device 104-1. The data packet is appended with an image pattern corresponding to the data packet. In one embodiment, the data packet may be a part of the image pattern, wherein the data in the data packet is represented in the form of features of the image pattern.
[0034] In one embodiment, the image pattern may be in the form of pure data and an image having features. The features define the characteristics of image pattern. The image pattern is created at the transmitter device 104-1. The image pattern has features at specific location or “interest points” and is generated by a pattern generator at the transmitter device 104-1.
[0035] In one embodiment, the transmitter device 104-1 may be configured to generate the image pattern based on the user manipulated variable and the set of data attributes associated with the data packet, such that each of interest points in the image pattern stores information of a user manipulated variable or a data attribute from the set of data attributes. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information (or data itself) associated with the data packet. Further, the user manipulated variable is selected by the transmitter device 104-1 such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet. Further, each data point (weight) in the predefine weighted sequence (WS) is used for calibrating the user manipulated variable such that the reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to the weight corresponding to the data packet.
[0036] In one example, the user manipulated variable (f1), and set of data attributes including the data throughput (f2), the timestamp (f3), and the data information (f4) associated with the data packet (P1) are embedded into the image pattern (I1). The data attributes f2, f3, and f4 depend on the data packet (P1) and hence cannot be altered. Further, in order to determine the value of the user manipulated variable (f1), the transmitter device 104-1 is configured to identify a weight (W1), from the predefined weighted sequence (WS), corresponding to the data packet (P1). Further, the transmitter device 110 is configured to use a weighted function given by equation (1) in order to determine the value of f1 for the data packet (P1).
13
[0037] Since a, b, n1, n2 are pre-shared constants for the data packet (P1), the value of the user manipulated variable (f1) can be easily determined using f2, W1, a, b, n1, and n2 in equation (1). Wherein the constants a, b, n1, and n2 are pre-shared constants, wherein the transmitter device 104-1 is made aware of these constants during initial master configuration of the system 102 and the transmitter device 104-1. Once the value of f1 is determined, in the next step, the values corresponding to f1, f2, f3, and f4 are used to generate the image pattern (I1) using the a predefined pattern generation data available with the transmitter device 104-1
[0038] Further, once the data packet and the image pattern is received from the transmitter device 104-1, in the next step, the data analysis module 214 is configured to extract the user manipulated variable (f1) and the set of data attributes (f2, f3, and f4) associated with the data packet (P1) from the image pattern (I1) based on the predefined pattern generation data. The predefined pattern generation data is a part of the pre-shared data 108 which is shared between the system 102 and the transmitter device 104-1. The predefined pattern generation data enable the data analysis module 214 to identify the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1) from their respective locations (data points) in the image pattern (I1). In one embodiment, for the purpose of extracting the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1), the data analysis module 214 is configured to look for specific interest points in image pattern (I1) that are realized from the predefined pattern generation data and extract the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1).
[0039] Further, once the set of data attributes (f2, f3, and f4) and the user manipulated variable (f1) are extracted from the image pattern (I1), in the next step, the weighted sum generation module 216 compute a weighted sum (Wf), of the user manipulated variable (f1) and at least one data attribute of the set of data attributes (f2, f3, and f4) associated with the data packet (P1) using the weighted function given by equation (1).
[0040] Further, the safety layer activation module 218 is configured to compare the Weighted sum (Wf) with the weight (W1), from the predefined weighted sequence (WS), corresponding to the data packet (p1). If Wf is not equal to W1, the safety layer activation module 218 identifies that there has been some alteration in the image
14
pattern or the data packet (P1) and activate a safety mode in the mission critical environment since the weighted sum (Ws) is deviated from the weight (W1). This checking of weighted sum ensures that no data packet was inserted, deleted or duplicated. As the image pattern has features representing the data information (f4), these features may again be checked, by the safety layer activation module 218, against the data packet and if there is mismatch, the safety layer activation module 218 is configured to raise a mismatch error. Similarly the timestamp (f3) may be checked against the master timestamp and if deviation is more than the designed latency, time out error may be raised by the safety layer activation module 218. The safety layer activation module 218 enables a combined error check for sequencing number, time stamping and checksum error checking into one implementable technique. The method for activating a safety mode in a mission critical environment is further illustrated with respect to the block diagram of figure 3.
[0041] Referring now to figure 3, a method 300 for activating a safety mode in a mission critical environment is disclosed, in accordance with an embodiment of the present subject matter. The method 300 may be described in the general context of computer executable instructions. Generally, computer executable instructions can include routines, programs, objects, components, data structures, procedures, modules, functions, and the like, that perform particular functions or implement particular abstract data types. The method 300 may also be practiced in a distributed computing environment where functions are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer executable instructions may be located in both local and remote computer storage media, including memory storage devices.
[0042] The order in which the method 300 is described is not intended to be construed as a limitation, and any number of the described method blocks can be combined in any order to implement the method 300 or alternate methods. Additionally, individual blocks may be deleted from the method 300 without departing from the spirit and scope of the subject matter described herein. Furthermore, the method 300 can be implemented in any suitable hardware, software, firmware, or combination thereof. However, for ease of explanation, in the embodiments described
15
below, the method 300 may be considered to be implemented in the above described system 102 and in field devices 104.
[0043] At block 302, the communication module 212 is configured to receive a data packet and an image pattern corresponding to the data packet from the transmitter device 104-1 in a mission critical environment. In one embodiment the transmitter device 104-1 may be configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet. In one embodiment, the set of data attributes may comprise a data throughput, a timestamp, and data information. Further, the user manipulated variable may be selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet.
[0044] At block 304, data analysis module 214 is configured to extract the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data.
[0045] At block 306, the weighted sum generation module 216 is configured to compute a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet.
[0046] At block 308, the safety layer activation module 218 is configured to activate a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
[0047] Further, figure 4 illustrates a graphical representation of predefined weighted sequence (WS). The predefined weighted sequence (WS) may be in the form of a graph 400a or 400b. The predefined weighted sequence (WS) may repeat after 1 million data packets are transmitted between the system 102 and the transmitter device 104-1.
[0048] Although implementations for methods and systems for activating a safety mode in a mission critical environment has been described, it is to be understood that the appended claims are not necessarily limited to the specific features or methods
16
described. Rather, the specific features and methods are disclosed as examples of implementations for activating a safety mode.
WE CLAIM:
1. A system for activating a safety mode in a mission critical environment, the system comprising:
a memory; and
a processor coupled to the memory, wherein the processor is configured to execute programmed instructions stored in the memory to:
receive a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment, wherein the transmitter device is configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet, wherein the set of data attributes comprise a data throughput, a timestamp, and a data information, wherein the image pattern comprises a plurality of image features, and wherein the user manipulated variable is selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet;
extract the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data;
compute a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet; and
activate a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
2. The system of claim 1, wherein the image pattern comprises a plurality of image features, wherein each image feature from the plurality of image features corresponds to a user manipulated variable or a data attribute from the set of data attributes associated with the data packet.
18
3. The system of claim 1, wherein the reference weighted sum and the weighted sum is computed based on a predefined weighted function.
4. The system of claim 1, wherein the data packet corresponds to mission critical data to be transmitted by the transmitter device.
5. The system of claim 1, wherein the set of data attributes associated with the data packet comprise a data throughput, a timestamp, and a data information.
6. The system of claim 1, wherein the plurality of image features comprise edges, gradients, corners, blobs, and a number of pixels.
7. The system of claim 1, wherein the weight follows a pre-defined sequence shared with the transmitter device.
8. A method for activating a safety mode in a mission critical environment, the method comprising steps of:
receiving, by a processor, a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment, wherein the transmitter device is configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet, wherein the set of data attributes comprise a data throughput, a timestamp, and a data information, and wherein the user manipulated variable is selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet;
extracting, by the processor, the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data;
computing, by the processor, a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet; and
19
activating, by the processor, a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
9. The method of claim 8, wherein the image pattern comprises a plurality of image features, wherein each image feature from the plurality of image features corresponds to a user manipulated variable or a data attribute from the set of data attributes associated with the data packet.
10. The method of claim 8, wherein the reference weighted sum and the weighted sum is computed based on a predefined weighted function.
11. The method of claim 8, wherein the data packet corresponds to mission critical data to be transmitted by the transmitter device.
12. The method of claim 8, wherein the set of data attributes associated with the data packet comprise a data throughput, a timestamp, and a data information.
13. The method of claim 8, wherein the plurality of image features comprise edges, gradients, corners, blobs, and a number of pixels.
14. The method of claim 8, wherein the weight follows a pre-defined sequence shared with the transmitter device.
15. A non-transitory computer readable medium embodying a program executable in a computing device for activating a safety mode in a mission critical environment, the computer program product comprising:
a program code for receiving a data packet and an image pattern corresponding to the data packet from a transmitter device in a mission critical environment, wherein the transmitter device is configured to generate the image pattern based on a user manipulated variable and a set of data attributes associated with the data packet, wherein the set of data attributes comprise a data throughput, a timestamp, and a data information, and wherein the user manipulated variable is selected such that a reference weighted sum of the user manipulated variable and at least one data attribute from the set of data attributes is equivalent to a weight, in a predefined weighted sequence, corresponding to the data packet;
a program code for extracting the user manipulated variable and the set of data attributes associated with the data packet from the image pattern based on a predefined pattern generation data;
a program code for computing a weighted sum, of the user manipulated variable and at least one data attribute of the set of data attributes associated with the data packet; and
a program code for activating a safety mode in the mission critical environment if the weighted sum is deviated from the weight, in the predefined weighted sequence, corresponding to the data packet.
| Section | Controller | Decision Date |
|---|---|---|
| # | Name | Date |
|---|---|---|
| 1 | 201611002548-IntimationOfGrant12-03-2024.pdf | 2024-03-12 |
| 1 | Form 9 [22-01-2016(online)].pdf | 2016-01-22 |
| 2 | 201611002548-PatentCertificate12-03-2024.pdf | 2024-03-12 |
| 2 | Form 3 [22-01-2016(online)].pdf | 2016-01-22 |
| 3 | 201611002548-Written submissions and relevant documents [23-01-2024(online)].pdf | 2024-01-23 |
| 4 | Form 18 [22-01-2016(online)].pdf | 2016-01-22 |
| 4 | 201611002548-Correspondence to notify the Controller [28-12-2023(online)].pdf | 2023-12-28 |
| 5 | Drawing [22-01-2016(online)].pdf | 2016-01-22 |
| 5 | 201611002548-FORM-26 [28-12-2023(online)].pdf | 2023-12-28 |
| 6 | Description(Complete) [22-01-2016(online)].pdf | 2016-01-22 |
| 6 | 201611002548-US(14)-HearingNotice-(HearingDate-08-01-2024).pdf | 2023-12-21 |
| 7 | 201611002548-Proof of Right [22-10-2021(online)].pdf | 2021-10-22 |
| 7 | 201611002548-GPA-(13-05-2016).pdf | 2016-05-13 |
| 8 | 201611002548-Form-1-(13-05-2016).pdf | 2016-05-13 |
| 8 | 201611002548-FORM 13 [09-07-2021(online)].pdf | 2021-07-09 |
| 9 | 201611002548-Correspondence Others-(13-05-2016).pdf | 2016-05-13 |
| 9 | 201611002548-POA [09-07-2021(online)].pdf | 2021-07-09 |
| 10 | 201611002548-ABSTRACT [10-07-2020(online)].pdf | 2020-07-10 |
| 10 | abstract.jpg | 2016-07-11 |
| 11 | 201611002548-CLAIMS [10-07-2020(online)].pdf | 2020-07-10 |
| 11 | 201611002548-FER.pdf | 2020-01-24 |
| 12 | 201611002548-COMPLETE SPECIFICATION [10-07-2020(online)].pdf | 2020-07-10 |
| 12 | 201611002548-OTHERS [10-07-2020(online)].pdf | 2020-07-10 |
| 13 | 201611002548-FER_SER_REPLY [10-07-2020(online)].pdf | 2020-07-10 |
| 14 | 201611002548-COMPLETE SPECIFICATION [10-07-2020(online)].pdf | 2020-07-10 |
| 14 | 201611002548-OTHERS [10-07-2020(online)].pdf | 2020-07-10 |
| 15 | 201611002548-CLAIMS [10-07-2020(online)].pdf | 2020-07-10 |
| 15 | 201611002548-FER.pdf | 2020-01-24 |
| 16 | 201611002548-ABSTRACT [10-07-2020(online)].pdf | 2020-07-10 |
| 16 | abstract.jpg | 2016-07-11 |
| 17 | 201611002548-POA [09-07-2021(online)].pdf | 2021-07-09 |
| 17 | 201611002548-Correspondence Others-(13-05-2016).pdf | 2016-05-13 |
| 18 | 201611002548-Form-1-(13-05-2016).pdf | 2016-05-13 |
| 18 | 201611002548-FORM 13 [09-07-2021(online)].pdf | 2021-07-09 |
| 19 | 201611002548-Proof of Right [22-10-2021(online)].pdf | 2021-10-22 |
| 19 | 201611002548-GPA-(13-05-2016).pdf | 2016-05-13 |
| 20 | Description(Complete) [22-01-2016(online)].pdf | 2016-01-22 |
| 20 | 201611002548-US(14)-HearingNotice-(HearingDate-08-01-2024).pdf | 2023-12-21 |
| 21 | Drawing [22-01-2016(online)].pdf | 2016-01-22 |
| 21 | 201611002548-FORM-26 [28-12-2023(online)].pdf | 2023-12-28 |
| 22 | Form 18 [22-01-2016(online)].pdf | 2016-01-22 |
| 22 | 201611002548-Correspondence to notify the Controller [28-12-2023(online)].pdf | 2023-12-28 |
| 23 | 201611002548-Written submissions and relevant documents [23-01-2024(online)].pdf | 2024-01-23 |
| 24 | Form 3 [22-01-2016(online)].pdf | 2016-01-22 |
| 24 | 201611002548-PatentCertificate12-03-2024.pdf | 2024-03-12 |
| 25 | 201611002548-IntimationOfGrant12-03-2024.pdf | 2024-03-12 |
| 25 | Form 9 [22-01-2016(online)].pdf | 2016-01-22 |
| 1 | Search_strategy_201611002548_23-01-2020.pdf |