Sign In to Follow Application
View All Documents & Correspondence

System And Method To Conduce Communication Between Remote Computing Device(s) And Control Unit Using Terminal

Abstract: The present disclosure provides a system and method to conduce communication between smart device/e-gadget 102 and control unit 110 which provides robust endpoint connectivity to remote users using local wireless terminal unit for long distance communication, comprising a processing unit 106 at terminal unit. A processing unit 106 at terminal unit receives a first set of data packets from at least one of the registered/ authorized computing device(s)/e-gadget 102, wherein each of the one or more computing devices/smart device is associated with at least one entity, and extracts one or more attributes of the at least one of the computing devices/smart device 102 from the first set of data packets. The at least one of the computing devices 102 is authenticated, and, further, security tokens are generated, which facilitate establishment of a secured communication channel between the control unit 110 and the at least one of the computing devices or e-gadget 102.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
28 March 2020
Publication Number
40/2021
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
info@khuranaandkhurana.com
Parent Application
Patent Number
Legal Status
Grant Date
2025-10-23
Renewal Date

Applicants

Bharat Electronics Limited
Corporate Office, Outer Ring Road, Nagavara, Bangalore - 560045, Karnataka, India.

Inventors

1. SUDEB DAS
Communication Department, Product Development and Innovation Centre, Bharat Electronics Limited, Jalahalli - 560013, Karnataka, India.

Specification

TECHNICAL FIELD
The present disclosure relates to the field of establishing a secure communication channel. More particularly, the present disclosure relates to a system and method to conduce communication between remote computing device(s)/e-gadget(s) and control unit via terminal.
BACKGROUND
Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
Fishermen earn their living by trapping fish and selling the fish in the market. Fishermen have to go daily, with net or fish trap, to a water body such as river, ocean, etc. for trapping the fish. Many a times, fishermen have to wait for long hours, in order to trap ample amount of fish. Moreover, many a times, fishermen have to go deep waters, in case they are unable to find surplus fish in nearby waters, or, in case a source of large number offish is known to be present at a location somewhere in deep waters. Fishermen find it very difficult to communicate directly with their family members or relatives in case of an emergency, or otherwise.
Also, a large number of tourists come to sea-beaches, every year, to enjoy their holidays. In due course of time, the said tourists may prefer boating, cruising, etc. and may go, further, in deep waters, which may appear to be very fascinating and relieving.
But, in case of a high tide, wave, or surge in the water body, such fishermen, tourists, or any person boating in the water body is prone to drowning or a tragic accident, as there is no efficient warning system, which can locate position of a person, or boat, and update them about weather conditions, or send them emergency messages regarding potential chances of high tides, heavy rainfall or any such dangers. Moreover, a person finds it very difficult to communicate directly with a control room, or related authority in case of an emergency, or otherwise.

[0006] In case of traditional systems, the systems rely on a wired or radio network for
facilitating communication. Moreover, in case of radio communication, only one person can communicate at a time and others have to listen at that time. In such systems, breaking of communication and breach of security are main issues. Also, end point connectivity for remotely located users is not viable through such systems.
[0007] There is, therefore, a need in the art to provide an efficient, cost-effective, and
user-friendly system to overcome the above-mentioned problems, and, provide a reliable means for end point connectivity for remotely located users.
OBJECTIVES OF THE PRESENT DISCLOSURE
[0008] Some of the objectives of the present disclosure, which at least one embodiment
herein satisfies are as listed herein below.
[0009] It is an objective of the present disclosure to provide a system and method for
facilitating communication with remotely located users.
[0010] It is another objective of the present disclosure to provide a system and method
for establishing a secure wireless communication channel between remote computing device(s)
and control unit through terminal.
[0011] It is another objective of the present disclosure to provide an appropriate system
which will be running on any E-gadget wherein GUI is customized unique look and feel and
made simple, easy to use for any remote user.
[0012] It is another objective of the present disclosure to provide a system and method
for establishment of a secure, reliable and efficient communication channel between the control
unit and the one or more computing devices to facilitate transmission of emergency messages
between the control unit and fishermen, hence, aiding in protecting lives and living of the
fishermen.
[0013] It is another objective of the present disclosure to provide an interactive, accurate,
fast, efficient, cost effective and simple system.

SUMMARY
[0014] The present disclosure relates to the field of establishing a secure communication
channel. More particularly, the present disclosure relates to a system and method to conduce
communication between remote computing device(s) and control unit via terminal unit.
[0015] An aspect of the present disclosure pertains to a system to conduce
communication between control unit and one or more computing devices, wherein the system comprises: a processing unit at the terminal unit operatively coupled to the control unit and the one or more computing devices, the processing unit comprising one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors that may be configured to: receive a first set of data packets from at least one of the one or more computing devices, wherein each of the one or more computing devices being associated with at least one entity; extract a second set of data packets from the received first set of data packets, the second set of data packets corresponds to one or more attributes of the at least one of the one or more computing devices; authenticate the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset; generate one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens may be transmitted to the at least one of the one or more computing devices; wherein the processing unit at terminal unit establishes a secured communication channel between the at least one control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.
[0016] In an aspect, the one or more attributes of the one or more computing devices
comprises any or a combination of device number, name and id of the at least one entity.
[0017] In an aspect, the processing unit, in response to the establishment of the secured
communication channel, facilitates transmission of one or more correspondence data packets between the control unit and the at least one of the one or more computing devices, and wherein the set of correspondence data packets may be generated at any or a combination of the control unit and the at least one of the one or more computing devices.
[0018] In an aspect, the one or more correspondence data packets may be associated with
any or a combination of device id, message id, message field, and timestamp.

[0019] In an aspect, the processing unit may be configured to determine location of the at
least one of the one or more computing devices based on the received first set of data packets.
[0020] In an aspect, the processing unit may generate a warning signal in the event of a
negative authentication of the at least one of the one or more computing devices, wherein the generated warning signal may be transmitted to any or a combination of the control unit and the at least one of the one or more computing devices.
[0021] In an aspect, the processing unit may be configured to store the generated one or
more security tokens in an authenticating dataset; whereby the processing unit may establish a secured communication channel between the control unit and the at least one of the one or more computing devices when the one or more received security tokens match with the authenticating dataset.
[0022] In an aspect, the processing unit at terminal (also, referred to as terminal system
or, terminal unit)may terminate the establishment of the secured communication channel between the control unit and the at least one of the one or more computing devices when the one or more received security tokens differ from the authenticating dataset.
[0023] In an aspect, the control unit may be operatively coupled to the one or more
computing devices via terminal unit through a communication network; wherein the communication network may comprise any or a combination of satellite system, a GSM module, data cable, Bluetooth, wired network, Li-Fi module, and Wi Fi module.
[0024] Another aspect of the present disclosure pertains to a method for conducing
communication between control unit and one or more computing devices, wherein the method comprises steps of: receiving, at one or more processors of a processing unit at terminal unit, a first set of data packets from at least one of the one or more computing devices, wherein each of the one or more computing devices being associated with at least one entity; extracting, at the one or more processors, a second set of data packets from the received first set of data packets, wherein the second set of data packets corresponds to one or more attributes of the at least one of the one or more computing devices; authenticating, at the one or more processors, the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset; generating, at the one or more processors, one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens may be transmitted to the

at least one of the one or more computing devices; and wherein a secured communication channel may be established between the control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] The accompanying drawings are included to provide a further understanding of
the present disclosure, and are incorporated in and constitute a part of this specification. The
drawings illustrate exemplary embodiments of the present disclosure and, together with the
description, serve to explain the principles of the present disclosure.
[0026] The diagrams are for illustration only, which thus is not a limitation of the present
disclosure, and wherein:
[0027] FIG. 1 illustrates exemplary network architecture of the proposed system to
illustrate its overall working in accordance with an embodiment of the present disclosure.
[0028] FIG. 2 illustrates exemplary functional components of a processing unit at
terminal unit, in accordance with an exemplary embodiment of the present disclosure.
[0029] FIGs. 3A-3E illustrate exemplary diagrams associated with implementation of the
proposed system in a boat, to illustrate its overall working in accordance with an embodiment of
the present disclosure.
[0030] FIG. 4 illustrates a method to conduce communication between control unit and
computing devices through terminal unit, in accordance with an embodiment of the present
disclosure.
[0031] FIG. 5 illustrates an exemplary computer system in which or with which
embodiments of the present invention can be utilized in accordance with embodiments of the
present disclosure.
DETAILED DESCRIPTION
[0032] The following is a detailed description of embodiments of the disclosure depicted
in the accompanying drawings. The embodiments are in such detail as to clearly communicate the disclosure. However, the amount of detail offered is not intended to limit the anticipated variations of embodiments; on the contrary, the intention is to cover all modifications,

equivalents, and alternatives falling within the spirit and scope of the present disclosure as defined by the appended claims.
[0033] Various terms as used herein are shown below. To the extent a term used in a
claim is not defined below, it should be given the broadest definition persons in the pertinent art
have given that term as reflected in printed publications and issued patents at the time of filing.
[0034] In some embodiments, the numerical parameters set forth in the written
description and attached claims are approximations that can vary depending upon the desired properties sought to be obtained by a particular embodiment. In some embodiments, the numerical parameters should be construed in light of the number of reported significant digits and by applying ordinary rounding techniques. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of some embodiments of the invention are approximations, the numerical values set forth in the specific examples are reported as precisely as practicable. The numerical values presented in some embodiments of the invention may contain certain errors necessarily resulting from the standard deviation found in their respective testing measurements.
[0035] As used in the description herein and throughout the claims that follow, the
meaning of “a,” “an,” and “the” includes plural reference unless the context clearly dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context clearly dictates otherwise.
[0036] The recitation of ranges of values herein is merely intended to serve as a
shorthand method of referring individually to each separate value falling within the range. Unless otherwise indicated herein, each individual value is incorporated into the specification as if it were individually recited herein. All methods described herein can be performed in any suitable order unless otherwise indicated herein or otherwise clearly contradicted by context. The use of any and all examples, or exemplary language (e.g. “such as”) provided with respect to certain embodiments herein is intended merely to better illuminate the invention and does not pose a limitation on the scope of the invention otherwise claimed. No language in the specification should be construed as indicating any non-claimed element essential to the practice of the invention.
[0037] Groupings of alternative elements or embodiments of the invention disclosed
herein are not to be construed as limitations. Each group member can be referred to and claimed

individually or in any combination with other members of the group or other elements found herein. One or more members of a group can be included in, or deleted from, a group for reasons of convenience and/or patentability. When any such inclusion or deletion occurs, the specification is herein deemed to contain the group as modified thus fulfilling the written description of all groups used in the appended claims.
[0038] The present disclosure relates to the field of establishing a secure communication
channel. More particularly, the present disclosure relates to a system and method to conduce wireless communication between remote computing device(s) and Control Unit through terminal.
[0039] According to an aspect the present disclosure pertains to a system to conduce
communication between control unit and one or more computing devices, wherein the system includes: a processing unit at terminal (also, referred to as terminal system, or, terminal unit) operatively coupled to the control unit through wireless communication and the one or more computing devices, the processing unit at terminal unit can be including one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors that can be configured to: receive a first set of data packets from at least one of the one or more computing devices, wherein each of the one or more computing devices can be associated with at least one entity; extract a second set of data packets from the received first set of data packets, the second set of data packets can correspond to one or more attributes of the at least one of the one or more computing devices; authenticate the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset; generate one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens can be transmitted to the at least one of the one or more computing devices; wherein the processing unit establishes a secured communication channel between the control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.
[0040] In an embodiment, the one or more attributes of the one or more computing
devices can include any or a combination of device number, name and id of the at least one entity.

[0041] In an embodiment, the processing unit at terminal unit, in response to the
establishment of the secured communication channel, can facilitate transmission of one or more
correspondence data packets between the control unit and the at least one of the one or more
computing devices, and wherein the set of correspondence data packets can be generated at any
or a combination of the terminal unit and the at least one of the one or more computing devices.
[0042] In an embodiment, the one or more correspondence data packets can be associated
with any or a combination of device id, message id, message field, and timestamp.
[0043] In an embodiment, the processing unit of terminal unit can be configured to
determine location of the at least one of the one or more computing devices based on the
received first set of data packets.
[0044] In an embodiment, the processing unit of terminal unit can generate a warning
signal in the event of a negative authentication of the at least one of the one or more computing
devices, wherein the generated warning signal can be transmitted to any or a combination of the
control unit and the at least one of the one or more computing devices.
[0045] In an embodiment, the processing unit at terminal unit can be configured to store
the generated one or more security tokens in an authenticating dataset; whereby the processing
unit can establish a secured communication channel between the control unit and the at least one
of the one or more computing devices when the one or more received security tokens match with
the authenticating dataset.
[0046] In an embodiment, the processing unit of terminal unit can terminate the
establishment of the secured communication channel between the control unit and the at least
one of the one or more computing devices when the one or more received security tokens differ
from the authenticating dataset.
[0047] In an embodiment, the control unit may be operatively coupled to the one or more
computing devices via terminal unit through a communication network; wherein the
communication network may comprise any or a combination of satellite system, a GSM module,
data cable, Bluetooth, wired network, Li-Fi module, and Wi Fi module.
[0048] According to another aspect the present disclosure pertains to a method for
conducing communication between control unit and one or more computing devices, wherein the
method includes steps of: receiving, at one or more processors of a processing unit, a first set of
data packets from at least one of the one or more computing devices, wherein each of the one or

more computing devices being associated with at least one entity; extracting, at the one or more processors, a second set of data packets from the received first set of data packets, wherein the second set of data packets can correspond to one or more attributes of the at least one of the one or more computing devices; authenticating, at the one or more processors, the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset; generating, at the one or more processors, one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens can be transmitted to the at least one of the one or more computing devices; and wherein a secured communication channel can be established between the control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.
[0049] FIG. 1 illustrates exemplary network architecture of the proposed system to
illustrate its overall working in accordance with an embodiment of the present disclosure.
[0050] As illustrated, in an aspect, a processing unit 106 implemented with any
computing device, or a terminal unit, that can be operatively coupled to a sever 108. Further, one or more computing devices 102-1, 102-2… 102-N(also, collectively referred to computing devices 102, and individually referred to as computing device 102, herein) and control unit 110 (also, referred to as control unit 110, or HUB 110, or Centre 110) can be communicatively coupled with the processing unit 106 through a network 104. In another embodiment, the computing device 102 and the control unit 110 can be communicatively coupled to each other via terminal unit through the network 104.In an exemplary embodiment, the computing device 102 can be, but not limited to, a smart phone, a laptop, a computer, and the likes.
[0051] Further, in an embodiment, the network 104 can be a wireless network, a wired
network or a combination thereof. The network 104 can be implemented as one of the different types of networks, such as intranet, local area network (LAN), wide area network (WAN), the internet, Wi-Fi, LTE network, CDMA network, and the like. Further, the network can either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further the network

104 can include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.
[0052] In an embodiment, the processing unit 106 can include a server 108. In some
implementations, the server 108 can be configured to manage and store data transmission between any or a combination of the control unit 110 and the computing devices 102 associated with the system 100. The management of the control unit 110 and the computing devices 102 can include, for example, scheduling data, configuring data, sending specific instructions, and other operations consistent with the present disclosure.
[0053] In an embodiment, the server 108 can be configured with the terminal unit and
can store and transmit data of the computing devices 102.
[0054] In an embodiment, at least one of the computing devices 102 can generate a first
set of data packets, where each of the computing devices 102 can be associated with at least one
entity. The first set of data packets can be transmitted to the processing unit 106 of the terminal
unit. In an embodiment, the processing unit 106 can receive a first set of data packets from at
least one of the computing devices 102. In an embodiment, the processing unit 106 can be,
further, configured to extract a second set of data packets from the received first set of data
packets, such that the second set of data packets can correspond to one or more attributes of the
at least one of the computing devices 102, through which the first set of data packets is sent to
the processing unit 106. The one or more attributes of the computing devices 102 can be, but not
limited to, any or a combination of device number, name and id of the at least one entity. In
another embodiment, the processing unit 106 can be configured to determine location of the at
least one of the computing devices 102 based on the received first set of data packets.
[0055] In an embodiment, the processing unit 106 at terminal unit can authenticate the at
least one of the computing devices 102 based on a comparison between the extracted second set of data packets with a predefined dataset, which can be stored in the processing unit 106, or the control unit 110, or can be retrieved from database of a third source outside the proposed system 100. In an embodiment, when the extracted second set of data packets match with data packets stored in the predefined dataset, it can be indicative of positive authentication of the at least one of the computing devices 102. But, in case, the extracted second set of data packets differ from the data packets stored in the predefined dataset, it can be indicative of negative authentication of the at least one of the computing devices 102.

[0056] In an embodiment, the processing unit 106 of terminal unit can be configured to
generate one or more security tokens in response to the positive authentication of the at least one of the computing devices 102, such that the generated one or more security tokens can be transmitted to the at least one of the computing devices 102. In another embodiment, the generated one or more security tokens can be stored in an authenticating dataset, which can be associated with the processing unit 106, or the control unit 110, or with a third source outside the proposed system 100.
[0057] In an embodiment, the processing unit 106 of terminal unit can enable
establishment of a secured communication channel between the control unit 110 and the at least one of the computing devices 102 on receipt of the at least one of the generated one or more security tokens. In another embodiment, the processing unit 106 can, in response to the establishment of the secured communication channel, facilitate transmission of one or more correspondence data packets between the control unit 110 and the at least one of the computing devices 102. In an embodiment, the set of correspondence data packets can be generated at any or a combination of the control unit 110 and the at least one of the computing devices 102, where the set of correspondence data packets can be associated with any or a combination of device id, message id, message field, timestamp, and the likes.
[0058] In another embodiment, the processing unit 106 can generate a warning signal in
the event of a negative authentication of the at least one of the computing devices 102, and the generated warning signal can be transmitted to any or a combination of the control unit 110 and the at least one of the computing devices 102.
[0059] In an embodiment, the processing unit 106 can be configured to store the
generated one or more security tokens in an authenticating dataset, and whereby the processing unit 106 can facilitate establishment of a secured communication channel between the control unit 110 and the at least one of the computing devices 102 when the one or more received security tokens match with the authenticating dataset. In another embodiment, the processing unit 106 can be configured to terminate the establishment of the secured communication channel between the control unit 110 and the at least one of the computing devices 102 when the one or more received security tokens differ from the authenticating dataset.
[0060] FIG. 2 illustrates exemplary functional components of a processing unit 106 at
terminal unit, in accordance with an exemplary embodiment of the present disclosure.

[0061] As illustrated, the processing unit 106 can include one or more processor(s) 202.
The one or more processor(s) 202 can be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any devices that manipulate data based on operational instructions. Among other capabilities, the one or more processor(s) 202 are configured to fetch and execute computer-readable instructions stored in a memory 204 of the processing unit 106. The memory 204 can store one or more computer-readable instructions or routines, which may be fetched and executed to create or share the data units over a network service. The memory 204 can include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0062] In an embodiment, the processing unit 106 can also include an interface(s) 206.
The interface(s) 206 may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) 206 may facilitate communication of the Processing unit 106 with various devices coupled to the Processing unit 106. The interface(s) 206 may also provide a communication pathway for one or more components of the processing unit 106. Examples of such components include, but are not limited to, processing engine(s) 208 and data 210.
[0063] In an embodiment, the processing engine(s) 208 can be implemented as a
combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processing engine(s) 208. In examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processing engine(s) 208 may be processor executable instructions stored on a non-transitory machine-readable storage medium and the hardware for the processing engine(s) 208 may include a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) 208. In such examples, the processing unit 106 can include the machine-readable storage medium storing the instructions and the processing resource to execute the instructions, or the machine-readable storage medium may be separate but accessible to the processing unit 106 and the processing resource. In other examples, the processing engine(s) 208 may be implemented by electronic circuitry. The data 210 can include

data that is either stored or generated as a result of functionalities implemented by any of the components of the processing engine(s) 208.
[0064] In an embodiment, the processing engine(s) 208 can include an extraction unit
212, an authentication unit 214, a security token generation unit 216, and other unit(s) 218. The other unit(s) 218 can implement functionalities that supplement applications or functions performed by the processing unit 106 or the processing engine(s) 208.
[0065] In an embodiment, the extraction unit 212 associated with the processing unit 106
can facilitate extraction of second set of data packets from a first set of data packets, where the
first set of data packets can be generated by at least one of the computing devices 102, which can
be associated with at least one entity. In an embodiment, the at least one of the computing
devices 102 can transmit the first set of data packets to a control unit 110 via the processing unit
106. In an embodiment, the control unit 110 can be operatively coupled to the at least one of the
computing devices 102 via terminal unit through a communication network; wherein the
communication network can be configured from any or a combination of satellite system, a GSM
module, data cable, Bluetooth, wired network, Li-Fi module, Wi Fi module, and the likes.
[0066] In an embodiment, the second set of data packets, that is extracted by the
extraction unit 212, can correspond to one or more attributes of the at least one of the computing devices 102, through which the first set of data packets is sent to the processing unit 106. The one or more attributes of the computing devices 102 can be, but not limited to, any or a combination of device number, name and id of the at least one entity. In another embodiment, the first set of data packets can be processed to determine location of the at least one of the computing devices 102.
[0067] In an embodiment, any or a combination of the one or more extracted attributes of
the at least one of the computing devices 102, and, the determined location of the at least one of the computing devices 102 can be stacked separately in any or a combination of first-in first-out (also referred to as FIFO, herein) stack, last-in first-out (also referred to as LIFO, herein) stack, and the likes.
[0068] In an embodiment, the authentication unit 214 associated with the processing unit
106 can enable the one or more processors to authenticate the at least one of the computing devices 102 based on a comparison between the extracted second set of data packets with a predefined dataset, where the predefined dataset can be stored in the processing unit 106, or the

control unit 110, or can be retrieved from database of a third source outside the proposed system 100.In an embodiment, when the extracted second set of data packets match with data packets stored in the predefined dataset, it can be indicative of positive authentication of the at least one of the computing devices 102. But, in case, the extracted second set of data packets differ from the data packets stored in the predefined dataset, it can be indicative of negative authentication of the at least one of the computing devices 102.
[0069] In an embodiment, the security token generation unit 216 associated with the
processing unit 106 can facilitate generation ofone or more security tokens in response to the positive authentication of the at least one of the computing devices 102, such that the generated one or more security tokens can be transmitted to the at least one of the computing devices 102.In another embodiment, the generated one or more security tokens can be stored in an authenticating dataset, which can be associated with the processing unit 106, or the control unit 110, or with a third source outside the proposed system 100.
[0070] In an embodiment, the one or more processors of the processing unit 106 at
terminal unit can enable establishment of a secured communication channel between the control unit 110 and the at least one of the computing devices 102 on receipt of the at least one of the generated one or more security tokens. In another embodiment, the one or more processors of the processing unit 106 can, in response to the establishment of the secured communication channel, facilitate transmission of one or more correspondence data packets between the control unit 110 and the at least one of the computing devices 102. In an embodiment, the set of correspondence data packets can be generated at any or a combination of the control unit 110 and the at least one of the computing devices 102, where the set of correspondence data packets can be associated with any or a combination of device id, message id, message field, timestamp, and the likes. In another embodiment, the one or more processors of the processing unit 106 can generate a warning signal in the event of a negative authentication of the at least one of the computing devices 102, and the generated warning signal can be transmitted to any or a combination of the control unit 110 and the at least one of the computing devices 102.
[0071] In an embodiment, the generated one or more security tokens can be stored in an
authenticating dataset, and whereby the one or more processors of the processing unit 106 can facilitate establishment of a secured communication channel between the control unit 110 and the at least one of the computing devices 102 when the one or more received security tokens

match with the authenticating dataset. In another embodiment, the one or more processors of the
processing unit 106 can be configured to terminate the establishment of the secured
communication channel between the control unit 110 and the at least one of the computing
devices 102 when the one or more received security tokens differ from the authenticating dataset.
[0072] In an embodiment, the authentication unit 214 can facilitate authentication of the
one or more received security tokens by comparing the one or more received security tokens with the authenticating dataset. In an embodiment, required security tokens can be retrieved from the authenticating dataset for comparison with the one or more received security tokens. In another embodiment, the one or more received security tokens can be directly compared with all the security tokens in the authenticating dataset.
[0073] FIGs. 3A-3E illustrate exemplary diagrams associated with implementation of the
proposed system 100 in a boat 300, to illustrate its overall working in accordance with an embodiment of the present disclosure.
[0074] In an embodiment, the proposed system 100 can be implemented in the boat 300,
for maritime climate information, to communicate with a computing unit 102 through a terminal 302 in any media by using local wireless device which can provide connectivity to remote users. In an implementation, Blue tooth can be used as a wireless media, but the implementation can be extended to other wireless media also.
[0075] As illustrated in FIG. 3A, in an embodiment, a fisherman or a person, in a the boat
300, can send a first set of data packets from the computing device 102 to a control unit 110, including a processing unit 106, can be located remotely far from the boat 300. In an embodiment, the first set of data packets can be transmitted from the computing device 102 to the control unit 110, through a satellite system 310. In another embodiment, the computing device 102 can be connected to the control unit 110 using the terminal 302. In an embodiment, a second set of data packets can be extracted from the first set of data packets, whereby the second set of data packets can correspond to one or more attributes of the computing device 102, through which the first set of data packets is sent. The one or more attributes of the computing device 102 can be, but not limited to, any or a combination of device number, name and id of the at least one entity.
[0076] In an embodiment, the processing unit 106 at terminal (also, referred to as
terminal system, or, terminal unit) can be configured to determine location of the computing

device 102 based on the received first set of data packets. In an illustrative embodiment, location, movement, and direction of the boat can be determined, based on the determined location of the computing device 102.
[0077] In an embodiment, the processing unit 106 at terminal unit can authenticate the
computing device 102 based on a comparison between the extracted second set of data packets and a predefined dataset, which can be stored in the processing unit 106, or the control unit 110, or can be retrieved from database of a third source outside the proposed system 100. In an embodiment, when the extracted second set of data packets match with data packets stored in the predefined dataset, it can be indicative of positive authentication of the computing device102. But, in case, the extracted second set of data packets differ from the data packets stored in the predefined dataset, it can be indicative of negative authentication of the computing device102, this process can mitigate security breaches.
[0078] In an embodiment, the processing unit 106 can be configured to generate one or
more security tokens in response to the positive authentication of the computing device 102, where the generated one or more security tokens can be stored in an authenticating dataset, which can be associated with the processing unit 106, or the control unit 110, or with a third source outside the proposed system 100.
[0079] In an embodiment, the processing unit 106 can enable establishment of a secured
communication channel between the control unit 110 and the computing device 102 on receipt of the at least one of the generated one or more security tokens. In another embodiment, the processing unit 106 can, in response to the establishment of the secured communication channel, facilitate transmission of one or more correspondence data packets between the control unit 110 and the computing device 102. In an embodiment, the set of correspondence data packets can be generated at any or a combination of the control unit 110 and the computing devices102, where the set of correspondence data packets can be associated with any or a combination of device id, message id, message field, timestamp, and the likes. In an illustrative embodiment, FIG.s 3B, 3C and 3D illustrate a format in which the set of correspondence data packets can be transmitted between the control unit 110 and the computing devices102. In an illustrative embodiment, the FIG. 3B depicts format of a display page pertaining to a message box, which can be customized as per user requirements and all the components of the display page can be unique to look and feel. Once the process starts, local wireless terminal 302 can be searching for the computing

device 102 to connect and once the computing device 102 gets connected, then remote user can send/receive data to/from the control unit 110. In an illustrative embodiment, on pressing BT Message button, Text Field with Send Message button can be displayed. On pressing of Send Button, message typed on text field can be sent to Long distance Communication system 110 via the local wireless terminal 302. In an illustrative embodiment, on clicking of Received Messages Button, Text field for receive messages can be displayed as shown in FIG. 3C.
[0080] In an illustrative embodiment, FIG. 3C depicts packet format of the set of
correspondence data packets when transmitted from the computing device 102 (also, referred to as e-gadget 102, herein) to the control unit 110 (also, referred to as communication system 110, herein), and FIG. 3D depicts packet format of the set of correspondence data packets when transmitted from the communication system 110 to the e-gadget 102.
[0081] In another embodiment, the processing unit 106 can generate a warning signal in
the event of a negative authentication of the at least one of the computing devices 102, and the generated warning signal can be transmitted to any or a combination of the control unit 110 and the at least one of the computing devices 102.
[0082] In an embodiment, the processing unit 106 at terminal unit can be configured to
store the generated one or more security tokens in an authenticating dataset, and whereby the
processing unit 106 can facilitate establishment of a secured communication channel between the
control unit 110 and the at least one of the computing devices 102 when the one or more received
security tokens match with the authenticating dataset. In another embodiment, the processing
unit 106 at terminal unit can be configured to terminate the establishment of the secured
communication channel between the control unit 110 and the at least one of the computing
devices 102 when the one or more received security tokens differ from the authenticating dataset.
[0083] In an illustrative embodiment, FIG. 3E illustrates exemplary flow diagram, in
accordance with an exemplary embodiment of the present disclosure. As illustrated, in an embodiment, the Processing unit 106 at terminal unit can search for the e-gadget 102 (also, referred to as smart device 102, device 102, herein). Once, the device 102 is found, the terminal unit 106 can start connecting with the device 102 for the transmission of the set correspondence data packets, and whereby the set correspondence data packets can be transmitted between the control unit 110 and the device 102 through terminal unit. In other way also, processing unit at computing device 102 can search for local wireless smart device for connection. Once the local

wireless device found, Computing/E-gadget device can start connecting with terminal unit and then start transmitting data packets to control unit 110 via terminal unit.
[0084] In another embodiment, in case the local wireless device is not found, or the
connection is not established properly with terminal unit due to local wireless device issues, then the computing device 102 can generate a set of alert signals which can include texts such as “Wireless local service is not available” and display in its apps software.
[0085] In an illustrative embodiment, the proposed system 100 can validate mobile
number associated with the registered computing device 102 and then only, the proposed system 100 can send user id, and password to the computing device 102. In an illustrative embodiment, the user id, and password can get expired after 5 hr. in an embodiment, based on the user-id, and password correspondingly a device id can be generated for the device 102, whereby the device id can be alphanumeric digits and is unique for each device 102. Therefore, there can be no duplication or conflicts for the device id. Also, any smart device 102 with unauthorized/un-registered mobile number cannot be allowed to access the proposed system 100.
[0086] In an illustrative embodiment, an app associated with the proposed system 100
can be installed in the computing device 102. In an embodiment, if app is uninstalled, and again installation of the app is tried, the installer can check record details for previous history of sending login details sent to registered mobile number. If record exists for the mobile number then same user id, and password can be sent, which can get expired after 15 minutes. If record details do not exist, then a separate user id, and password can be sent to the registered mobile number. Then against that user id, and password new corresponding device id can be generated, stored in the device 102. The device 102 can communicate with the terminal 302 using the new device id.
[0087] In an embodiment, for each user id, and password, the corresponding smart device
id can be set and fixed in the terminal’s 302 repository and installer.
[0088] In an illustrative embodiment, thousands of terminals 302 can be configured in
the coast guard zonal area, whereby each terminal 302 can be communicating with exactly one g-gadget 102 per head. Any other gadget which is among these thousand gadget can replace the said gadget for communication as that gadget is valid/registered gadget.
[0089] FIG. 4 illustrates a method to conduce communication between control unit and
computing devices, in accordance with an embodiment of the present disclosure.

[0090] As illustrated, in an embodiment, FIG. 4 illustrates a method to conduce
communication between a control unit 110 and computing devices 102.
[0091] In an embodiment, the proposed method can include a step 402 of receiving, at
one or more processors of a processing unit 106, a first set of data packets from at least one of
the computing devices 102.
[0092] In an embodiment, the proposed method can include a step 404 of extracting, at
the one or more processors, a second set of data packets from the first set of data packets that is
received in the step 402, where the second set of data packets can correspond to one or more
attributes of the at least one of the computing devices 102.
[0093] In an embodiment, the proposed method can include a step 406 of authenticating,
at the one or more processors, the at least one of computing devices 102 based on a comparison
between the second set of data packets that is extracted in the step 404 and a predefined dataset.
[0094] In an embodiment, the proposed method can include a step 408 of generating, at
the one or more processors, one or more security tokens, in response to a positive authentication,
being performed in the step 406, of the at least one of the computing devices 102. In an
embodiment, the generated one or more security tokens can be transmitted to the at least one of
the computing devices 102.In another embodiment, the generated one or more security tokens
can be stored in an authenticating dataset.
[0095] In an embodiment, the proposed method can include a step 410 of establishing a
secured communication channel, at the one or more processors, between the control unit 110 and
the at least one of the computing devices 102 on receipt of the at least one of the one or more
security tokens that are being generated in the step 408.
[0096] FIG. 5 illustrates an exemplary computer system in which or with which
embodiments of the present invention can be utilized in accordance with embodiments of the
present disclosure.
[0097] As shown in FIG. 5, computer system includes an external storage device 510, a
bus 520, a main memory 530, a read only memory 540, a mass storage device 550,
communication port 560, and a processor 570. A person skilled in the art will appreciate that
computer system may include more than one processor and communication ports. Examples of
processor 570 include, but are not limited to, an Intel® Itanium® or Itanium 2 processor(s), or
AMD® Opteron® or Athlon MP® processor(s), Motorola® lines of processors, FortiSOC™

system on a chip processors or other future processors. Processor 570 may include various engines associated with embodiments of the present invention. Communication port 560 can be any of an RS-232 port for use with a modem based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. Communication port 560 may be chosen depending on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which computer system connects.
[0098] In an embodiment, the memory 530 can be Random Access Memory (RAM), or
any other dynamic storage device commonly known in the art. Read only memory 540 can be any static storage device(s) e.g., but not limited to, a Programmable Read Only Memory (PROM) chips for storing static information e.g., start-up or BIOS instructions for processor 570. Mass storage 550 may be any current or future mass storage solution, which can be used to store information and/or instructions. Exemplary mass storage solutions include, but are not limited to, Parallel Advanced Technology Attachment (PATA) or Serial Advanced Technology Attachment (SATA) hard disk drives or solid-state drives (internal or external, e.g., having Universal Serial Bus (USB) and/or Firewire interfaces), e.g. those available from Seagate (e.g., the Seagate Barracuda 7102 family) or Hitachi (e.g., the Hitachi Deskstar 7K1000), one or more optical discs, Redundant Array of Independent Disks (RAID) storage, e.g. an array of disks (e.g., SATA arrays), available from various vendors including Dot Hill Systems Corp., LaCie, Nexsan Technologies, Inc. and Enhance Technology, Inc.
[0099] In an embodiment, the bus 520 communicatively couples processor(s) 570 with
the other memory, storage and communication blocks. Bus 520 can be, e.g. a Peripheral
Component Interconnect (PCI) / PCI Extended (PCI-X) bus, Small Computer System Interface
(SCSI), USB or the like, for connecting expansion cards, drives and other subsystems as well as
other buses, such a front side bus (FSB), which connects processor 570 to software system.
[00100] In another embodiment, operator and administrative interfaces, e.g. a display,
keyboard, and a cursor control device, may also be coupled to bus 520 to support direct operator interaction with computer system. Other operator and administrative interfaces can be provided through network connections connected through communication port 560. External storage device 510 can be any kind of external hard-drives, floppy drives, IOMEGA® Zip Drives, Compact Disc - Read Only Memory (CD-ROM), Compact Disc - Re-Writable (CD-RW), Digital

Video Disk - Read Only Memory (DVD-ROM). Components described above are meant only to exemplify various possibilities. In no way should the aforementioned exemplary computer system limit the scope of the present disclosure.
[00101] Thus, it will be appreciated by those of ordinary skill in the art that the diagrams,
schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular named.
[00102] While embodiments of the present invention have been illustrated and described,
it will be clear that the invention is not limited to these embodiments only. Numerous
modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled
in the art, without departing from the spirit and scope of the invention, as described in the claim.
[00103] In the foregoing description, numerous details are set forth. It will be apparent,
however, to one of ordinary skill in the art having the benefit of this disclosure, that the present invention may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form, rather than in detail, to avoid obscuring the present invention.
[00104] As used herein, and unless the context dictates otherwise, the term "coupled to" is
intended to include both direct coupling (in which two elements that are coupled to each other contact each other)and indirect coupling (in which at least one additional element is located between the two elements). Therefore, the terms "coupled to" and "coupled with" are used synonymously. Within the context of this document terms "coupled to" and "coupled with" are also used euphemistically to mean “communicatively coupled with” over a network, where two or more devices are able to exchange data with each other over the network, possibly via one or more intermediary device.

[00105] It should be apparent to those skilled in the art that many more modifications
besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced. Where the specification claims refers to at least one of something selected from the group consisting of A, B, C …. N, the text should be interpreted as requiring only one element from the group, not A plus N, or B plus N, etc.
[00106] While the foregoing describes various embodiments of the invention, other and
further embodiments of the invention may be devised without departing from the basic scope thereof. The scope of the invention is determined by the claims that follow. The invention is not limited to the described embodiments, versions or examples, which are included to enable a person having ordinary skill in the art to make and use the invention when combined with information and knowledge available to the person having ordinary skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[00107] The present disclosure provides a system and method for facilitating
communication with remotely located users.
[00108] The present disclosure provides a system and method for establishing a secure
wireless communication channel between remote computing devices and control unit.
[00109] The present disclosure provides a system and method for facilitating transmission
of information, via the secure communication channel, between the control unit and the one or
more computing devices using local wireless device/media.
[00110] The present disclosure provides a system and method for establishment of a
secure, reliable and efficient communication channel between the control unit and the one or
more computing devices to facilitate transmission of emergency messages between the control
unit and fishermen, hence, aiding in protecting lives and living of the fishermen.

[00111] The present disclosure provides an interactive, accurate, fast, efficient, cost
effective and simple system.
[00112] The present disclosure provides an easy way of communication to remote users by
having user friendly apps software in smart phone/e-gadget and giving provision for selection of local language to fisherman/end user.

We Claim:
1. The system to conduce communication between control unit and one or more computing
devices, via a terminal unit, wherein the system comprises:
a processing unit, at the terminal unit, operatively coupled to the one control unit and the one or more computing devices, the processing unit comprising one or more processors coupled with a memory, the memory storing instructions executable by the one or more processors that are configured to:
receive a first set of data packets from at least one of the one or more computing devices, wherein each of the one or more computing devices/e-gadgets being associated with at least one entity;
extract a second set of data packets from the received first set of data packets, the second set of data packets corresponds to one or more attributes of the at least one of the one or more computing devices;
authenticate the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset;
generate one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens are being transmitted to the at least one of the one or more computing devices;
wherein the processing unit at terminal unit establishes a secured communication channel between the control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.
2. The system as claimed in claim 1, wherein the one or more attributes of the one or more computing device (s) comprises any or a combination of device number, name and id of the at least one entity.
3. The system as claimed in claim 1, wherein the processing unit, in response to the establishment of the secured communication channel, facilitates transmission of one or more correspondence data packets between the control unit and the at least one of the one or more computing devices, and wherein the set of correspondence data packets are being

generated at any or a combination of the control unit and the at least one of the one or more computing devices.
4. The system as claimed in claim 4, wherein the one or more correspondence data packets are associated with any or a combination of device id, message id, message field, and timestamp.
5. The system as claimed in claim 1, wherein the processing unit is configured to determine location of the at least one of the one or more computing devices based on the received first set of data packets.
6. The system as claimed in claim 1, wherein the processing unit generates a warning signal in the event of a negative authentication of the at least one of the one or more computing devices, wherein the generated warning signal is transmitted to any or a combination of the control unit and the at least one of the one or more computing devices.
7. The system as claimed in claim 1, wherein the processing unit at terminal unit is configured to store the generated one or more security tokens in an authenticating dataset; whereby the processing unit establishes a secured communication channel between the control unit and the at least one of the one or more computing devices when the one or more received security tokens match with the authenticating dataset.
8. The system as claimed in claim 1, wherein the processing unit at terminal unit terminates the establishment of the secured communication channel between the control unit and the at least one of the one or more computing devices when the one or more received security tokens differ from the authenticating dataset.
9. The system as claimed in claim 1, wherein the control unit is operatively coupled to the one or more computing devices through a communication network via terminal unit; wherein the communication network comprises any or a combination of satellite system, a GSM module, data cable, Bluetooth, wired network, Li-Fi module, and Wi Fi module.
10. A method to conduce communication between control unit and one or more computing devices, via a terminal unit, wherein the method comprises steps of:
receiving, at one or more processors of a processing unit, a first set of data packets from at least one of the one or more computing devices, wherein each of the one or more computing devices being associated with at least one entity;

extracting, at the one or more processors, a second set of data packets from the received first set of data packets, wherein the second set of data packets corresponds to one or more attributes of the at least one of the one or more computing devices;
authenticating, at the one or more processors, the at least one of the one or more computing devices based on a comparison between the extracted second set of data packets and a predefined dataset;
generating, at the one or more processors, one or more security tokens, in response to a positive authentication of the at least one of the one or more computing devices; wherein the generated one or more security tokens are being transmitted to the at least one of the one or more computing devices; and
wherein a secured communication channel is established between the at least one control unit and the at least one of the one or more computing devices on receipt of the at least one of the generated one or more security tokens.

Documents

Application Documents

# Name Date
1 202041013631-AMENDED DOCUMENTS [10-10-2024(online)].pdf 2024-10-10
1 202041013631-STATEMENT OF UNDERTAKING (FORM 3) [28-03-2020(online)].pdf 2020-03-28
2 202041013631-FORM 1 [28-03-2020(online)].pdf 2020-03-28
2 202041013631-FORM 13 [10-10-2024(online)].pdf 2024-10-10
3 202041013631-POA [10-10-2024(online)].pdf 2024-10-10
3 202041013631-DRAWINGS [28-03-2020(online)].pdf 2020-03-28
4 202041013631-DECLARATION OF INVENTORSHIP (FORM 5) [28-03-2020(online)].pdf 2020-03-28
4 202041013631-CLAIMS [18-04-2023(online)].pdf 2023-04-18
5 202041013631-CORRESPONDENCE [18-04-2023(online)].pdf 2023-04-18
5 202041013631-COMPLETE SPECIFICATION [28-03-2020(online)].pdf 2020-03-28
6 202041013631-FORM-26 [27-04-2020(online)].pdf 2020-04-27
6 202041013631-DRAWING [18-04-2023(online)].pdf 2023-04-18
7 202041013631-Proof of Right [07-08-2020(online)].pdf 2020-08-07
7 202041013631-FER_SER_REPLY [18-04-2023(online)].pdf 2023-04-18
8 202041013631-FORM 18 [20-06-2022(online)].pdf 2022-06-20
8 202041013631-FORM-26 [18-04-2023(online)].pdf 2023-04-18
9 202041013631-FER.pdf 2022-10-20
10 202041013631-FORM 18 [20-06-2022(online)].pdf 2022-06-20
10 202041013631-FORM-26 [18-04-2023(online)].pdf 2023-04-18
11 202041013631-FER_SER_REPLY [18-04-2023(online)].pdf 2023-04-18
11 202041013631-Proof of Right [07-08-2020(online)].pdf 2020-08-07
12 202041013631-DRAWING [18-04-2023(online)].pdf 2023-04-18
12 202041013631-FORM-26 [27-04-2020(online)].pdf 2020-04-27
13 202041013631-COMPLETE SPECIFICATION [28-03-2020(online)].pdf 2020-03-28
13 202041013631-CORRESPONDENCE [18-04-2023(online)].pdf 2023-04-18
14 202041013631-CLAIMS [18-04-2023(online)].pdf 2023-04-18
14 202041013631-DECLARATION OF INVENTORSHIP (FORM 5) [28-03-2020(online)].pdf 2020-03-28
15 202041013631-DRAWINGS [28-03-2020(online)].pdf 2020-03-28
15 202041013631-POA [10-10-2024(online)].pdf 2024-10-10
16 202041013631-FORM 1 [28-03-2020(online)].pdf 2020-03-28
16 202041013631-FORM 13 [10-10-2024(online)].pdf 2024-10-10
17 202041013631-AMENDED DOCUMENTS [10-10-2024(online)].pdf 2024-10-10
17 202041013631-STATEMENT OF UNDERTAKING (FORM 3) [28-03-2020(online)].pdf 2020-03-28
18 202041013631-US(14)-HearingNotice-(HearingDate-26-09-2025).pdf 2025-09-10
19 202041013631-Correspondence to notify the Controller [22-09-2025(online)].pdf 2025-09-22
20 202041013631-Written submissions and relevant documents [10-10-2025(online)].pdf 2025-10-10
21 202041013631-Annexure [10-10-2025(online)].pdf 2025-10-10
22 202041013631-PatentCertificate23-10-2025.pdf 2025-10-23
23 202041013631-IntimationOfGrant23-10-2025.pdf 2025-10-23

Search Strategy

1 202041013631SEARCHSTRATEGYE_18-10-2022.pdf

ERegister / Renewals