Sign In to Follow Application
View All Documents & Correspondence

System For Transforming Ascii Characters In An Image Form Using Colour Transform And Method Thereof

Abstract: ABSTRACT TITLE: SYSTEM FOR TRANSFORMING ASCII CHARACTERS IN AN IMAGE FORM USING COLOUR TRANSFORM AND METHOD THEREOF Disclosed herein is a system (150) and method (1000) for transforming ASCII characters in an image form using colour transform. The said system comprises a Central Cloud based Server with its database (151), the Client terminals (152) and a Service Provider and administrator terminal (153) which are functionally coupled with each other. The system (150) encodes and decodes the three characters in one pixel where each character is encoded in each channel of the RGB denotation, thereby ensuring double security of the digital data to be retrieved. The system is a complete, 1:1 mapping of the ASCII character set to the 8-bit hexadecimal colour space (1,67,77,216 colour), analogous to a transform process which changes the data from character space to colour space. This is a secure and reliable system to represent huge amount of ASCII data in an image form which makes recognizing and analyzing the patterns visually very easy. Figure 1

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
05 April 2024
Publication Number
41/2024
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Neuflex Talent Solutions Pvt Ltd
A1, Shubhnagari Society, 30/31 Dahanukar Colony, Kothrud, Pune 411038

Inventors

1. Aalhad Mahesh Mone
FL-NO 103, Yugay Residency, 885/8, Erandwane, NR Hotel Sweekar, Pune 411004
2. Bhooshan Prafulla Kelkar
A1, Shubhnagari Society, 30/31 Dahanukar Colony, Kothrud Pune 411038
3. Madhura Vaibhav Kelkar
102 Navjeevan Bluebells Society, Off Sinhagad Rd, Pune 411030

Specification

DESC:FIELD OF THE INVENTION
The present invention relates to a technique of transforming character space into two-dimensional color space using color transform and its aspects in digital data security.
BACKGROUND OF THE INVENTION
Today’s era is a digital era. With the increasing reliance on technology and atomization, the amount of data being stored and transferred electronically has grown to a very large extent. This has made data security more important than ever before. Data breaches can result in significant financial losses, damage to reputation, and even legal consequences. Thus, there is a pressing need of time, to safeguard digital data. There are various ways to protect digital data.
The cited prior art titled “Global feature visualization and local feature combined malicious code classification method” discloses a malicious code classification method combining global feature visualization and local features, which has the basic idea that: partitioning the malicious code binary file, wherein each partition is used for calculating three characteristic values, and each characteristic value is correspondingly filled with a color channel, so that the malicious code binary file can be visualized into an RGB color image; the three characteristic values comprise characteristic values which represent the whole characteristic and the internal characteristic of the block; then, extracting global features of the RGB color image, and extracting local features from a malicious code core area; and combining the extracted global features and the extracted local features to classify the malicious code family. Here one byte corresponds to one pixel.
Another cited prior art documents titled “Malware Visualization for Fine-Grained Classification” and “A Novel Malware Detection System Based on Machine Learning and Binary Visualization “disclose the methodology used for developing the proposed malware detection system. It relies on visualizing a file’s binary on to a two-dimensional space. These cited prior arts use the ranges of ASCII values and pre-defined colors where one character is one pixel. Moreover, these pre-defined colors are non-unique and different for each sequence.
The present disclosure uses a technique of transforming character space into two-dimensional color space using color transform to address current issues and drawbacks of digital data security and privacy aspects. Thus, the inventor of the present disclosure has mitigated the aforementioned drawbacks and limitations of existing systems by providing more secure system for transforming ASCII characters in an image using color transform which encodes the three characters in one pixel where each character is encoded in each channel of the RGB denotation, thereby ensuring double security of the digital data to be retrieved. The present invention is a complete, 1:1 mapping of the ASCII character set to the 8-bit hexadecimal colour space (1,67,77,216 colour), analogous to a transform process which changes the data from character space to colour space.
The foregoing objects of the invention are accomplished and the problems and shortcomings associated with the prior art techniques and approaches are overcome by the present invention as described below in the preferred embodiment.

The detailed description of the present invention is followed herewith.
OBJECT OF THE INVENTION
The main object of the present disclosure is to provide a secure and reliable system to represent huge amount of ASCII data in an image form which makes finding, recognizing and analyzing patterns visually very easy.

SUMMARY OF THE INVENTION
Accordingly, as shown in Figure 1, the present invention is a system (150) and method (1000) for transforming ASCII characters in an image form using color transform. The said system comprises a Central Cloud based Server with its database (151), the Client terminal (152) and a Service Provider and administrator terminal (153). The clients and the service provider use any portable or non-portable electronic display device (50) such as a desktop or a laptop or a Mobile or a Tab or any similar electronic device thereof. The Clients (152) communicates via the network with the server (151) for sending and receiving information. The server (151) is configured to execute programs and exchange communications with the client terminal (152) over the network. The server (151) further communicates with the database to store and retrieve information used in executing a program.

Referring to Figure 2, in another aspect, it shows a method (1000) for transforming ASCII characters in an image form using colour transform. Specifically, the method (1000) is described in conjunction with the system (150) of Figure 1.
As shown in Figure 2, the method (1000) mainly comprises step (90) for accessing the system (150) by the authorized end-user, step (100) for encoding the input data with or without encryption condition, step (175) for transmitting encoded input data to the user, step (200) for decoding the transmitted data with or without decryption and step (250) for recovering the original input data at user’s end and then displaying the output data in required format.
At step (90), the authorized user or client (152) logs into the system (150) using his portable or non-portable device (50). As shown in Figure 3, the input data in any format is received at step (101). This input is converted into ASCII characters. The input data in any format which is provided by the client (152) is received. Input data is in the form of text, images, documents, music, video or any combination thereof which can be converted into a bitstream – a sequence of ones and zeroes which can be manipulated by code. Preferably, this data is converted into an object which is mutable, iterative and changeable. Thus, the input received at this step, is converted into ASCII characters as mentioned below in subsequent steps.
At step (100), Encoding the input data with or without encryption condition takes place. Each ASCII Character is converted into its corresponding hex notation. A new image container is created to store data. Each pixel has unique coordinates. It is possible to set the width or height of this image container. Each binary notation is converted to a hexadecimal notation. Now the next pixel is chosen and next three characters of the input data are converted. When all the data has finished converting, the image container is closed and written to disk at 100% quality. No compression is done to preserve data and prevent aliasing. ASCII Data is transformed in an image using color transform which encodes the three characters in one pixel where each character is encoded in each channel of the RGB denotation, thereby ensuring double security of the digital data to be retrieved. The present invention is a complete, 1:1 mapping of the ASCII character set to the 8-bit hexadecimal colour space (1,67,77,216 colour), analogous to a transform process which changes the data from character space to colour space.
The image form is displayed on the portable or non-portable electronic output devices such as a desktop or a laptop or a Mobile or a Tab or any similar electronic device. This image is considered as a preliminary output of the Colour Transform. This image can now be opened in an image viewer.
At step (175), encoded input data is transmitted to the user. Further at step (200) the transmitted data to the user is decoded with or without decryption based on encryption condition (51). Finally at step (250) the original input data at user’s end is recovered and then displayed in required format as output.

BRIEF DESCRIPTION OF DRAWINGS
These and other advantages are more readily understood by referring to the following detailed description disclosed hereinafter with reference to the accompanying drawing, definitions of terminologies used and which are illustrated hereinafter.
The figures provided herein are not necessarily to the scale, out of which:
Figure 1: illustrates the block diagram of functionality of the system (150), in accordance with the embodiments of the present disclosure.
Figure 2: illustrates the method (1000) of the system (150), in accordance with the embodiments of the present disclosure.
Figure 3: illustrates the encoding process (100) of the system (150), in accordance with the embodiments of the present disclosure.
Figure 4: illustrates the decoding process (200) of the system (150), in accordance with the embodiments of the present disclosure.
Figure 5: illustrates the comparison process (300) of two images using colour transform.
DESCRIPTION OF THE INVENTION
The features of the present invention and its technical advantages can be better understood from the following description of preferred embodiments together with the claims and accompanying schematic drawings. It is to be understood that this invention is not limited to the specific devices, methods, conditions or parameters described and/or shown herein and that the terminology used herein is for the example only and is not intended to be limiting of the claimed invention.
Also, as used in the specification, the singular forms ‘a’, ‘an’, and ‘the’ include the plural, and references to a particular numerical value includes at least that particular value unless the content clearly directs otherwise. Ranges may be expressed herein as from ‘about’ or ‘approximately’ another particular value. Also, it is to be understood that unless otherwise indicated, dimensions and material characteristics stated herein are by way of example rather than limitation, and are for better understanding of sample embodiment of suitable utility, and variations outside of the stated values may also be within the scope of the invention depending upon the particular application. It is to be understood that the above description is intended to be illustrative, and not restrictive. The below discussed embodiments may be used in combination with each other. It will be apparent to those skilled in the art that the present invention may be practiced without these specific details.
It should be emphasized that the term “comprises/comprising” when used in this specification is taken to specify the presence of stated features, integers, steps or components but does not preclude the presence or addition of one or more other features, integers, steps, components or groups thereof.
The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used to enable a clear and consistent understanding of the invention. Accordingly, it should be apparent to those skilled in the art that the following description of exemplary embodiments of the present invention are provided for illustration purpose only and not for the purpose of limiting the invention.
In order to address the afore-mentioned concerns, the inventor of the present disclosure, in accordance with one aspect, provides a system for transforming ASCII characters in the image form by using color transform.
The features, components, parameters and conditions, functionalities and steps of using the said mechanism of the present disclosure include but are not limited to the disclosure herein below.
The present invention is illustrated with reference to the accompanying drawings, throughout which reference numbers indicate corresponding parts in the various figures. These reference numbers are shown in brackets in the following description.
Referring to Figure 1, wherein this figure illustrates the functionality of the system (150) for transforming ASCII characters in an image form using color transform in accordance with the present invention is disclosed. The said system comprises a Central Cloud based Server with its database (151), the Client terminal (152) and a Service Provider and administrator terminal (153). The clients and the service provider use any portable or non-portable electronic display device (50) such as a desktop or a laptop or a Mobile or a Tab or any similar electronic device thereof. The Clients (152) communicates via the network with the server (151) for sending and receiving information. The server (151) is configured to execute programs and exchange communications with the client terminal (152) over the network. The server (151) further communicates with the database to store and retrieve information used in executing a program.
Referring to Figure 2, in another aspect, it illustrates a method (1000) of the system (150) for transforming ASCII characters in an image form using colour transform. Specifically, the method (1000) is described in conjunction with the system (150) of Figure 1 for working the invention.
As shown in Figure 2, the method (1000) mainly comprises step (90) for accessing the system (150) by the authorized end-user, step (100) for encoding the input data with or without encryption condition, step (175) for transmitting encoded input data to the user, step (200) for decoding the transmitted data with or without decryption and step (250) for recovering the original input data at user’s end and then displaying the output data in required format.

The method (1000) involves accessing the system (150) by any client at the client terminal (152) at step (90) using the electronic display device (50) with his login credentials. If these login credentials are incorrect, then they are detected by the system (150) and the end-user is warned accordingly and not allowed to login. If the end-user is a new user, then he has to sign-up with the information like name, location, address, category etc. At a time, there can be multiple clients who log into the system (150) with respective electronic display device (50). The electronic device can either be a portable or non-portable device wherein the portable electronic display device is a smartphone or a laptop or a Tablet or a notebook or any other combination thereof and the non-portable electronic display device is either a desktop or a PC or any existing electronic display device or any other combination thereof.
Referring to Figure 3, which illustrates the process of encoding (100) the input data. At step (101), the input data in any format which is provided by the authorized client (152) is well received. Input data is in the form of text, images, documents, music, video or any combination thereof which can be converted into a bitstream – a sequence of ones and zeroes which can be manipulated by code. Preferably, this data is converted into an object which is mutable, iterative and changeable. Thus, the input received at this step, is converted into ASCII characters at steps mentioned below.
At step (102), a file type is decided based on its extension whether it is a text file (.txt file), or a binary file or other file with any other extensions. The said input file is imported as an object in Python using the relevant libraries.
At step (110), if the file is a binary file or any other file, then the file object obtained at step (102) is converted to a bitstream using Python libraries.
At step (120), if the file is a text file, then the type of character set is determined first. The character set typically is either ASCII or another like Unicode. At step (121), a text file with ASCII character set is converted into an iterative object in Python.
At step (130), a file with other encoding schemes, is first converted to ASCII or is replaced with their Unicode equivalents. In Unicode, characters are represented with the sequence “U+xxxxxx” in hexadecimal. A valid Unicode character is U+103F, as is U+FFE2. ASCII has only 128 characters, so Unicode characters are replaced by their code point in Unicode.
At step (140), the encoder function which is an iterative function, receives the bitstream obtained from above mentioned steps. This function performs the main task of “transforming” the bitstream from the character space to the colour space.
At step (141), An image container is first created in Python using the external library Pillow. This is done by specifying the dimensions and the type of image (PNG file type, width, height). The number of pixels in this image should be a minimum of L/3, where L is the number of characters in the bitstream. If L is not divisible by 3, the space character (“ “) is used to pad the object length until it is divisible by 3.
At step (142), 24 bits of the bitstream object are taken at a time. These 24 bits are further split into three parts of 8 bits each. Each 8-bit part represents a character in ASCII, so three characters equal 24 bits. Therefore 3 characters are processed at a time.
At step 51 - The pixels are chosen with a condition to encrypt the information. This information can be arithmetic or even bitwise logical. E.g. R+G+B should be divisible by 7, or R || G = 1, etc. If the current pixel does not meet the condition required for encryption, then step 52 of is performed to choose the next pixel as shown in Figure 3. Else if the current pixel meets the condition required for encryption, then step 143 is performed. Simple conditions like red value of colour should be greater than 120 to encode, or R+G should be divisible by 3 are easier to program and detect. Harder conditions like RG congruent to 1 mod B are very exclusive, but provide much stronger encryption. A good encryption scheme for the colour transform will involve a tradeoff between these. A condition that is too hard will not be satisfied by many pixels, leading to too large an image size for a small message. On the other hand, a condition that is too simple will be easy to decrypt and easily visible in the histogram of the image.
At step (143), Each 8-bit string is converted into hexadecimal notation. 10000001_b is converted into 0x41. Three such hex notations are obtained for each 24-bit string and concatenated together. For example, for ‘ABC’ or ’65,66,67’ in ASCII, the corresponding hex notation is 0x414243.
At step (144), Notations are used as the values for the red, green and blue channel for the first pixel of the image. Therefore, the pixel (in this example) will be filled with #414243, which is this color:
At step (145), If all bits are not converted, then the control is transferred to step (142) to perform the next steps in succession till all bits are converted. After all bits are converted, control is transferred to step (146).
At step (146), The image container is saved as a Portable Network Graphics (PNG) file at 100% quality, 0% compression. The output is displayed to the end-user on their portable devices.
At step (175), the encoded input data is transmitted to the end user.
Referring to Figure 4, in another aspect, it illustrates the decoding process. Decoding process (200) is the reverse of Encoding process explained in above steps (140 – 146).
At step (201), the colour-transform encoded image is accepted from the end user.
At step (202), number of pixels from image dimensions are calculated. Each pixel of the input image is processed one at a time, starting at (0,0).
At step (210), if all pixels are NOT processed, then
• At step (211), Reading of individual color bands from the next pixel is done. The value of R, G and B is stored in three separate variables.
• At step (212), The hex values of R, G and B for that pixel are converted into binary.
• At step (213), Binary values are converted to the corresponding ASCII character. i.e. 41H is converted to 101001B which is “A” in ASCII encoding.
• At step (214), The three characters from each pixel are appended to a list called “decodedCharacters”
Decoding is a process where a pixel is read from an input image. ‘Reading’ a pixel refers to obtaining its hex code. The hex code is split into three bytes - one for each colour band. Each byte is converted to binary from the hexadecimal notation used in hex code. The most significant bit of the binary notation (highest exponent) is dropped, since it is randomized in the encoding process. The remaining 7 bits are converted to their ASCII character. Therefore, 52 would be converted to 1010010b which is ASCII for ‘R’. 5. This ASCII character is written to a new file. Last two steps are done again for each byte of every hex code of every pixel. Also, decryption of transmitted data is done prior to decoding the same, if encryption condition (51) is chosen during encoding process (100) of the input data.
At step (210), if all pixels are processed, then below steps are followed:
At step (220), Checking of the list “decodedCharacters” for special sequences like “\n” “\t” to indicate line breaks and tab breaks is done.
At step (221), Addition of the special characters at the correct places to preserve formatting of the original message.
At step (222), Printing of the modified list with the special characters to an output text file is done.
At step (250) the original input data is recovered and then displayed to the end user in required format as output.
Referring to Figure 5, which illustrates the example of visually distinctive Image comparison using colour transform.
At step 301, Image1 (an image To Be compared against) is accepted.
At step 302, Image2 (an image To Be Compared with) is accepted. Area of interest is highlighted herein.
At step 303, both the Images which are encoded using colour transform are compared visually.
At step 304, both the Images which are encoded using colour transform are compared on a pixel-by-pixel basis.
Another example of visually distinctive image comparison is, the histogram of the image to compare against is computed, and the histogram of the colour-transform encoded image is compared with it. Such comparisons are particularly useful for larger datasets. Some practical applications include recruitment and talent management (human resource), genome comparison (which is in fact being performed in this example, the genomes in question being E. coli and BS2) and financial data analysis.
A non-limiting embodiment of accessing the present disclosure is mentioned above. The sequence of the steps provided herein above may change in other embodiments of the method of the present disclosure.
The embodiments described herein above for the said system (150) for transforming ASCII characters in the image form using colour transform are non-limiting. The foregoing descriptive matter is to be interpreted merely as an illustration of the concept of the present disclosure and it is in no way to be construed as a limitation. Description of terminologies, concepts and execution steps known to persons acquainted with technology has been avoided to preclude beclouding of the afore-stated embodiments.
ADVANTAGES OF THE INVENTION
Technical advantages and economical significance of system of present disclosure include but are not limited to:
1.Data Security: Data breaches which result in significant financial losses, damage to reputation, legal consequences. This can be minimized by using highly secure data encryption and decryption technique.
2. Large data representation: in the form of an image having visually distinctive patterns which can be easily recognized and analyzed. This feature is useful for maintaining version control with its authenticity.
3.Plagiarism: Instead of scanning the entire document, it will suffice to transform the document into an image, which can then be compared instantly even with a naked eye since the pattens of images are distinctive and easily recognizable.
4. Various Industries: Forensic departments, Crime Branches, Retail industry, financial data analysis or any other similar industry where inferences depend on the comparison of two or more samples. Data comparison, differentiation, analysis of large data can be easily achieved by visually distinct image patterns.
5. Genetic or Proteomic data Analysis: As an example - ability to compare two entire GENOMES, Homologues etc. at a glance and see how much they are similar, or they are not.
6. HR Operations including Talent management, Talent acquisition, Capacity building and similar activities thereof.
7. Space Data: It is the spatial data which provides the information that identifies the location of features and boundaries on Earth. Space Data is collected by space-borne, Earth-orbit monitoring equipment, such as satellites and space shuttles. This is a very huge data. Data comparison, differentiation, analysis of such a huge space data can be easily achieved by transforming space data files into visually distinct image patterns.
8. Telecom Data: It is used for various purposes such as network optimization, fraud detection, customer segmentation, targeted marketing, and improving service quality
The foregoing objects of the invention are accomplished and the problems and shortcomings associated with prior art techniques and approaches are overcome by the present invention described in the present embodiment. Detailed descriptions of the preferred embodiment are provided herein; however, it is to be understood that the present invention may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but rather as a basis for the claims and as a representative basis for teaching one skilled in the art to employ the present invention in virtually any appropriately detailed system, structure, or matter.
The benefits and advantages which may be provided by the present invention, have been described above with regard to specific embodiments. These benefits and advantages, and any elements or limitations that may cause them to occur or to become more pronounced are not to be construed as critical, required, or essential features of any or all of the embodiments.
While the present invention has been described with reference to particular embodiments, it should be understood that the embodiments are illustrative and that the scope of the invention is not limited to these embodiments. Many variations, modifications, additions and improvements to the embodiments described above are possible. It is contemplated that these variations, modifications, additions and improvements fall within the scope of the invention.
,CLAIMS:CLAIMS
We Claim,
1. A system (150) for transforming ASCII characters in an image form using colour transform, the system comprising:
a) a secure central cloud resident server (151);
b) one or more clients (152) using respective electronic display device (50); and
c) a service provider and administrator terminal (153);
characterized in that
d) the electronic display device (50) used by the clients (152) is operably connected to the secure central cloud resident server (151) and to the service provider (153) through communication network for performing colour transform activities using encoding, encrypting, decoding and decrypting functionalities for displaying ASCII characters in an image form having visually distinctive patterns;
e) the secure central cloud resident server (151) comprising a database communicates with the electronic display device (50) for processing all kind of data received, for displaying ASCII characters in an image form;
f) the service provider (153) configures, monitors and maintains the database of the system (150);
g) the electronic display device (50) is either portable or non-portable device wherein the portable electronic display device is either a smartphone or a Tablet or a laptop or a notebook or any combination thereof and the non-portable electronic display device is either a Desktop or a PC or any existing electronic display device or any combination thereof;
h) the electronic display device (50) is configured for accessing the system (150) by the service provider (153).

2. The system (150) for transforming ASCII characters in an image form using colour transform, as claimed in claim 1, wherein the said system represents the large data in the form of an image with visually distinctive patterns which are easily recognized and analyzed for maintaining version control with its authenticity.

3. The system (150) for transforming ASCII characters in an image form using colour transform, as claimed in claim 1, wherein the said system works as an accurate tool for detecting plagiarism instantly with a naked eye, by simply comparing the visually distinctive and easily recognizable patterns of images obtained by transforming the concerned documents into image forms through the said system.

4. The system (150) for transforming ASCII characters in an image form using colour transform, as claimed in claim 1, wherein the said system minimizes data breaches resulting in significant financial losses, damage to reputation and legal consequences by using highly secure data encryption and decryption technique.

5. The system (150) for transforming ASCII characters in an image form using colour transform, as claimed in claim 1, wherein the said system works as an accurate tool for analyzing and comparing a very huge data as large as entire GENOMES, Homologues or similar only at a glance by simply comparing the visually distinctive and easily recognizable patterns of images obtained using colour transform.

6. The system (150) for transforming ASCII characters in an image form using colour transform, as claimed in claim 1, wherein the said system works as an effective tool for human resource operations including Talent management, Talent acquisition, Capacity building and similar activities, by analyzing and mapping required skillset using visually distinctive patterns of images obtained by transforming the required human resource data into image forms.

7. A method (1000) for transforming ASCII characters in an image form using colour transform, the method comprising:
i. accessing the said system using login credentials (90) by one or multiple
registered users (152) through electronic device (50) of the said system;
ii. encoding the input data (100) with or without encryption condition (51);
iii. transmitting encoded input data (175) to the user;
iv. decoding the transmitted data with or without decryption (200); and
v. recovering the original input data at user’s end and displaying the output in
required format (250).
8. The method (1000) for transforming ASCII characters in an image form using colour transform, as claimed in claim 7, generates an image with visually distinctive patterns which is easily recognized and analyzed with a naked eye, by converting input data of any form into hexadecimal notation, using RGB channel for one pixel at a considerably faster rate.

Dated this 4th day of September 2024

Madhuvanti Mandar Kelkar
IN / PA (3044)
(Agent for Applicant)

Documents

Application Documents

# Name Date
1 202421028099-STATEMENT OF UNDERTAKING (FORM 3) [05-04-2024(online)].pdf 2024-04-05
2 202421028099-PROVISIONAL SPECIFICATION [05-04-2024(online)].pdf 2024-04-05
3 202421028099-POWER OF AUTHORITY [05-04-2024(online)].pdf 2024-04-05
4 202421028099-FORM FOR SMALL ENTITY(FORM-28) [05-04-2024(online)].pdf 2024-04-05
5 202421028099-FORM FOR SMALL ENTITY [05-04-2024(online)].pdf 2024-04-05
6 202421028099-FORM 1 [05-04-2024(online)].pdf 2024-04-05
7 202421028099-FIGURE OF ABSTRACT [05-04-2024(online)].pdf 2024-04-05
8 202421028099-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [05-04-2024(online)].pdf 2024-04-05
9 202421028099-EVIDENCE FOR REGISTRATION UNDER SSI [05-04-2024(online)].pdf 2024-04-05
10 202421028099-ENDORSEMENT BY INVENTORS [05-04-2024(online)].pdf 2024-04-05
11 202421028099-DRAWINGS [05-04-2024(online)].pdf 2024-04-05
12 202421028099-FORM-9 [04-09-2024(online)].pdf 2024-09-04
13 202421028099-DRAWING [04-09-2024(online)].pdf 2024-09-04
14 202421028099-CORRESPONDENCE-OTHERS [04-09-2024(online)].pdf 2024-09-04
15 202421028099-COMPLETE SPECIFICATION [04-09-2024(online)].pdf 2024-09-04
16 Abstract.jpg 2024-10-04
17 202421028099-ORIGINAL UR 6(1A) FORM 1 & 26-181124.pdf 2024-11-27
18 202421028099-Proof of Right [14-01-2025(online)].pdf 2025-01-14
19 202421028099-MSME CERTIFICATE [17-01-2025(online)].pdf 2025-01-17
20 202421028099-FORM28 [17-01-2025(online)].pdf 2025-01-17
21 202421028099-FORM 18A [17-01-2025(online)].pdf 2025-01-17
22 202421028099-FER.pdf 2025-01-21
23 202421028099-Proof of Right [25-02-2025(online)].pdf 2025-02-25
24 202421028099-Information under section 8(2) [25-02-2025(online)].pdf 2025-02-25
25 202421028099-OTHERS [06-07-2025(online)].pdf 2025-07-06
26 202421028099-FER_SER_REPLY [06-07-2025(online)].pdf 2025-07-06
27 202421028099-DRAWING [06-07-2025(online)].pdf 2025-07-06
28 202421028099-CORRESPONDENCE [06-07-2025(online)].pdf 2025-07-06
29 202421028099-COMPLETE SPECIFICATION [06-07-2025(online)].pdf 2025-07-06
30 202421028099-CLAIMS [06-07-2025(online)].pdf 2025-07-06
31 202421028099-US(14)-HearingNotice-(HearingDate-26-09-2025).pdf 2025-09-19
32 202421028099-Correspondence to notify the Controller [19-09-2025(online)].pdf 2025-09-19
33 202421028099-Written submissions and relevant documents [06-10-2025(online)].pdf 2025-10-06
34 202421028099-Annexure [06-10-2025(online)].pdf 2025-10-06

Search Strategy

1 202421028099E_21-01-2025.pdf