Company Information

CIN
Status
Date of Incorporation
15 June 2015
State / ROC
Patna / ROC Patna
Last Balance Sheet
31 March 2023
Last Annual Meeting
30 September 2023
Paid Up Capital
100,000
Authorised Capital
1,500,000

Directors

Ashok Kumar
Ashok Kumar
Director/Designated Partner
over 10 years ago
Sumanti Devi
Sumanti Devi
Director
over 10 years ago

Patents

Tamper Evident Reusable Envelope

Tamper-evident reusable envelopes. A security envelope that can be used multiple times using additional closing flaps with hot melt glue. A security envelope with its surface silicon release coated such that adhesive tapes cannot be applied to hide any cut-line. A method of resealing the used envelopes by separate c...

A Method Of Content Authentication Inside A Sealed Box Using Special Labels

This invention proposes a content verification and authentication method inside a sealed box. This method is about tagging each item with a label containing internal layering of radio-opaque material randomly oriented. Externally all labels/tags look symmetrical and hence even if an insider replaces the original ite...

Intergrity Checking And Reporting Model For Hardware Rooted Trust Enabled E Voting Platform

Platform Security remains a central concern in E-voting whether it is poll-place or remote. Tamper-proofing solves only half of the problem & replication can defeat all sophisticated measures of tamper-proofing. This invention uses hardware rooted trust to guarantee platform security. Invention also proposes, for th...

Tamper Evident And Duplication Evident Reusable Envelope

This invention proposes a reusable tamper-evident and duplication-evident envelope that is sealed by special security labels; those can be scanned and verified by computing device. Computing device uploads the integrity credential on a remote database for subsequent verification. After removing old label a new label...

System For Determining Authenticity Of Security Labels

The system (100) for determining authenticity of security labels comprises, a security label (102) comprising a crack line (202) and a scanning device (106). The scanning device (106)comprises an image capturing module (302) and a processor module (304). The image capturing module (302) is configured to acquire at l...

Automated Detection Of Tampering

The method to determine tampering of a security label (102) comprises, associating at least a portion of a first pattern to an external reference (110), wherein a first layer (202) of the security label (102) comprises the first pattern. Further, a second pattern (206) defined in a second layer (204) is used to chan...

System For Enabling Identification Of Tampering

System for enabling identification of tampering. A system (100) for enabling identification of tampering, the system (100) comprises a device (102) engaged to an article (104). The device (100) comprises a movable member (206) and a first reference (210) provided on the movable member (206). The device (102) is oper...

Partially Reusable Device For Securing Packaging

REUSABLE DEVICE FOR SECURING PACKAGING. This invention discloses improved reusable sealing device in both formats semi-reusable and fully reusable. With semi-reusable device core focus is on reducing single-use components along-with being easier on operational and adoption-barrier aspects. One common improvement for...

Automated Detection Of Digital & Physical Cloning

This Invention captures Non Clonable Printing and Labeling Technologies. With Non Clonable Printing preventing Unofficial Production of original is very important and hence this invention discloses interlinking of in-house printed tracking codes to Non Clonable Artefact Printed on Another Print-line. In addition, No...

Reusable System For Securing Packaging And Providing Tamper Evidence

A reusable system for securing packaging and providing tamper evidence is disclosed. The system may comprise a housing for securing an opening of the packaging, an access controller operably engaged to the housing and a security member. The housing may comprise a lock, wherein release of the lock may enable opening ...

A Combined Data Retrieval And Tamper Evident Security System

The system comprises of a security label engaged to a package. The label comprises of a first layer with a first code and a second layer with a second code. The first layer is disposed over the second layer in a way that at least a portion of the second code on the second layer is covered by the first layer. The sec...