Company Information

CIN
Status
Date of Incorporation
15 May 2018
State / ROC
Pune / ROC Pune
Last Balance Sheet
31 March 2023
Last Annual Meeting
30 September 2023
Paid Up Capital
100,000
Authorised Capital
1,000,000

Directors

Saket Mishra
Saket Mishra
Director
over 2 years ago
Rahul Mishra
Rahul Mishra
Director
over 2 years ago
Dhiraj Singh
Dhiraj Singh
Director/Designated Partner
about 4 years ago

Past Directors

Dipendra Singh Hada
Dipendra Singh Hada
Director
over 7 years ago

Patents

System And Method For Detecting Anomalies In A System

ABSTRACT SYSTEM AND METHOD FOR DETECTING ANOMALIES IN A SYSTEM A system and a method for detecting anomalies in a system are disclosed. The system comprises a log analysis unit (102) configured to analyse log in the system, a port scanning unit (104) configured to scan ports present in the system, a firewall sta...

System And Method For Gathering Information About Unauthorised Person

ABSTRACT SYSTEM AND METHOD FOR GATHERING INFORMATION ABOUT UNAUTHORISED PERSON A system and a method for detecting unauthorised users are disclosed. The system (200) comprises one or more sources configured to detect information about the unauthorised user and a network attack detection unit (212) configured to ...

System And Method For Analyzing Slack Space

ABSTRACT SYSTEM AND METHOD FOR ANALYZING SLACK SPACE A system and a method for analysing slack region (204) are disclosed. The system comprises a memory (102), wherein the memory comprises a data region (202) configured to store user data, a slack space (204) configured to store leftover data. The system furthe...

System And Method For Analysing User History

ABSTRACT SYSTEM AND METHOD FOR ANALYSING USER HISTORY A system and a method for determining user history are disclosed. The system comprises an input unit (102) configured to receive input regarding a search string from a user, a memory (104) configured to store user history, wherein the user history includes we...

System And Method For Identifying Attacks From Different Routes In A Network

ABSTRACT SYSTEM AND METHOD FOR IDENTIFYING ATTACKS FROM DIFFERENT ROUTES IN A NETWORK A system and a method for identifying attacks from different routes in a network are disclosed. The system comprises a host detector configured to determine a list of devices connected to the network, a host scanner configured ...

System And Method For Detecting Unauthorized Users Using Data Forensics

ABSTRACT SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED USERS USING DATA FORENSICS A system (100) and a method for identifying unauthorized user are disclosed. The system comprises a server (102), a network (106), a plurality of user devices (104) connected to the server via the network and a hardware-based storag...

Usb Based System And Method For Examination Of Data Packets

ABSTRACT USB BASED SYSTEM AND METHOD FOR EXAMINATION OF DATA PACKETS A USB (Universal Serial Bus) based system and a method for examining data packets passing via a network is provided. The system comprises a server, a plurality of user devices configured to send data packets via the network. The network compris...

System And Method For Detecting Unauthorized Users Using Email Forensics

ABSTRACT SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED USERS USING EMAIL FORENSICS A system and a method for detecting unauthorized user are disclosed. The system comprises a server, a network, a plurality of user devices connected to the server via the network, wherein the plurality of user devices is configured...

Operating System Independent And File Independent Computer System And Method For Authenticating A User

ABSTRACT OPERATING SYSTEM INDEPENDENT AND FILE INDEPENDENT COMPUTER SYSTEM AND METHOD FOR AUTHENTICATING A USER An Operating system independent and file independent computer system and a method for authenticating a user are disclosed. The computer system comprises a memory (102), a preference generator (106) con...

System And Method For Encrypting Hidden Files

ABSTRACT SYSTEM AND METHOD FOR ENCRYPTING HIDDEN FILES A system and a method for encrypting hidden files or folders are provided. The system (100) comprises a file storage unit (108) configured to store at least one file or a folder, a file hiding unit (106) configured to hide the stored at least one file or fol...

An Environment And A Method For Managing Documents In A Distributed Ledger

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING DOCUMENTS IN A DISTRIBUTED LEDGER An environment (100) and a method for managing documents in a distributed ledger are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing d...

A System And A Method For Preventing Denial Of Service (Dos) Attacks

ABSTRACT A SYSTEM AND A METHOD FOR PREVENTING DENIAL OF ATTACK (DoS) ATTACKS A system (100) and a method for preventing denial of service attacks are disclosed. The system (100) comprises a server (102), a network (106), a plurality of computing devices (104) configured to establish a connection with the serv...

An Environment And A Method For Managing Renewable Energy Information

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING RENEWABLE ENERGY INFORMATION An environment (100) and a method for managing renewable energy information in a distributed ledger are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality ...

An Environment And A Method For Managing Lifecycle Of A Vehicle

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING LIFECYCLE OF A VEHICLE An environment (100) and a method for managing information relating to lifecycle of a vehicle are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing...

A System And A Method For Examining, Analysing, And Advising On Operating System Device Security

ABSTRACT A SYSTEM AND A METHOD FOR EXAMINING, ANALYSING, AND ADVISING ON OPERATING SYSTEM DEVICE SECURITY A system (100) and a method for analysing report relating to an operating system are disclosed. The system comprises a memory (102), a processor (104), an audit report generation module (106) configured t...

An Environment And A Method For Managing Digital Evidences

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING DIGITAL EVIDENCES An environment (100) and a method for managing digital evidences are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockchain network (10...

A Zero Trust Security System And A Method For Implenting The Same

ABSTRACT A ZERO TRUST SECURITY SYSTEM AND A METHOD FOR IMPLENTING THE SAME A zero trust security system and a method for implementing zero trust security system are disclosed. The zero trust security system comprises a user authentication unit configured to authenticate identity of one or more users, a device au...

A System And A Method For Identifying Genuine Products

ABSTRACT A SYSTEM AND A METHOD FOR IDENTIFYING GENUINE PRODUCTS A system (100) and a method for identifying genuine products are disclosed. The system comprises a first subsystem (102) available at a manufacturing facility. The first subsystem (102) comprises an input unit (202) configured to receive input fro...

An Environment And A Method For Managing Crop Protection Details

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING CROP PROTECTION DETAILS An environment (100) and a method for managing crop protection details are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockchain...

An Environment And A Method For Managing Supply Chain Information

ABSTRACT AN ENVIRONMENT AND A METHOD FOR MANAGING SUPPLY CHAIN INFORMATION An environment (100) and a method for managing supply chain information are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockcha...