ABSTRACT
SYSTEM AND METHOD FOR DETECTING ANOMALIES IN A SYSTEM
A system and a method for detecting anomalies in a system are disclosed. The system comprises a log analysis unit (102) configured to analyse log in the system, a port scanning unit (104) configured to scan ports present in the system, a firewall sta...
ABSTRACT
SYSTEM AND METHOD FOR GATHERING INFORMATION ABOUT UNAUTHORISED PERSON
A system and a method for detecting unauthorised users are disclosed. The system (200) comprises one or more sources configured to detect information about the unauthorised user and a network attack detection unit (212) configured to ...
ABSTRACT
SYSTEM AND METHOD FOR ANALYZING SLACK SPACE
A system and a method for analysing slack region (204) are disclosed. The system comprises a memory (102), wherein the memory comprises a data region (202) configured to store user data, a slack space (204) configured to store leftover data. The system furthe...
ABSTRACT
SYSTEM AND METHOD FOR ANALYSING USER HISTORY
A system and a method for determining user history are disclosed. The system comprises an input unit (102) configured to receive input regarding a search string from a user, a memory (104) configured to store user history, wherein the user history includes we...
ABSTRACT
SYSTEM AND METHOD FOR IDENTIFYING ATTACKS FROM DIFFERENT ROUTES IN A NETWORK
A system and a method for identifying attacks from different routes in a network are disclosed. The system comprises a host detector configured to determine a list of devices connected to the network, a host scanner configured ...
ABSTRACT
SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED USERS USING DATA FORENSICS
A system (100) and a method for identifying unauthorized user are disclosed. The system comprises a server (102), a network (106), a plurality of user devices (104) connected to the server via the network and a hardware-based storag...
ABSTRACT
USB BASED SYSTEM AND METHOD FOR EXAMINATION OF DATA PACKETS
A USB (Universal Serial Bus) based system and a method for examining data packets passing via a network is provided. The system comprises a server, a plurality of user devices configured to send data packets via the network. The network compris...
ABSTRACT
SYSTEM AND METHOD FOR DETECTING UNAUTHORIZED USERS USING EMAIL FORENSICS
A system and a method for detecting unauthorized user are disclosed. The system comprises a server, a network, a plurality of user devices connected to the server via the network, wherein the plurality of user devices is configured...
ABSTRACT
OPERATING SYSTEM INDEPENDENT AND FILE INDEPENDENT COMPUTER SYSTEM AND METHOD FOR AUTHENTICATING A USER
An Operating system independent and file independent computer system and a method for authenticating a user are disclosed. The computer system comprises a memory (102), a preference generator (106) con...
ABSTRACT
SYSTEM AND METHOD FOR ENCRYPTING HIDDEN FILES
A system and a method for encrypting hidden files or folders are provided. The system (100) comprises a file storage unit (108) configured to store at least one file or a folder, a file hiding unit (106) configured to hide the stored at least one file or fol...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING DOCUMENTS IN A DISTRIBUTED LEDGER
An environment (100) and a method for managing documents in a distributed ledger are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing d...
ABSTRACT
A SYSTEM AND A METHOD FOR PREVENTING DENIAL OF ATTACK (DoS) ATTACKS
A system (100) and a method for preventing denial of service attacks are disclosed. The system (100) comprises a server (102), a network (106), a plurality of computing devices (104) configured to establish a connection with the serv...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING RENEWABLE ENERGY INFORMATION
An environment (100) and a method for managing renewable energy information in a distributed ledger are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality ...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING LIFECYCLE OF A VEHICLE
An environment (100) and a method for managing information relating to lifecycle of a vehicle are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing...
ABSTRACT
A SYSTEM AND A METHOD FOR EXAMINING, ANALYSING, AND ADVISING ON OPERATING SYSTEM DEVICE SECURITY
A system (100) and a method for analysing report relating to an operating system are disclosed. The system comprises a memory (102), a processor (104), an audit report generation module (106) configured t...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING DIGITAL EVIDENCES
An environment (100) and a method for managing digital evidences are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockchain network (10...
ABSTRACT
A ZERO TRUST SECURITY SYSTEM AND A METHOD FOR IMPLENTING THE SAME
A zero trust security system and a method for implementing zero trust security system are disclosed. The zero trust security system comprises a user authentication unit configured to authenticate identity of one or more users, a device au...
ABSTRACT
A SYSTEM AND A METHOD FOR IDENTIFYING GENUINE PRODUCTS
A system (100) and a method for identifying genuine products are disclosed. The system comprises a first subsystem (102) available at a manufacturing facility. The first subsystem (102) comprises an input unit (202) configured to receive input fro...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING CROP PROTECTION DETAILS
An environment (100) and a method for managing crop protection details are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockchain...
ABSTRACT
AN ENVIRONMENT AND A METHOD FOR MANAGING SUPPLY CHAIN INFORMATION
An environment (100) and a method for managing supply chain information are disclosed. The environment comprises a plurality of computing devices (102), a plurality of users (104) operating the plurality of computing devices, a blockcha...