- DARPAN Series 3 (S3) Network Management System
- C-DAC's eSign service
- Fingerprint Extractor
- Fingerprint Matcher
- Slap Segmentation
- Fingerprint Classification
- Fingerprint Template Converter
- Fingerprint Quality Analysis
- Iris IIR Generator
- Iris Matcher
- Biometric Attendance System
- Performance Evaluation TestBed
- Face Authentication System
- AppSamvid
- USB Pratirodh
- Browser JSGuard
- Application and Device Control (ADC)
- M-Kavach
- True random number generator
- Disk Forensic tools
- Network Forensics Tools
- Mobile Forensics Tools
- Advik CDRAnalyzer
- SIMXtractor -SIM Card Imaging & Analysis Tool
- Win-LiFT Windows Based Live Forensics Tool
- TrueTraveller
- TrueImager
The Network Management System (DARPAN S3 NMS) is a policy based autonomic network and cloud management suite of solutions for heterogeneous multi-vendor IP networks and developed is based on ITU - T recommended FCAPS Model which includes the following areas:
Read more
C-DAC has developed e-Hastakshar - C-DAC's eSign service that facilitates instant signing of documents online by citizens in a legally acceptable form.
Read more
Extracts the level II (minutiae points) from the fingerprint image and converts into standard template.
Read more
Performs Verification and Identification.
Read more
Processes a single image containing four fingerprint images (or two thumb impression) and divides it into four images (or two images) of the individual fingers.
Read more
Classify fingerprint database in Arch, Left Loop, Right Loop and whorl classes.
Read more
Converts the template from one standard to another standard.
Read more
Accessing the quality of the fingerprint image
Read more
Converts the iris image into type K1, K3 and K7.
Read more
Performs the verification and identification using iris modality.
Read more
Centralized, web-based Biometric Attendance System (using Iris or Fingerprint for marking the attendance)
Read more
Used for Performance Evaluation of Biometric SDKs.
Read more
This is a system in which two face photos are matched to verify the identity of a person. This system is also called as face verification system
Read more
Endpoint Security
AppSamvid is application whitelisting software for Windows based PCs. This software is available in standalone version and helps to protect from threats through unknown applications/malware.
Read more
USB Pratirodh is a software solution which controls unauthorized usage of portable USB mass storage devices like pen drive, external hard drives, cell phones, IPods, camera.
Read more
Browser JSGuard is a browser extension which detects and defends malicious HTML & JS attacks made through the web browser based on Heuristics.
Read more
This is an end point security solution with centralized management to whitelist applications and also control USB mass storage devices.
Read more
M-Kavach is a comprehensive mobile device security solution for Android devices addressing various threats related to mobile phones.
Read more
Web Application Security
TRNG uses FPGA based ring oscillator as a source of entropy. Random bit stream generation rate - 100MBPS Post processing with von Neumann corrector to eliminate bias in input bits
Read more
Cyber Forensics
TrueBack enables the user to create a Bit Stream duplicate of a storage media to another media as an image file. CyberCheck is a tool for data recovery & analysis and documenting digital evidence.
Read more
NeSA (Network Session Analyzer) re-constructs different network sessions from captured packets and enables to collect sensitive digital evidence from these packets, thereby helps Law Enforcement Agencies to investigate Cyber Crimes committed over networks.
Read more
MobileCheck is a forensic acquisition and analysis tool for Mobile phones and Smart phones. The imaging module helps to perform acquisition of exhibit devices and the analysis module helps to analyze the acquired image for discovering and recovering digital evidence.
Read more
Advik is a Call Data Record Analyzer which can import and analyze CDR/Tower CDR logs of any service provider in India and generate a comprehensive report of frequency statistics including service provider details and subscriber details(SDR)* of CDR Numbers.
Read more
SIMXtractor is a forensic solution for imaging and analyzing SIM cards. The tool suite contains a SIM Card Reader, SIM Imager (Imaging of SIM cards) and SIM Analyzer (Analysis of SIM cards). The tool works with both GSM and CDMA SIM
Read more
Win-LiFT 2.0 is a Windows Based Live Forensics Tool consisting of Win-LiFTImagerBuilder and Win-LiFT Analyzer. Live Forensics involves acquisition of volatile data from the Suspect's machine and analysis of the acquired data. Win-LiFT 2.0 enables volatile data acquisition using Win-LiFTImager, a tool that can be built with Win-LiFTImagerBuilder, and analysis using Win-LiFTAnalyzer.
Read more
Portable Forensic Tool Kit TrueTraveller is a complete solution for performing digital forensics Seizure, Acquisition and Analysis. The Product includes a Laptop with software tools installed and an integrated disk imaging hardware solution.
Read more
TrueImager is a high speed, light weight, portable handheld device capable of performing Seize, Seize & Acquire and Cloning operations on storage media. The unit also supports Wiping and Formatting of Destination disk. The tool generates Report in USB disk. Report printing is also possible through serial printer.
Read more