Rahul Gupta

Rahul Gupta

False Base Station Detector

Technical Description The technology relates to a system for detecting false base stations (FBS) in network attack to significantly increase the speed and responsiveness of wireless networks. Problems Addressed Vulnerable FBS Attacks Need of Location Privacy Inefficient Conventional Techniques Authentication…

Secured Peer-To Peer Connection

Technical Description The technology introduces a secured and lightweight communication system to establish peer-to-peer connection through fast handshaking technique between multiple stations, including mobile phones, cars, smart televisions, tablets, and other IoT devices. Problems Addressed Data Integrity Issues Lack of…

Web Security Proxy

Technical Description The present invention provides a bidirectional interception proxy system that transparently parses HTTP traffic to mitigate XSS and SQL injection attacks in web applications. Problems Addressed Insecure Web Applications Vulnerable Data Channels Easy Exploitability of Attacks Weak XSS…

Marine Mesh Network

Technical Description This invention establishes dynamic, long-range Wi-Fi system enabling real-time vessel tracking and seamless multi-boat communication across fishing clusters. Problems Addressed Inadequate Vessel Tracking Costly Communication Systems Poor Emergency Response Limited Inter-Vessel Coordination Weak Shore Connectivity Affordability Barrier Tech…

Pandemic-Aware Surveillance

Technical Description A responsive robotic surveillance system designed to automate public monitoring and enable safe, real-time interaction and awareness—especially during health emergencies. Problems Addressed Risky Manual Surveillance Limited Social Distancing Inefficient Human Interaction High Viral Exposure Lack of Automated Monitoring…

Enhanced Block-Chain Scalabilty

Technical Description The invention describes a block chain system for block operation, combining pre-computed states from succeeding blocks with current transactions. This helps in obtaining a state for storage in a next succeeding block. Then a consensus protocol is used…

Turbulent Flow Optimization

Technical Description The technology focuses on improving control strategies to prevent oscillatory instabilities in turbulent systems. It works by analyzing the flow of the system, identifying critical dynamics that leads to instability, and disrupting these critical dynamics to prevent the…

Electronic Detector for Explosives

Technical Description The technology provides a cutting edgesolution for detecting explosives, offering a versatile tool for security applications. It combines innovative design with advanced detection methods for enhanced safety and reliability. Problems Addressed Complex System Low Sensitivity Inaccurate Detection Bulky…

Ballistic Shielding System

Technical Description The technology introduces a ballistic shielding system designed for immediate deployment in rescue and vigilance situations, providing protection from both the front and side sections, as well as top edge. Problems Addressed Deployment Difficulties Limited Protection Limited Mobility…

Biometric Identification System

Technical Description The technology offers a portable biometric identification system, enabling secure and reliable authentication across various sectors, ensuring compatibility with existing databases and producing lawful evidence for authorized users. Problems Addressed Bulky in Size Lack of Accessibility in Remote…

Subscribe to Our Latest Updates!

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

Intellectual Property Rights | Technology Monetization | IP Merger & Acquisition- IP Bazzaar will use the information you provide on this form to be in touch with you and to provide updates and marketing.