Pi-Control    Indigenous Cryptography and Identity Platform for



With the Pi-Control    platform, leading defence and government organizations are securing digital operations for their internal and external users using indigenous cryptography and identity technology


"With the help of Fortytwo Labs Pi-Control and I-AM technology we’ve secured successfully our internal and external  communications"

Official from government organization


Information Security Challenges

Information Security Challenges


Clutter of Point Solutions

Implementation of point solutions for each of the security concerns (viz. digital identity, authentication, authorization, encryption/ decryption, ESigning, Secure Remote Application Access) develops cracks between the applications, users, functional departments, and servers. Attackers are always on the lookout for such cracks that can be exploited within the digital operations of sensitive government operations.

Complex Key Management

Key management in PKI keeps armies of IT people busy, making PKI unscalable and not so friendly technology to expand into growing digital operation horizons of sensitive government departments.

Quantum Computing and Advanced Threats

Technologies that are designed to be secure only unless the very high magnitude of computing is available to attackers, are likely to fail soon with the advent of quantum computing. It's the time for sensitive government organizations to switch to cryptography and security technologies designed to protect against the odds of quantum computing driven advanced threats

Hidden Backdoors

In the recent past umpteen number of times it has been proven that some of the foundational Internet technologies have backdoors, which are a threat to national information security. Importance of indigenous cryptography and allied technology is now very critical.

Multiple Identities/ Identifiers

As the digital ecosystem grows, so do the digital participants within this ecosystem. We now have a growing number of humans, apps, cloud services, IoTs, enterprises now participating in digital operations of sensitive government organizations. Each of these participants have different ways to ascertain their identities and with multiple identifiers, making the contextual digital security extremely difficult.


ERP Connect Solution


Featured Solutions

Cryptographic Identity: I-AM Crypto-ID

A contextual self-sovereign cryptographic digital identity for people, and things that ensures identity is not absolute and is a moving concern over the lifecycle and timeline of the identity owner

Application and API Security: ACCESS42

Cryptographically secure remote access to internal as well as external applications using Crypto-ID enabled users, apps and devices. You can expose APIs by enabling them to be consumed only on performing Cryptographic authentication by participating users or apps

Secure Communication: CRYPTOGRAM

Ultra secure I-AM Crypto-ID based mobile messaging and chat mechanism. A perfect secure, indigenous alternative to Whatsapp, Wechat, Telegram, Signal etc.

Secure Data Storage: LOCK42 and CRYPTOSTORE42

LOCK42 secures data at rest by encrypting the data using I-AM Crypto-ID. LOCK42 uses the contextual dynamic encryption key derived directly from participating Crypto-IDs, rendering it impossible to break into. Share files securely using any channel using Crypto-ID based security

Secure Key Exchange

Securing key exchange between any two apps, users, devices, servers, digital services using Ci2 Quantum safe protocol

Multi-factor Authentication and Hardware Authenticator: AUTH42

Authenticate users, things, apps using any number of parameters on top of Crypto-ID of participating entities. One platform to set authentication policies and authentication matrix

IoT Security: IoT42

With the help of IoT42 you can cryptographically register the identity of IoT devices, authenticate IoT devices using Crypto-ID, authorize their operations as needed, encrypt/ decrypt data transfers between IoT devices cryptographically

Cryptographic eSignature

I-AM CI3 based Electronic Signature to ensure non-repudiation between the transacting entities on digital operations



Cryptographically secure instant messaging between internal and/ or external parties, with advanced features such as auto-destroyable messages. This is a secure indigenous alternative to Whatsapp, WeChat, Telegram etc

Screen Shot 2021-01-30 at 9.30.01 PM.png


Send, receive mission critical files using any Internet based file transfer mechanism without worrying about the security of the data contained with files or safety of data at rest. CRYPTOSTORE42 cryptographically secures data in transit and data at rest.

Screen Shot 2021-01-30 at 9.34.50 PM.png

Share on any channel of your choice,  using ready to use application/ or embed  java SDK inside your own application.

All files are electronically signed by sender  and receiver for authenticity of the sender  and detecting tampering of the data. The  data is decrypted ONLY after verifying the  digital signature of the sender, it can be  read (decrypted) only by the intended  receiver.


Multi-Factor Authenticator: AUTH42

Configure any level of Cryptographic authentication policy based on the context of the transaction security. Manage all Cryptographic authentication levels from one place.

Screen Shot 2021-01-30 at 9.16.33 PM.png

Hardware Authenticator

Indigenous hardware USB based Crypto Authenticator

Screen Shot 2021-01-30 at 9.31.52 PM.png

Hardware Authenticator: AUTH42


Cryptographically enable, authenticate, manage IoT devices across the network from single dashboard

Screen Shot 2021-01-30 at 9.25.24 PM.png

Application Layer Security

Problem Statement

Application layer security algorithms are not available or developed for providing application level security for use in key digital establishments. Encryption is carried out at physical level thereby restricting proliferation of software application. Non availability of application layer security is negatively impinging upon software security needs and proliferation of application software on internal networks.

Software solutions in key government establishments are lagging in security measures compared to business applications. Indigenous development and secure algorithms are not available to move towards cloud computing and distributed computing.

What does it take to secure applications at present?

Fundamental redesigning is needed in the way a digital service is being built and delivered. Else, the application security will remain dependent on several stakeholders and technology components like:

1. Developers – Secure Coding Practices

2. Pen testing Experts – find out every loophole in the security

3. SOC – To manage and deliver application securely

4. Security Architect – Overall application security considerations

5. Vendors – providing point solutions for each security needs

6. NOC - To manage security of network

7. Ethical hackers – to find out every loophole in the network

And the list can go on endlessly, while each of these components are critical for enterprise security and especially for state bodies the question arises about effectiveness of these operations in evolving the threat landscape.

Pi-Control     All -in-One Platform for Application Layer Security


Pi-Control     is (cryptographic) digital identity and (cryptographic) distributed platform that helps in creating, provisioning digital identities to users, enterprises, government services, things, devices, applications and data. It empowers the users with their digital identities and helps the service providers to create identity-based ecosystems to deliver secure, trusted digital services. Pi-Control based identity ecosystem is created, provisioned and executed based on the I-AM Crypto-ID Digital Identity model and technology.



Getting Started

people meeting-3245739_640.png

Join one of our Group Demo

magnifying-33170_640 Transaction Securit

Join our Workshop on Cryptographic Security


Schedule a Discovery Session