SCI Products for Access Control and Confidentiality Assurance


Eliminate the vulnerabilities associated with password based authentication

Simple User Based Resource Oriented Segmentation Architecture – Introducing SUBROSA® users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen.

Secure, zero-knowledge cryptographic keys

SUBROSA® users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen. Threats Posed by Brute Force Attacks are all but eliminated without the original, unchanged data resource and knowledge of the personal interaction pattern.

Use Cases

SUBROSA® Desktop
Authentication for Active Directory, SSO or LDAP.

SUBROSA® technology to secure the Cloud.

Change the way employees authenticate to mobile applications.

Five Factor Authentication
SUBROSA® supports true multifactor authentication (MFA), enabling accounts to be protected with a knowledge factor credential and any combination of possession, human inherence (biometric), machine inherence and location factors.

Technical Details

SUBROSA® Specifications and Support
Operating Systems, Desktop: Windows 7, 8, 8.1, 10
Operating Systems, Server (future): Windows Server 2008, 2012
Development Libraries: .NET, Java, APK, C#

Try the SUBROSA® Interactive Demo:


Watch an early SUBROSA® demonstration by CEO Richard Blech:



Proximity Technologies Defined

Proximity-based information leverages the ubiquity of mobile computing devices to support your mission and business intelligence needs. It presents a broad spectrum of applicability, limited only by your imagination. Supported use cases include passive surveillance, logistics support and location-based authentication and authorization.

Observe, Orient, Decide, Act

Proximity-based technology supports many use cases. Current wireless communication standards are integrated, enabling solutions to specific operational to be developed, scaled and deployed rapidly and cost-effectively. And since MFDs interact with mobile devices either via an application installed by the device owner/user or by passively collecting data emitted by the device (e.g., wireless probe requests), these solutions avoid conflicts with privacy laws and regulations.

Use Cases

Networks for the Internet of Things

In the Internet of Things, nothing is more important than the breadth, depth, and reach of your network. Our IoT devices can help you extend and enhance the quality and quantity of data you have about your business, network, resources and critical supplies or staff.

Asset and Staff- Tracking and Reporting with IoT

Knowing where your high-value assets are and what they’re doing can help your business become more efficient. Our Asset Tracking and Management IoT solutions let you do just that.

IoT Technology and Services

Not sure where to start? Our dedicated team offers a vast array of services. From project design to help you determine which devices and objects need to be connected, to providing recommendations for the platforms you need to get the best information out of those devices.

Monitoring and Management

IoT solutions and connected machines make it easier to collect actionable data about your entire operation, helping you improve processes and efficiency. With our Smart-Monitoring and Management solution, you can wirelessly connect devices, sensors and systems wherever they’re located.


Proximity technology solutions are powered by Multi-Function Devices (MFD) capable of communicating via Bluetooth, WiFi, NFC and RFID. These MFDs operate in multiple modes, as one-way emitters, passive data collectors, or bidirectionally, emitting and collecting data. Custom applications can be developed to work with MFDs, performing specified actions based on operational need. Collected data is either transmitted to aggregation and analytics platforms in real-time, or is stored onboard for asynchronous analysis.

Technical Details

Operating System



Proximity Marketing Beacon, Mobile Wallets, Mobile Loyalty/Coupons, Workforce Management, Access Control, Identity Verification, Mobile Check-Ins

Bluetooth LE Features

BLE 5.0, Apple iBeacon, Google Eddystone, Custom Profile L2CAP, ATT, GATT, GAP, Peripheral & Central Mode

MFD/Beacon Form Factor

Multiple options available. Size and weight depends on communications capability, onboard storage capacity and power source.

Beacon Wireless Communications Capabilities

Bluetooth , WiFi, NFC, RFID

Beacon Compatibility

iBeacon, Eddystone

Beacon Power

Power over Ethernet (PoE)


{approx . two year lifespan)