AUTHENTICATION

SCI Products for Access Control and Confidentiality Assurance
SUBROSA

SUBROSA©

Eliminate the vulnerabilities associated with password based authentication

Simple User Based Resource Oriented Segmentation Architecture – Introducing SUBROSA©.
SUBROSA© is our access authorization and password replacement web service that helps companies eliminate the vulnerabilities associated with password-based authentication.

Secure,
zero-knowledge cryptographic keys

SUBROSA© users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen. Threats Posed by Brute Force Attacks are all but eliminated without the original, unchanged data resource and knowledge of the personal interaction pattern.

What are the vulnerabilities associated with password-based authentication?

Password-based authentication is generally fully exploitable. Single-factor authentication can no longer hold up to today’s sophisticated attacks. The problem is not the password’s complexity, but the length. The computers that are doing brute force attacking use random number generators that can quickly cycle through enough combinations to crack the typical four to twelve-character passwords in hours, sometimes minutes. Even password with a mix of symbols, upper and lower, etc., are just not long enough.

Our approach it is to produce a super long password of around 65,000 characters through SUBROSA©, which would take billions of years to crack through brute force. It’s very easy for the user, as they create a personal interaction pattern that generates keys securely.

SUBROSA

Endpoint Multi-Factor Authentication (MFA) Software that’s stronger and easier to
remember than passwords:

  • Intuitive and fun – Allows users to choose their own images and select their own unique interaction pattern
  • Strong – Based on the user’s pattern SUBROSA© automatically generates a very long and difficult to hack, authentication key
  • Flexible – Allows for up to 5 authentication factors

Use Cases

SUBROSA© Desktop
Authentication for Active Directory, SSO or LDAP.

SUBROSA© Cloud
SUBROSA© technology to secure the Cloud.

SUBROSA© Mobile
Change the way employees authenticate to mobile applications.

Five Factor Authentication
SUBROSA© supports true multifactor authentication (MFA), enabling accounts to be protected with a knowledge factor credential and any combination of possession, human inherence (biometric), machine inherence and location factors.

Advantages:

  • Integrates seamlessly with OS, app or device authentication workflows
  • Eliminates the need for insecure password storage
  • Defeats cracking, shoulder surfing, social engineering and phishing
  • Interoperable with enterprise key management systems
  • Integrates with possession/token, biometric and location based authentication factors

Technical Details

SUBROSA© Specifications and Support
Operating Systems, Desktop: Windows 7, 8, 8.1, 10
Operating Systems, Server (future): Windows Server 2008, 2012
Development Libraries: .NET, Java, APK, C#

Try the SUBROSA© Interactive Demo:

SUBROSA Demo

Watch an early SUBROSA© demonstration by CEO Richard Blech:


PROXiMITER

PROXiMITER

Proximity Technologies Defined

Proximity-based information leverages the ubiquity of mobile computing devices to support your mission and business intelligence needs. It presents a broad spectrum of applicability, limited only by your imagination. Supported use cases include passive surveillance, logistics support and location-based authentication and authorization.

Observe, Orient, Decide, Act

Proximity-based technology supports many use cases. Current wireless communication standards are integrated, enabling solutions to specific operational to be developed, scaled and deployed rapidly and cost-effectively. And since MFDs interact with mobile devices either via an application installed by the device owner/user or by passively collecting data emitted by the device (e.g., wireless probe requests), these solutions avoid conflicts with privacy laws and regulations.

Use Cases

Networks for the Internet of Things

In the Internet of Things, nothing is more important than the breadth, depth, and reach of your network. Our IoT devices can help you extend and enhance the quality and quantity of data you have about your business, network, resources and critical supplies or staff.

Asset and Staff- Tracking and Reporting with IoT

Knowing where your high-value assets are and what they’re doing can help your business become more efficient. Our Asset Tracking and Management IoT solutions let you do just that.

IoT Technology and Services

Not sure where to start? Our dedicated team offers a vast array of services. From project design to help you determine which devices and objects need to be connected, to providing recommendations for the platforms you need to get the best information out of those devices.

Monitoring and Management

IoT solutions and connected machines make it easier to collect actionable data about your entire operation, helping you improve processes and efficiency. With our Smart-Monitoring and Management solution, you can wirelessly connect devices, sensors and systems wherever they’re located.

PROXiMITTER® Use Case

Proximity technology solutions are powered by Multi-Function Devices (MFD) capable of communicating via Bluetooth, WiFi, NFC and RFID. These MFDs operate in multiple modes, as one-way emitters, passive data collectors, or bidirectionally, emitting and collecting data. Custom applications can be developed to work with MFDs, performing specified actions based on operational need. Collected data is either transmitted to aggregation and analytics platforms in real-time, or is stored onboard for asynchronous analysis.

Technical Details

Operating System

Embedded

Applications

Proximity Marketing Beacon, Mobile Wallets, Mobile Loyalty/Coupons, Workforce Management, Access Control, Identity Verification, Mobile Check-Ins

Bluetooth LE Features

BLE 5.0, Apple iBeacon, Google Eddystone, Custom Profile L2CAP, ATT, GATT, GAP, Peripheral & Central Mode

MFD/Beacon Form Factor

Multiple options available. Size and weight depends on communications capability, onboard storage capacity and power source.

Beacon Wireless Communications Capabilities

Bluetooth , WiFi, NFC, RFID

Beacon Compatibility

iBeacon, Eddystone

Beacon Power

Power over Ethernet (PoE)

Battery

{approx . two year lifespan)