AUTHENTICATION

SCI Products for Access Control and Confidentiality Assurance
SUBROSA

SUBROSA©

Eliminate the vulnerabilities associated with password based authentication

SUBROSA© is our access authorization and password replacement web service that helps companies eliminate the vulnerabilities associated with password-based authentication.

Turns users photos/images into a long authentication key – thwarting hackers and socially engineering

Simple User Based Resource Oriented Segmentation Architecture

SUBROSA  users choose unique data resources to generate their keys and establish a personal interaction pattern with the resource. This relationship is intuitive and easily memorized, but not readily shared or stolen.

SUBROSA makes creating and remember fun and memorable, unlike alphanumeric passwords that are inherently diffuclt to create and even harder to remember or update.

Brute Force attacks are all but eliminated since only the owner knows what images they chose, what order they chose them in, and how many they chose.

What are the vulnerabilities associated with password-based authentication?

Single-factor authentication using passwords alone can no longer can no longer hold up to today’s sophisticated attacks. 

Today’s attackers have access to powerful and sophisticated tools that use a combination of Dictionary and Brute Force attacks.

Dictionary attacks immeditely search common passwords, dictionary words, and combinations of both. 

Brute Force attacks utilize random number generators to attempt every possible password inn rapid succession.   

Even passwords with a mix of symbols and upper and lower case letters will not hold up to a dteremined attacker who can cycle through enough combinations to crack the typical four to twelve character passwords in hours, sometimes minutes.

The problem is not the password’s complexity, but the length of the password.

Our approach it is to simplify the authentication process by allowing users to create a memorable password based on their customized choice of pictures/images which SUBROSA in turn converts into a 65,000+ character authentication key rendering Brute Force and Disctionary attacks fruitless.

SUBROSA

SUBROSA

  • Intuitive and fun – Allows users to choose create a unique login only they would know that’s personal to them
  • Strong – Surpasses the strength of passwords and thwarts social engineering attacks as it key creates an incredibly long authentication key that is not derived from words, letters, special characters or any keystrokes on a keyboard that could be observed or keylogged. 

Use Cases

SUBROSA© Desktop
Authentication for Active Directory, SSO or LDAP.

SUBROSA© Cloud
SUBROSA© technology to secure the Cloud.

SUBROSA© Mobile
Change the way employees authenticate to mobile applications.

 

Advantages:

  • Integrates seamlessly with OS, app or device authentication workflows
  • Eliminates the need for insecure password storage
  • Defeats cracking, shoulder surfing, social engineering and phishing
  • Interoperable with enterprise key management systems
  • Can be integrated with other possession/token, biometric and location based authentication factors

Technical Details

SUBROSA© Specifications and Support
Operating Systems, Desktop: Windows 7, 8, 8.1, 10
Operating Systems, Server (future): Windows Server 2008, 2012
Development Libraries: .NET, Java, APK, C#
Try the SUBROSA© Interactive Demo:
SUBROSA Demo
Watch an early SUBROSA© demonstration by CEO Richard Blech:

PROXiMITER

PROXiMITER

Proximity Technologies Defined

Proximity-based information leverages the ubiquity of mobile computing devices to support your mission and business intelligence needs. It presents a broad spectrum of applicability, limited only by your imagination. Supported use cases include passive surveillance, logistics support and location-based authentication and authorization.

Observe, Orient, Decide, Act
Proximity-based technology supports many use cases. Current wireless communication standards are integrated, enabling solutions to specific operational to be developed, scaled and deployed rapidly and cost-effectively. And since MFDs interact with mobile devices either via an application installed by the device owner/user or by passively collecting data emitted by the device (e.g., wireless probe requests), these solutions avoid conflicts with privacy laws and regulations.

Use Cases

Networks for the Internet of Things

In the Internet of Things, nothing is more important than the breadth, depth, and reach of your network. Our IoT devices can help you extend and enhance the quality and quantity of data you have about your business, network, resources and critical supplies or staff.

Asset and Staff- Tracking and Reporting with IoT

Knowing where your high-value assets are and what they’re doing can help your business become more efficient. Our Asset Tracking and Management IoT solutions let you do just that.

IoT Technology and Services

Not sure where to start? Our dedicated team offers a vast array of services. From project design to help you determine which devices and objects need to be connected, to providing recommendations for the platforms you need to get the best information out of those devices.

Monitoring and Management

IoT solutions and connected machines make it easier to collect actionable data about your entire operation, helping you improve processes and efficiency. With our Smart-Monitoring and Management solution, you can wirelessly connect devices, sensors and systems wherever they’re located.

PROXiMITTER® Use Case

Proximity technology solutions are powered by Multi-Function Devices (MFD) capable of communicating via Bluetooth, WiFi, NFC and RFID. These MFDs operate in multiple modes, as one-way emitters, passive data collectors, or bidirectionally, emitting and collecting data. Custom applications can be developed to work with MFDs, performing specified actions based on operational need. Collected data is either transmitted to aggregation and analytics platforms in real-time, or is stored onboard for asynchronous analysis.

Technical Details

Operating System

Embedded

Applications

Proximity Marketing Beacon, Mobile Wallets, Mobile Loyalty/Coupons, Workforce Management, Access Control, Identity Verification, Mobile Check-Ins

Bluetooth LE Features

BLE 5.0, Apple iBeacon, Google Eddystone, Custom Profile L2CAP, ATT, GATT, GAP, Peripheral & Central Mode

MFD/Beacon Form Factor

Multiple options available. Size and weight depends on communications capability, onboard storage capacity and power source.

Beacon Wireless Communications Capabilities

Bluetooth , WiFi, NFC, RFID

Beacon Compatibility

iBeacon, Eddystone

Beacon Power

Power over Ethernet (PoE)

Battery

{approx . two year lifespan)