PRODUCTS

Our LIME Tag™ and Veridify™ solutions protect your assets and provide critical user and market data. Monitor your products or property with our highly-secure, low-cost, passive, battery-assisted, and active wireless sensors using traditional RFID readers or our NFC Smartphone solutions. readmore

TECHNOLOGY

Asymmetric and symmetric security protocols to address very low-resource computing environments using the world’s first linear-in-time methods and standards-based cryptographic protocols. Our secure solutions address authentication, confidentiality and privacy, integrity, and repudiation for the Internet of Things. readmore

MARKETS

Our secure NFC, RFID and powered-sensors can monitor your liquor, food, microelectronics, pharmaceutical, or high-fashion products and supply chain. We address authentication for mobile payment platforms, vehicles, the Smart Grid, and other low-power computing devices and sensors that make up the Internet of Things. readmore
  • PARTNERS

      Our LIME Tag™ and Veridify™ solutions protect your assets and provide critical user and market data. Monitor your products or property with our highly-secure, low-cost, passive, battery-assisted, and active wireless sensors using traditional RFID readers or our NFC Smartphone solutions. readmore
  • TECHNOLOGY

      Asymmetric and symmetric security protocols to address very low-resource computing environments using the world’s first linear-in-time methods and standards-based cryptographic protocols. Our secure solutions address authentication, confidentiality and privacy, integrity, and repudiation for the Internet of Things. readmore
  • MARKETS

      Our secure NFC, RFID and powered-sensors can monitor your liquor, food, microelectronics, pharmaceutical, or high-fashion products and supply chain. We address authentication for mobile payment platforms, vehicles, the Smart Grid, and other low-power computing devices and sensors that make up the Internet of Things. readmore