What makes the BicDroid solution different?
Our innovative solutions differentiate BicDroid in many ways. They are based on our 6 pillar technologies, some of which are breakthroughs on their own.
One breakthrough is our Smart Integration of MAC and Encryption (SIME) process. Intelligently integrating the latest Mandatory Access Control (MAC) processes used to manage classified government documents with our patented post-quantum secure encryption technology and Behavior Intelligence, BicDroid's SIME solution protects your data anywhere, anytime, and against all malicious attacks.
These technologies, together with our Fingerprinting, Policing Drivers, Post-Quantum Secure Key Management, Behaviour Intelligence and Real-Time Reporting & Alerts, deliver unparalleled security.
The next generation of Top-Secret level data security is here, available to all.
Contact our data security engineer
BicDroid’s system provides genius-level protection.
- U/A - User/Application
- P - Process
- PQSKM - Post Quantum Secure Key Management
- MAC - Mandatory Access Control
BicDroid offers a suite of solutions:
Corporate/Mobile Office
Quarantined Work Space
BicDroid’s Quarantined Work Space is the solution for guaranteed corporate/mobile office protection.
Learn MoreServer Edition
QDocument/SE
BicDroid’s Server Edition is the solution for guaranteed server-side data and cyber protection.
Learn MoreEnd-Point Edition
QDocument/EE
BicDroid’s End-point Edition is the client-side solution for guaranteed data and cyber protection.
Learn MoreTransmission Edition
QDocument/TE
BicDroid’s Transmission Edition is the secure sharing solution for any transmission channels including public clouds.
Learn MoreDevelopment Kit
QDocument SDK
The QDocument SDK empowers our partners with BicDroid's post quantum data security.
Learn MoreMessaging Platform
BicDroid QM
Secure, instant messaging with email integration - manage group permissions across all devices.
Learn MoreBicDroid's products are protected by the following patents:
Code Recovery and Remote Authentication
- US 9,832,016 (Nov 28, 2017)
- US 9,576,149 (Feb 21, 2017)
- EP 3451575 (Jan 6, 2021)
- UK 3451575 (Jan 6, 2021)
- FR 3451575 (Jan 6, 2021)
- IT 3451575 (Jan 6, 2021)
- DE 3451575 (Jan 6, 2021)
Encryption on a Plurality of Devices
- US 9,619,667 (Apr 11, 2017)
- EP 3155754 (Oct 24, 2018)
- DE 3155754 (Oct 24, 2018)
- UK 3155754 (Oct 24, 2018)
- FR 3155754 (Oct 24, 2018)
- ES 3155754 (Oct 24, 2018)
- IT 3155754 (Oct 24, 2018)
- CN ZL 201580043471.3 (Apr 3, 2020)
- HK 3451575 (Jan 6, 2021)
Encryption Key Generation and Management
- US 9,703,979 (Jul 11, 2017)
- CA 2,988,628 (Jul 9, 2019)
- CN ZL 2016800472527 (Apr 24, 2020)
- HK 1253831 (Feb 11, 2021)
Policing Processes Accessing Encrypted Data
- US 11,528,142 (Dec 13, 2022)
- CN ZL 201780062120.6 (Jun 10, 2022)
Access Control in Trusted Execution Environments
- US 11,093,604 (Aug 17, 2021)
Access Control in Operating Systems
- US 11,126,754 (Sep 21, 2021)
Image Management
- US 10,031,928 (Jul 24, 2018)
- CN ZL 201580047238.2 (Mar 13, 2020)
Image Similarity
- US 10,026,009 (Jul 17, 2018)
Image Model
- US 9,245,354 (Jan 26, 2016)
Data Sentry
- US 11,693,981 (Jul 4, 2023)
Optimal Key Management
- US 11,533,167 (Dec 20, 2022)
Web Protection
- CN ZL 201911344191.2 (Feb 23, 2022)
Quarantined Work Space
- US 11,822,643 (Nov 21, 2023)