|
GENERAL EQUIPMENT INC.
8724 Sunset Drive #191● Miami FL 33173 · USA
|
SECURE VOICE
TYPE: |
Crypting |
DESCRIPTION: |
Secure Voice |
PRICE: |
Upon Request |
PACKING: |
As is, where is |
SECURITY VOICE
Secure Voice is the most sophisticated solution to ensure your privacy during the conversation with remote partner
No matter if you are private person,
corporate or VIP: Secure Voice has a solution for you
Secure Voice is working against any GSM or landline voice interception
Even more: You personally are choosing
the desired level of security
With high grade of security, strong cryptographic protection and
certification the Secure Voice software makes you sure about your
confidential talks
The development of the Secure Voice lasts from 2001 and we have now a
wide range of devices as well as Landline version of the solution
During the 7 years of work we have assured that Secure Voice is the most
secure solution on the market
The time is a best proof and Secure Voice even in 2001 edition is still
stable and secure
The Secure Voice software is a
high security software for both mobile and landline communication with
up to 5 Layers of protection!
It uses RSA 2048 Master Keys Pair, RSA 1024 Session keys, AES 256,
Hardware Random generator and much more to ensure your privacy
The software is matching TOP SECRET level of confidence
Please read some notes from the
security authorities before proceeding to full specs:
RSA Laboratories currently recommends
key sizes of 1024 bits for corporate use and 2048 bits for extremely
valuable keys like the root key pair used by a certifying authority
The US Government announced that AES may
be used for classified information:
"The design and strength of all key lengths of the AES algorithm (i.e.,
128, 192 and 256) are sufficient to protect classified information up to
the SECRET level
TOP SECRET information will
require use of either the 192 or 256 key lengths
Here is full technical specification:
• Diffie-Hellman key exchange algorithm
• RSA 2048 Master Keys Pair
• Password authenticated key agreement
• MD5 digest algorithm
• Hardware Random Generator
• AES 256 bit symmetric data protection
• RSA 1024 asymmetric session keys
• RSA Streaming protection
• Man in the middle protection
• Triple combination of asymmetric and symmetric encryption
• Superior audio quality
• As low latency as possible on target network
• Random session key, replaced 10 times per second
• Compatible with land line solution*
* Compatibility with land line solution depends on target land line
network. Please read more information at
landline
section
Secure Voice Info
TYPE: Application
DESCRIPTION: Converstation Encryption software for Symbian Series 60 smartphones
Introduction: Secure Voice is the most sophisticated solution to ensure your privacy during the conversation with remote partner. No matter if you are private person, corporate or VIP: Secure Voice has a solution for you.
Secure Voice is working against any GSM or landline voice interception. Even more: You personally are choosing the desired level of security.
With high grade of security, strong cryptographic protection and certification the Secure Voice software makes you sure about your confidential talks.
The development of the Secure Voice lasts from 2001 and we have now a wide range of devices as well as Landline version of the solution.
The time is a best proof and Secure Voice even in 2001 edition is still stable and secure.
Compatibility: Nokia Series 60 3rd edition:
• Nokia N Series • Nokia N71 • Nokia N73 • Nokia N73 Music Edition • Nokia N75 • Nokia N76 • Nokia N77 * • Nokia N78 • Nokia N80 • Nokia N81 • Nokia N81 8GB* • Nokia N82 * • Nokia N91 • Nokia N91 8GB * • Nokia N93 • Nokia N93i * • Nokia N95 * • Nokia N95 8GB *
• Nokia E Series • Nokia E50 • Nokia E51 * • Nokia E60 • Nokia E61 • Nokia E61i * • Nokia E62 • Nokia E70 • Nokia E90 * • Nokia 6110 Navigator * • Nokia 6120 * • Nokia 6121 * • Nokia 6210 Navigator * • Nokia 6220 Classic * • Nokia 6290 *
Nokia S60 2nd Edition
• Nokia 6630 • Nokia 6680 • Nokia 6681 • Nokia N70 • Nokia N72 • Nokia N90
· Devices marked with asterisks have to be checked on compatibility with your GSM network first.
We have worked hard to make wide list of devices available for you to use with Secure Voice. However please be sure that the devices are compatible with Secure Voice on Your GSM Network.
Features: There are different versions of Secure Voice in order to suit wide range of customers. It is up to you to decide what level of security you need.
·
Compatibility with landline solution depends on target landline network.
Benefits: Secure Voice solution is one of the best on the market and has a number of advantages among other solutions.
1. Secure Voice is matching TOP SECRET level of confidence by all means. Please read more in the Security section.
2. Secure Voice is being used by the Government Organizations and Security Authorities since 2001. The time and the constant relations with our customers is the best proof of GSM Security solution.
We have a wide range of local distributors as well as country specific versions of our solutions. In case you are interested in the GSM Security topic you most probably already seen Secure Voice powered solution in your local language.
3. Secure Voice solution is compatible with top mobile devices from Nokia. No one will know that you are using special security device and you will enjoy native features of the mobile from Nokia.
4. The simple one-click interface lets you make secure calls in one shot.
Simplicity of use: First you can dial number manually or select from contacts. By pressing dial button the both Secure Voice devices begin connecting. On successful connection, the authentication begins. After connection and authentication is successful, the secure key exchange takes place. Afterwards your devices are in secure mode now, and you can talk!
|
Specification and photos are not contractual and are subject to verification upon inspection
TAKE NOTICE!
PLEASE BE ADVISED THAT INFORMATION INCLUDED IS CONFIDENTIAL IN NATURE AND IS BASED ON PRE-EXISTING BUSINESS RELATIONSHIP WITH THE LEGAL OWNER OF PROPERTY DESCRIBED HEREIN (IF APPLICABLE). AS SUCH, UPON RECEIPT OF SAID INFORMATION THE RECEIVER ACKNOWLEDGES THAT ANY UNAUTHORIZED CONTACT WITH SAID LEGAL SELLER WILL BE CHARACTERIZED AS A BREACH OF CONFIDENTIALITY AND SAID AGREEMENT MAY BE ENFORCED UNDER EXISTING LAW OR IN EQUITY.
This paper was prepared by
General Equipment Corp.
The paper represents an offer of a partner of General Equipment Corp.
All rights are reserved by and for General Equipment Corp..
All
content and ideas of this paper are the property of General Equipment Corp.
Defense
items are subject to final destination approval and granting of an
export license issued by exporting country's authorities