voice and data encryption over mobile networks july 2012 in-nova tecnologic in-arg sa mesh voip
Post on 28-Mar-2015
212 Views
Preview:
TRANSCRIPT
Voice and Data Encryption over mobile networks
July 2012
IN-NOVA TECNOLOGIC
IN-ARG SA
www.in-arg.com
MESH VOIP
1. Why secure mobile voice is needed
• GSM Net is hacked• Mobile internet can be intercepted• Internet connections takes the
cheapest way to transfer information
• Providers can do lawful interception• Foreign government can do lawful
interception
1. Customer needs In-Nova solutions
Users needs Secure communications in every place and every moment
Maximum security and trust in communication instruments
Advanced security settings easy to use and configure
Voice quality equal to normal calls
Encryption of voice, SMS, files on all kind of networks
Maximum security verifiable and certified
User friendly interface developed after years of development and experience in customer care
High quality of communication equal to or higher than normal calls and low delay
In Nova solutions
Problem✓ Operators do not give direct IP connection
between devices on different networks✓ Main limitations are
• Private IP address• “Rolling” IP address for mobile• NAT• Firewalling, etc.
✓ User identity and activity log cannot be hidden (e.g. for VIP closed User Group)
✓ Standard SIP protocol not designed for mobile networks
✓ Need to interconnect system/devices with different or legacy transport protocols (e.g. proprietary systems)
VoIPServer
Problem solving approach for secure network convergence
VoIPServer
VoIPServer
1. Secure Mobile VoIP Concept
VoIP ServerInterconnection for secure voice & data communication between IP devices
VoIP ServerModule
VoIP Server Module
VoIP ServerModule
Authentication and Key Management
User DB
Secure GatewayPipeComm allows protocol conversion and adaptation when required (e.g. PSTN to IP)
TerminalsDevices connected to VoIP Server• Mobile 2G/3G/WiFi• PSTN devices
2. Network Elements
BlackBerry communication services
• Secure Voice over IP
• Secure SMS
• Secure Data transmission, Local files transmission, secure chat, conference calls (Q4 2012)
Complete scalable system allowing integrators and operators to deliver secure voice, SMS and messaging services over the BlackBerry platform using End-To-End HW based encryption.
Secu
rity
HW token to guarantee high speed and strong security (256 bit key length or higher)
Proprietary service server
Independent Secure Clientarchitecture
VoIP Server
EncryptedSignaling
EncryptedSignaling
mSE
mSE
End-To-EndHW Encryption
2. Use Case
In Nova range consists in 4 kinds of mobile platformsaccording to the required security level
Software SecureApplication
Software SecurePhone Stack
COTSterminals
microSD onCOTS
Terminals
Hardware Security
Software Security
CD
BA
Software secure application on COTS terminals with microSD (eg. Nokia, Windows Mobile, etc.)
Software secure application on COTS terminals (eg. Nokia, Windows Mobile, Android, etc.)
Software secure phone stack (OS and applications) on COTS terminals (eg. Motorola)
Software secure phone stack on COTS terminals with microSD (BlackBerry)
SECURITY
3. Mobile Platforms
4. API overview
5. World wide connections
VoIP Server Module
Internet
5. Satellite Worldwide Connection
Portable System
Car System
Satellite
WiFi
WiFi
Sat Link
Sat Link
VoIP Server
IP o
ver Sa
t
IP o
ver
Sat
Ground Station
Marine System
9. Multiple Groups
Users DH User Manual Key
Group (A)Diffie Hellmann
Group (B)Manual Keys
USR 1USR 2
User DB (A) User DB (B)
USR 3USR 4
USR N
Authentication and
Key Management (B)
Inter-ForceMnaual Key
USR 1
USR 2
USR 3USR 4
USR N
Account (A)
Account (B)
Manual Key
In Nova SMS
AES 256 encryption algorithm of SMS text messages Encryption keys manually keyed in or automatically
generated during each crypto call Possibility to send Flash crypto SMS that are automatically
erased after the decryption Authentication for reading and writing secure SMS Groups of crypto contacts for group distribution of secure
commands Crypto contacts
In Nova SMS
Possibility to receive clear SMS from crypto contacts that are immediately encrypted on phone after the reception
Remote wiping of entire phone and memory card in case of theft Alarm for unauthorized SIM replacement with an SMS with
geographic GPS coordinates to localize phone Localization function through crypto SMS commands which return
the coordinates of the GSM cell connected to the phone Visualization of coordinates received directly on mobile maps
All Chip´s In Nova version are be installed on a μSD card with EAL5+ smartcard inside with the software license, random generation and hardware encryptionThe μSD card can be adopted to customer requirements, planned first customer shipments Q 2013
μSD Card
Thanks for your attention
In-Nova TECNOLOGIC 25 de Mayo 271 4º P- Cordoba TE/Fax +54 351 4872574
www.in-arg.cominfo@in-arg.com
top related