Nanoteq's Code Voice Mobile handset adds security to mobile trafic.

Dec '99 IT infrastructure

It is estimated that, in most developed countries, the volume of mobile telephone traffic now equals the volume in fixed networks. As mobile traffic continues to increase, the use of fixed services is likely to become the exception rather than the rule. Users demand mobility, a single number and unlimited coverage, and handset and network designers are increasingly meeting these needs.

In line with this, Nanoteq is securing mobile telephone traffic with the release of the CodeVoice Mobile handset.

Eavesdropping is still a problem

However, says Nanoteq Communications Security Product Manager Chris Burger, the same security problems that plague fixed networks are also evident in mobile networks. The design target for the GSM system’s cryptography is a good example. While the probability of fraud has been restricted greatly, eavesdropping is still a problem. The design target was simply to ensure that the air interface is no less secure than the rest of the network.

The air inferface is indeed secure, but given the fact that mobile telephone traffic also travels along landline backbones at some point along the route, the total system’s security level is shaky at best.

Several countries have also introduced legislation to enforce the government’s ability to eavesdrop on all kinds of communications, forcing network equipment vendors to incorporate tapping mechanisms on all network nodes.

Clearly, if a user requires confidentiality, security measures must be incorporated in the user’s own equipment, outside of the network operator’s domain.

Nanoteq’s CodeVoice range enables the user to implement secure communications across any mixture of networks. Products for PSTN and ISDN can simply be connected between a telephone instrument and the line, and offer transparent operation and very high security. There are also several facsimile encryption products, including CodeFax and CipherFax 100.

“CodeVoice Mobile is the only product in the range that replaces the user’s handset with a new instrument. The handset has a very similar appearance to most mobile telephones. On the back panel is a standard PC card slot, into which a range of interfaces can be connected. This modular approach allows the handset to be used with any new technologies that might emerge in future, without having to replace the handset itself,” he notes.

A GSM module and a landline modem have already been integrated, and an Inmarsat Mini-M terminal can interface to the handset through its data port. The handset allows the user to send any mixture of voice, data and fax traffic, using a serial communications port on the base of the handset.

High security

The encryption system provides high security, with a key length of more than 100 bits. This key length meets even the most rigorous security requirements.

Burger says CodeVoice Mobile benefits from Nanoteq’s expertise in key management systems. An administrator can issue an individual with any combination of rights. “For example, a senior staff member might have rights to make secure and open calls to anyone, while a junior staffer might be restricted to secure calls to other members of the organisation.

Keys and privileges are stored in smartcards. These cards are protected by PINs, and lock themselves if an outsider attempts to use them. Only an administrator can unlock a locked card,” he explains.

“For customers with very specific needs not served by the standard products, custom features and algorithms can be engineered to specification. For customers with extreme security requirements, arrangements can be made to audit any or all of the design parameters,” he concludes.

For details contact Nanoteq on tel: (012) 665 1338, fax: (012) 665 1343 or e-mail: info@nanoteq.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Integrated facilities management solutions
Issue 2 2021 , IT infrastructure
Tsebo Facilities Solutions provides a smart remote monitoring solution that will increase efficiency and, most importantly, mitigate risk.

Read more...
Creating hyper-aware industrial facilities
Issue 2 2021 , IT infrastructure
Jacob Chacko expands on what a cognisant industrial site is and why edge technology and the Industrial Internet of Things (IIoT) are relevant to it as well as hyper-aware industrial facilities.

Read more...
Cisco and AMD improve performance, security and hybrid cloud operations
Issue 2 2021 , IT infrastructure
Cisco has announced?an expanded engagement with AMD?to help businesses?accelerate advanced digital experiences?and improve hybrid cloud operations

Read more...
GJD unveils new Network Bridge product
Issue 2 2021 , IT infrastructure
GJD has announced the launch of its new Network Bridge, designed to easily connect GJD IP devices with third-party video management software and network compatible products, including Avigilon and other proprietary CCTV systems.

Read more...
Backup servers with free Altaro software
Issue 2 2021 , IT infrastructure
Altaro Physical Server Backup enables you to easily restore a physical server on your network and access it on your existing virtual environment, as a virtual disk or fully functional virtual machine.

Read more...
Vehicle-to-office connectivity
Issue 2 2021 , IT infrastructure, Mining (Industry)
A large coal and heavy minerals mining company in South Africa is rolling out a mine-wide wireless digital connectivity networking solution that interconnects the various employees’ mobile devices to monitoring systems on vehicles, mining equipment and conveyor belts throughout the mine.

Read more...
Introducing Video Storage Solutions
Issue 1 2021 , Integrated Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Video Storage Solutions (VSS) was formed with the single objective of providing system integrators who are part of the Milestone Community with verified video recording and storage appliances. VSS is distributed in South Africa by First Distribution.

Read more...
Used electronics present security concerns
Issue 1 2021 , IT infrastructure
Employers have a legal obligation to clean old IT devices professionally and ensure that all data is erased from them prior to decommissioning and disposal or redistribution.

Read more...
CAPEX vs OPEX
Issue 1 2021 , IT infrastructure
With the rapidly accelerating pace of digital transformation last year, many organisations were forced to invest in data storage infrastructure, however, these businesses often face the dilemma of whether to opt for a solution acquired as a capital expense or operating expense.

Read more...
How technology enables better healthcare
Issue 1 2021 , IT infrastructure
With the need for digital acceleration to support the healthcare landscape since the onset of the COVID-19 global pandemic, technology has played a critical role to improve the standards of patient healthcare and enable health workers.

Read more...