Enigma T301 TR ( E2 ) By C5 Electronics,
Pas encore membre de TradeKey.com? Inscrivez-vous pour vous connecter avec 9 millions d'importateurs et exportateurs. Rejoignez-le maintenant c'est gratuit |
BOOK A CALL
Book Call On Your Favorite Time
Code
🗘

By Signing Up. I agree to TradeKey.com Terms of Use, Privacy Policy, IPR and receive emails related to our services

Contact Us
product
Prev
Enigma T301 TR ( E2 )
Next

Enigma T301 TR ( E2 )

|

1 Piece Minimum Order

Pays:

Turkey

N ° de modèle:

2

Prix FOB:

Localité:

-

Prix de commande minimale:

-

Commande minimale:

1 Piece

Packaging Detail:

-

Heure de livraison:

-

Capacité de Fournir:

-

Payment Type:

T/T, L/C, D/A, D/P, Western Union, Money Gram, PayPal, Other

Groupe de produits :

-

Contacter maintenant
Membre gratuit

Personne à contacter Azat

Suleyman Seba St Besıktas, Istanbul, Other

Contacter maintenant

Spécification du produit

  • Secure phone communications for Military - Government - Busi:Black

La description

Totally Secure Voice Encryption

Built & Designed in close cooperation with
T-Systems/T-TeleSec, the security division of Deutsche Telekom in Germany. Enigma T**1TR provides strong end-to-end encryption for voice communication on the standard GSM networks using the raw data-service capabilities of the GSM network and state-of-the-art cryptographic technology.

We are a well established mobile phone manufacturer. The hardware and software components of the Tripleton Enigma have been built to meet the most stringent government and military security requirements.

Enigma T**1TR can operate as a secure crypto phone or as a normal GSM mobile. In secure mode, it is possible to communicate with other  Enigma T**1TR  devices.

Stylish, easy to use and despite being one of the lightest models on the market, Enigma T**1TR  is ideal for everyday business use.
The GSM Networks

The GSM system is a superb communication system all over the world. But It does have well-publicised weaknesses that make it inappropriate for exchanging confidential or sensitive information.

Conventional GSM calls can be monitored or infiltrated by readily available surveillance equipment. End-to-end security is not provided, nor is it possible to authenticate the individual with which you are in contact. Middle Man Attack from false base stations are a real threat, as is the cloning of SIM cards.

At the IEEE "Secure Mobile Communications Conference" in Sept ***5, it was announced that the cost of the equipment required to simulate a base station and intercept a conversation while relaying it to the intended party had dropped to under £***0. It is much cheaper today. Consequently, this ability is no longer confined to the budgets of governments and large organisations - Almost anyone could be listening.

Totally Secure
Crypto PhoneComunications
Superb Speech Quality
Enigma T**1Tr crypto phone eliminates these problems. The encryption system, designed by Koç Sistem and the system is designed to rigorous ITSEC standards.

In addition, the phones all-important second SmartCard is totally tamper-proof, and the keys are guaranteed by our Certification Authority to be unique and secret.


Simple To Use
To make a secure call with Enigma T**1TR, all you have to do is dial the number and press the"Crypto" . And since you can only make secure encrypted calls to other Enigma T**1TR devices the system is totally secure.

Enigma T**1TR will work on all GSM ***0/**0 mobile communication networks. It has the hallmarks of a business mobile phone. When these are combined with an integrated encryption system it becomes the superior business tool.
 
Enigma T**1TR is as happy making normal calls as it is secure calls.

Enigma T**1TR is not tied to any specific network, it uses your existing mobile telephone number for both normal and secure calls.




There is no need to purchase or install any server and there is no need to make changes to the network . The only think you should do is to get activeted your fax-data line from your GSM operator.

Secure calls cost exactly the same as normal data calls, while connection times require only an extra 7 seconds for initialisation of the encryption algorithms.

From the network perspective, a crypto call would be seen as a normal data/fax call.
Pioneering technology
Enigma T**1TR’ s technology is based around two internal SmartCards. The "GSM SIM", delivers standard GSM services. The other, issued by a globally recognised Trust Centre, delivers powerful authentication and encryption using established and open protocols. This is known as the Crypto-SIM or Netkey card.

Pioneering design merges these two technologies to create a unique, unbreakable cypher key for each and every call - providing failsafe point-to-point authentication and unbreachable privacy.

The crypto-system employed is a hybrid mechanism, which is a widely accepted and implemented in many high-end security products. The Tripleton Enigma achieves full bi-directional authentication with the secret keys held securely in, and never leaving, the safe environment of the Netkey/TCOS card.
Connectivity to existing landline infrastructures
Totally Secure Voice Encryption

Security Features
· Secure voice communication (Crypto phone calls)
· Can also operate as a standard GSM phone (Clear calls, SMS etc)
· High performance crypto processor
· State-of-the-art audio codec for crypto phone calls (excellent speech quality)
· Integrated Crypto Smart Card Reader (2nd SIM)
· Crypto-Module Operating System: TCOS certified to ITSEC E4+
· Multi award winning Crypto-SIM certified to ITSEC E4+
· True Random Number Generator implemented in Hardware
· Asymmetric/Public Key algorithm: RSA
· Symmetric algorithm: AES (**6 bit)
· Sim Lock
· Call logging and Caller-ID deactivation
· Exclusive communication groups using White List
· Specific exclusion using Black lists (eg Stolen/Lost handsets)
· Closed/Corporate User Group capability
· No back doors or escrow keys of any kind
· Entire system can be fully verified by customer or other independent body
· Ease of use lends itself to all types of users
· Inconspicuous design
· Can operate with any existing GSM SIM (can keep your current phone number)
Additional Security Tools and Services
· Crypto Management software and tools
· Certificate creation and management tools (Customer-CA)
· Cryptanalysis and verification tools and services.

Pays: Turkey
N ° de modèle: 2
Prix FOB: Obtenir le dernier prix
Localité: -
Prix de commande minimale: -
Commande minimale: 1 Piece
Packaging Detail: -
Heure de livraison: -
Capacité de Fournir: -
Payment Type: T/T, L/C, D/A, D/P, Western Union, Money Gram, PayPal, Other
Groupe de produits : -

Mots-clés correspondants C5 Electronics

Send a direct inquiry to this supplier

To:

Azat < C5 Electronics >

Je veux savoir: