1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

  • What is Command & Control™?

    Covia Labs’ Command & Control product is a software development platform for building secure cross-device command and control, situational awareness, and collaborative communication Connected Applications. It includes two C++ Software Development Kits (SDKs) – an SDK to develop customized Covia Connectors, and SDK to develop Connected Applications. Provided frameworks and complete working Connected Applications to use as starting points greatly ease the creation of Connected Applications.

  • Who is the target market for the Command & Control product?

    Command and Control will be licensed to DoD agencies and contractors.

  • What are the main features?

    • Scalability across thousands of simultaneous devices
    • Interoperability across different armed forces, coalition partners, NGOs and even civilians
    • Replaces insecure OSes on commercial mobile phones and other devices
    • Automatic establishment of a secure perimeter for those chosen into each individual Operation
    • Automatic tear down of security perimeters when an Operation is compete
    • Encryption of all communications using DART-SSL™ technology
    • Centralized logging of all transactions on a secure server
    • Synchronization of data such as voice, text, pictures, GPS locations, maps, and control panels
    • Mash-ups fuse diverse types of information from many devices into highly informative UI panels
    • Automatic routing around communications failures using patented Serial Bridging™ technology
    • Voice messages are always intelligible
    • Instant Replay™ of any voice messages or video
    • Warfighter medical emergency detection
  • Why does someone need this product?

    Military operations are increasingly relying on automated systems to conduct warfare. However, these systems are rarely integrated, requiring human interaction to act as the bridge between them. Covia’s Command & Control platform integrates these diverse systems so they act as a single entity. This automation helps improve communication among military personnel and their allies, coordinate inter-agency missions, speed critical decision making, avoid human error and save lives. Command & Control allows new devices, capabilities and mission types to be quickly and seamlessly evolved. Connected Applications built on the Command & Control platform are highly modular so they can be quickly and easily evolved to include new devices, capabilities, UI modules and mission types. The reusable modules are also easily mixed and matched and customized into new Connected Applications.

  • Is the product secure?

    Security is integrated throughout the platform, and is self-administrating. All stored data and communication between devices is encrypted with 128-bit AES encryption, and only standard PKI infrastructure is used.

    Other security features provided in the DART platform used in Command & Control include:

    • Two-way authentication based on private keys and a table of allowed devices to guard against rogue devices and man-in-the-middle attacks.
    • Encrypted end-to-end communications.
    • Encryption of all data storage on devices using Operation Id and Device Id so that the stored data can only be understood by a particular Operation, and only if it is running on the device on which the data is stored.
    • Execution sandbox with fine-grained access rights to guard against viruses and unauthorized operations.
    • All code is signed to assure executables and data are authentic and have not been tampered with.
  • What kind of systems can be integrated?

    Just about any military system or mobile device can be connected using the Command & Control platform – including systems with different operating systems, network protocols and user interfaces. Even devices that do not have an operating system can be supported. These include mobile communications and other devices carried by soldiers in the field, GPS units, radar systems, sensors, cameras, satellite imagery, battlefield maps, and predator drones.

  • What happens if a device is captured by the enemy?

    Erasing the private key on a device disables all communications with the device and makes the device’s data unintelligible. This revocation through erasure can be triggered by explicit command from any of the devices in a shared Operation or any other defined criteria, e.g. a device reading its GPS location and finding itself outside of its set Operational area, or the device not being able to contact others in the Operation for too long a time period.

  • How are devices authenticated?

    Command and Control communications require two-way authentication and encryption between any two communicating devices. Setting up a secure communication requires that the addressed device’s Device Id be a hash of the device’s public key. Similarly, the originating device must have credentials known to the target device, or be part of the inter-device credentials signed with the particular Operation’s signing key, which controls direct communications and allowed access rights between devices that are part of a particular mission.

  • Has the Command & Control platform’s security features been certified by the Department of Defense?

    All security features are built on top of standard PKI algorithms that have been approved by the NSA. Obtaining DoD certifications for Covia Labs’ specific implementations has been initiated.

  • Is the product out-of-the-box or customized?

    Covia Labs sells an out-of-the-box version of all its products. Additionally, we can work with you to develop a custom solution suited to your specific needs. We also offer a developer kit to help you create your own custom applications.

prev | 1 | 2 |