1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

  • What are the security features provided by Covia Labs' DART technology?

    Here is a list of major security features provided by DART technology:

    • Security is based on standard NSA approved PKI algorithms such as AES.
    • The platform creates a public/private key pair when the Covia Connector runs the first time. A 128-bit statistically Unique Device Id is generated as a hash of the public key as the basis for all PKI operations.
    • Connected Applications are signed to prevent tampering and to prevent unauthorized applications from running.
    • Two-way authentication is established in different ways for different market requirements. Devices are addressed by their Unique Device Id.
    • As each device is selected into an Operation, credentials are sent along with the Connected Applications’ code AppParts that suits their security level and role. These credentials permit direct communications only between devices that are part of the same Operation, with the access rights that are part of each device’s credentials.
    • Data stored on a device for a particular Operation is encrypted using an Operation Key and the Device’s public key. Only the Operation instance of the Connected Application that stores the data running on that exact same device can make sense of the data. When a particular Operation has ended or the device’s private key has been erased, the data becomes unintelligible.
    • Devices have security levels assigned and signed into their Covia Connector unification program. Operation code AppParts sent to carry out a particular application role can never be sent to a device with too low a security level for that role.
    • Devices that do not have hardware Public Key support will never get assigned a high security level. Likewise, devices allowed to run third-party software or are connected to the Internet will be assigned low security levels.
    • Transactions that carry messages and media between devices are all assigned a security level so that they will never be sent to devices with a lower security level or to devices that have Operation Roles with security levels lower than that of the transaction.
    • Every Connected Application Instruction is carried out by a Sandbox in the Covia Connector. If a Connected Application’s code part tries to access hardware or memory for which it has no access rights, its execution is immediately shut down. This prevents inadvertent software bugs or malicious viruses from gaining control of devices.

  • What are the main features?

    • Reduces cost and deployment time by using off-the-shelf mobile phones, computers, cellular data networks
    • Access to information and control restricted according to security levels and roles
    • All communications and data are encrypted
    • Automatic establishment of a secure perimeter that includes only those in a particular talk group
    • Encryption of all communications using DART-SSL™ technology
    • Centralized logging of all transactions on a secure server
    • Synchronization of voice, text, pictures, GPS locations, maps, and control panels
    • Voice messages are always intelligible
    • Instant Replay™ of any voice messages or video
    • Ability to add new responders and the public to talkgroups
    • Automatic routing around communications failures using patented Serial Bridging™ technology
    • Officer Down detection
  • What are the main features?

    • Reduces cost and deployment time by using off-the-shelf mobile phones, computers, cellular data networks, etc.
    • Access to information and control restricted according to security levels
    • All communications and data are encrypted
    • Automatic establishment and breakdown of secure perimeters for different incidents
    • Encryption of all communications using DART-SSL™ technology
    • Centralized logging of all transactions on a secure server
    • Synchronization of voice, text, pictures, GPS locations, maps, and control panels
    • Voice messages are always intelligible
    • Instant Replay™ of any voice messages or video
    • Officer Down automatic detection/alerting
    • Automatic routing around communications failures using patented Serial Bridging™ technology
  • Is the product secure?

    Security is integrated throughout the platform, and is self-administrating. All stored data and communication between devices is encrypted with 128-bit AES encryption, and only standard PKI infrastructure is used.

    Other security features provided in the DART platform used in Command & Control include:

    • Two-way authentication based on private keys and a table of allowed devices to guard against rogue devices and man-in-the-middle attacks.
    • Encrypted end-to-end communications.
    • Encryption of all data storage on devices using Operation Id and Device Id so that the stored data can only be understood by a particular Operation, and only if it is running on the device on which the data is stored.
    • Execution sandbox with fine-grained access rights to guard against viruses and unauthorized operations.
    • All code is signed to assure executables and data are authentic and have not been tampered with.
  • How is Covia Labs funded?

    Covia Labs is wholly owned by CEO David E. Kahn, CTO Dan Illowsky, and individual investor, Ray Sidney. Mr. Sidney is a well-known security expert and was the fifth employee of Google.

  • What are the minimum device requirements to run a Covia Connector program?

    • A two-way communications protocol
    • 6 Kbytes of ROM to hold the Connector Program itself
    • 1 KHz processor
    • 2 Kbytes of memory
    • Note: The Covia Connector has been ported to a one dollar CSR Bluetooth chip, with only the above resources and no embedded OS.

  • Is the product secure?

    Security is integrated throughout the DART platform on which Push-to-Talk is built. Security is self-administrating. All stored data, and communicated between devices is encrypted with 128-bit AES encryption, and standard PKI infrastructure is used for all security features.

    Other security features provided include:

    • Authentication to guard against rogue devices.
    • Encrypted end-to-end communications.
    • Encryption of all data storage on devices using Operation Id and Device Id so that the stored data can only be understood by a particular Operation, and only if it is running on the device the data is stored on.
    • Execution sandbox with fine-grained access rights to guard against viruses and unauthorized operations.
    • All code is signed to assure executables and data are authentic and un-tampered.

  • Is the product secure?

    Alert & Respond is built on Covia Lab’s DART platform which contains extensive integrated security features weaved throughout the device software, communications, storage and administrative systems. All security features are based on standard PKI algorithms. For more details, see How it Works.

    Alert & Respond allows devices, such as commercial mobile phones, to be securely used for emergency response. It provides authentication of devices, encryption of communications, and encryption of all data stored on devices.

  • What kind of systems can be integrated?

    Just about any military system or mobile device can be connected using the Command & Control platform – including systems with different operating systems, network protocols and user interfaces. Even devices that do not have an operating system can be supported. These include mobile communications and other devices carried by soldiers in the field, GPS units, radar systems, sensors, cameras, satellite imagery, battlefield maps, and predator drones.

  • What is Covia Labs target market?

    Covia Labs is targeting local, state and federal emergency response agencies, as well as the Department of Defense and government contractors to the DoD. However, our products will benefit any organization that wishes to tightly integrate messages, data and operations across communicating devices.

| 1 | 2 | 3 | 4 | 5 | 6 | 7 |