1. Skip to navigation
  2. Skip to content
  3. Skip to sidebar

Technology

Learn how it works

Technology

Covia Labs’ technology takes an entirely new approach to unifying operations and securing access to media and controls across devices. DART™ technology tightly integrates security, distribution, adaptation and communications bridging methods to deliver robust, secure comprehensive solutions.

Connected Applications™ take advantage of DART to automate the tedious administrative chores of distributing software and credentials, and solve the most intractable problems associated with establishing secure teams across different agencies and actors while limiting their interactions to their individual roles in the Operations.

  • Unifying from the Top of the Stack: A New Layer 8™

    The Covia Connector™ unification program runs as a standard Layer 7 application that turns devices into one super-device embodying their combined resources. This creates a new cross-device interoperability Layer 8, and each device becomes a Connected Device.

    Layer 8 cross-device Connected Applications, such as Alert & Respond™ and Push-to-Talk™ can distribute parts of their own code and data to run simultaneously across teams of Connected Devices. Connected Applications easily mix, match and fuse information, media and control into collaborative user interfaces on each device.

  • Binary Portability, Yet Use Each Device’s Unique Capabilities

    Connected Applications’ instructions are carried out by the Connectors, which allows them to execute across all Connected Devices regardless of their individual CPU’s, Operating Systems and communications protocols. Each device’s Connector exposes all the capabilities of its device in a manner that allows Connected Applications to access the full power of the device.

  • No Chance of Incompatible Code Parts

    Since the code running on all teamed devices was distributed from a single Connected Application binary file on the initiating device, there is no need to install compatible applications on every device. There can be no versioning issues because all the code distributed from the Connected Application’s binary file was linked together as a single program. Incompatible DLL’s and shared libraries are a thing of the past.

  • Serial Bridging™ For Reliable Communications

    Covia Connectors automatically bridge communications serially throughout devices and protocols, while preserving the end-to-end encryption of the conversations. This patented technology increases the robustness of a team of interoperating devices by automatically finding new paths in the face of communication and device failures.

  • Dynamic Mastering for Scalability and to Eliminate Single Point of Failure

    A master device can concentrate and distribute data to significantly reduce the bandwidth needed to synchronize data across a large number of devices. Unfortunately, this creates a potential single point of failure. Connected Applications have one master at any time, but will automatically elect and synchronize a new master if the current master becomes unreachable.

    Thousands of devices can participate in an Operation because there can be any number of high capacity fast communications servers included in an Operation and data transmissions are highly optimized. Data is synchronized only with devices with roles that need it, have the rights to use it, and only when the data is actually used. Media, such as pictures and video can be requested in a smaller transcoded size if the device does not need the full size media.

  • Push-Based Security to Increase Protection

    Distributing, maintaining and revoking security credentials across devices for different applications and team members are tedious and error-prone. Fortunately, this is simplified immeasurably by the Covia’s patent pending “Push Model” security that is used in all Connected Applications.

    Each Operation is assigned a generated statistically unique 128-bit Operation Id. As Connected Devices are selected into a team, the devices are authenticated and an encrypted communications session is established. Then the Operation’s Id and inter-device security credentials are sent to each new member, with the security credentials governing communications and access rights. Only devices which have been authenticated and to which the Operation has been explicitly pushed can communicate and store data for the Operation. Data is never sent to a device that does not have the right to access it.

  • All Communicated and Stored Data Encrypted Using PKI and AES

    The Operation Id and the device’s public key are used to encrypt all data that is communicated or stored. Consequently, data stored for the Operation is only usable by the particular Operation, and only if the Operation is running on the device where the data is stored.

    Once an Operation is complete, the devices will no longer be able to communicate until they are included together in another Operation. Erasing the Device Id immediately makes it impossible for it to communicate with other Connected Devices or to interpret data stored on the device by Connected Applications. This ensures effective revocation if a device becomes compromised.