首页>
外国专利>
The system of comunicau00c7u00e7o data, voice and video with cryptography, mobility and inviolability, sustendado by an international network structure, redundant and resource dynamics alocau00c7u00e7o
The system of comunicau00c7u00e7o data, voice and video with cryptography, mobility and inviolability, sustendado by an international network structure, redundant and resource dynamics alocau00c7u00e7o
The system of comunicau00c7u00e7o data, voice and video with cryptography, mobility and inviolability, underpinned by a structure of the international network, redundant and alocau00c7u00e7o dynamic resources.It is a system dedicated to individuals (households), or for legal entities (business), in the case of a VoIP system, one of the few in the world that uses, among all the modern protocol g.722 audio in high definition (hd).These servers are scattered clouds, many locations on the planet, following some internationally accepted principles, including in Brazil, with redundancy, low latency compared to Brazil, and above all, hosted in datacenters Intel and in countries that have rigid L Egislau00e7u00e3o about information security.No sharing or allowing you to share a spurious information in any external body or with other parents.The communications system of voice and image, as well as the transmission and storage of digital information is supported by a unique technology to create virtual paths within a dynamic network and data communication, for ensuring the confidentiality and security Necessary information in transit.The "tunnels" created dissolve automatically and without a trace as soon as the infonnau00e7u00e3o is surely transported, or being detected any attempt to breach this, by means of the monitoring system of the integrity of the data, also the technology presented in this paper.When the user performs a connection is set up a route dynamic voice directly and encrypted (4) in datacenters (1) while the call (3), if there is infringement, instability, insecurity, or if the route is without quality, a dynamic tunnel (5) is created for the "relay" Cha Not by any of the datacenters (11).Without human intervention in the process (all the routes created are encrypted and dissolved without tracking is possible after the complete transaction).
展开▼