1 / 10

Wireless Infrastructure & QTrust Secure Wireless for the Government

Wireless Infrastructure & QTrust Secure Wireless for the Government. 3G Will Drive Mobile Broadband Connections Into the Next Decade. 3G will enable 85% of mobile broadband subscriptions in 2013.

kamuzu
Download Presentation

Wireless Infrastructure & QTrust Secure Wireless for the Government

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Wireless Infrastructure & QTrustSecure Wireless for the Government

  2. 3G Will Drive Mobile Broadband Connections Into the Next Decade 3G will enable 85% of mobile broadband subscriptions in 2013 Sources: HSPA Family - Average of Strategy Analytics, Informa, Wireless Intelligence and In-Stat ; EV-DO family - Average of SA, Informa, Wireless Intelligence, In-Stat and Yankee; WiMax – In-stat (Dec08); LTE - Average of Strategy Analytics and In-Stat and TD-SCDMA - Average of Strategy Analytics, Informa, Wireless Intelligence, In-Stat and Yankee

  3. The Challenges of Topology Interference Scalability Fairness Operation & Management User-Deployed Nodes Restricted Femto Access Mixed Networks Impose Challenges

  4. Improved Performance for Advanced Topology Networks with LTE Advanced AdvancedInterference Management Support forRelays Self-Organizing Networks >20 MHz Spectrum Aggregation Fairness Among Users Plug-and-Play Deployments Note: Most topology enhancement features considered for LTE Rel-10 (LTE Advanced), but some may be introduced in earlier releases e.g., some SON functions in Rel-9.

  5. Coexistence of Multiple Airlinks

  6. How Do You Talk? UN-MET NEED EXISTS EXISTS Consumer Phones – QTrust™ application Security: MEDIUM • NSA Program Office • General Dynamics SMEPED/Secterá • L-3 SME-PED/STE • Qualcomm QSec Consumer Phones • Market Size: Medium • No PSTN vulnerability (end-to-end) • Government certified encryption algorithm – NIST • No clearance requirements, key management, or COMSEC • Sensitive But Unclassified offering • Low Cost- Medium Security Concern • Market Size: Niche • Security: HIGHEST • End-to-end (no PSTN vulnerability) • Specialty hardware – tamper resistant, tempest-tested • NSA-approved encryption algorithm • S/W & H/W certification • Key management • COMSEC handled • Clearance needed • High Cost- National Security Concern • Market Size: Substantial • Security: LOW • Whatever is inherent in the cellular network • Low Cost- Low Security Concerns? . Nothing in these materials is an offer to sell any of the parts referenced herein.  These materials may reference and/or show images of parts and/or devices utilizing parts whose manufacture, use, sale, offer for sale, or importation into the United States are subject to certain injunctions against Qualcomm. Any device utilizing 1x-EVDO parts must utilize Qualcomm's hybrid mode alternative solution.

  7. QGOV Encryption Story . Nothing in these materials is an offer to sell any of the parts referenced herein.  These materials may reference and/or show images of parts and/or devices utilizing parts whose manufacture, use, sale, offer for sale, or importation into the United States are subject to certain injunctions against Qualcomm. Any device utilizing 1x-EVDO parts must utilize Qualcomm's hybrid mode alternative solution. Qualcomm Confidential & Proprietary Information

  8. Overview of QTrust Solution • Initial offering is a dynamic BREW application capable of making secure point-to-point VoIP calls (to another phone with the same BREW application) • Designed to operate on a commercial CDMA network that is either 1xRTT or EV-DO • Uses NIST certified at FIPS 140-2 Level 1 cryptographic module (certificate #851) • Elliptic curve key-agreement • AES-256 voice encryption • Calls initiated via SIP • The Session Initiation Protocol (SIP) is an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants • Provides a signaling and call setup protocol for IP-based communications

  9. System Architecture

  10. Available Devices at Launch • G’zOne Boulder • Motorola Barrage • PanTech Escapade • Casio Rock

More Related