$GTCHD is now in commence development of an applic
Post# of 23600
Infinia Radio System is aiming to deliver a high bandwidth data signals, while GBT is working to protect critical network communications data, maintaining interoperability among the system’s components at all operation levels. As any typical wireless network, by its nature, is vulnerable to security risks. The company decided to increase the cybersecurity level to protect sensitive information transmitted over the system’s communications; particularly, with tracking applications.
The keys to protecting sensitive operational radio transmissions is to deploy advanced encryption system to ensure information is adequately protected from intrusions. The company will evaluate standards and compliant algorithms such as the Advanced Encryption Standard (AES) that enables maximum interoperability, while providing high levels of protection. AES technology includes cryptographically strong algorithms, and is considered to be one the most effective ways to protect sensitive information from being compromised. Although key lengths of 128-bit and 192-bit are considered highly efficient, we will evaluate the use of 256-bit key length or higher for data blocks encryption. The company plans to integrate its AI technology to manage the security protocol execution, and performing an on-going scan to detect and eliminate possible breaches.
“As we are working on designing a tracking application using our Infinia, Long Range Radio, a high level of cybersecurity technology is needed to protect its sensitive data. Along with high performance network operation requirement extra attention is needed to protect the network’s data; particularly, with tracking system implementation. We plan to evaluate few encryption methods among then is an AES based algorithm. The Infinia System is comprised of radio operated components, including base, mobile and repeater units, we plan to ensure a secured, adequate network interoperability functionality. Data encryption algorithms have the capability of preventing unauthorized disclosure of sensitive information, yet, it’s not enough. Especially, with today’s wireless networks vulnerabilities we plan to integrate our AI system to manage and supervise the security protocol. Additionally, the intelligent system will be performing on-going scanning, constantly searching for possible intrusion or unauthorized access. In light of today’s wireless networks potential security risks and interoperability challenges, a machine learning cryptography module will be protecting the internal network communication with high performance and reliability,” said Danny Rittman, the Company’s CTO.