Cryptophone 600G: Some Phones Promise Privacy... Cryptophone Delivers Intelligence

Download as pdf or txt
Download as pdf or txt
You are on page 1of 4



   

GSMK
CryptoPhone® 600G
Secure mobile phone for professional users
with 360° protection, hardened operating
system, Baseband Firewall, tamper-resistant
hardware and end-to-end voice and message
encryption

Supports the highest FIPS 140-2 and Common


Criteria security level requirements

NEW TAMPER-RESISTANT,
TAMPER-EVIDENT HARDWARE DESIGN

SECURE CONTACTS DETECT LOCATION TRACKING SECURE STORAGE


Secure contacts list and Detect attempts to track user Encrypted storage system for
call history time-line location via SS7 or silent SMS contacts, messages and notes

APP PERMISSION ENFORCEMENT HARDENED ANDROID EMERGENCY ERASE


Control access to network, data Secure Android built from source Last line of defense emergency
and sensors (camera, mic etc) with granular security controls erase function

Some phones promise privacy... Cryptophone delivers intelligence.

ESD America // esdcryptophone.com // @cryptophoneusa // info@esdamerica.com // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Secure Calls Tamper-resistant, tamper-evident hardware design
Secure end-to-end encrypted voice over IP calls on any network Dedicated hardware security modules with CPU supervisor,
– 2G, 3G, 4G, WLAN • Strongest and most secure algorithms watchdog timer, on-chip temperature sensor and removal-
available today – AES256 and Twofish • 4096 bit Diffie-Hellman resistant coating • Shield removal detection circuitry and
key exchange with SHA-256 hash function • Readout-hash Environmental Failure Protection (EFP) for temperature, voltage,
based key authentication • Autonomous key generation, no internal clock frequency, and duty cycle provided by immediate
pre-installed key material • Encryption keys securely and reset circuitry • Supports the highest FIPS 140-2 and Common
immediately erased from the device after each call Criteria security level requirements

Secure Messaging Trusted Platform Module (TPM) for platform


Based on the same strong encryption algorithms used for GSMK measurement and attestation
CryptoPhone voice encryption –4096 bit Diffie-Hellman initial Trusted Computing Group (TCG) TPM specifications  level 2
key exchange, AES256and Twofish message encryption with 256 version 1.2, revision 116 • Active shield and environmental
bit keys sensors • Memory Protection Unit (MPU) • Hardware and
software protection against fault injection
Device Protection
Hardened operating system with secure boot and Encrypted Storage
device runtime integrity checks Encrypted storage system for contacts, messages, and
Secure Android OS built from source code with granular notes with smart folders protects data at rest against
security management and streamlined, security-optimized unauthorized access
components and communication stacks • Seamless secure boot
chain featuring secure boot, kernel, recovery, kernel object and Verifiable Source Code
APK signature keys • Runtime checks of core applications and GSMK CryptoPhones are the only secure mobile phones
services ensure that only signed and trusted code is loaded on on the market with source code available for independent
the device security assessments. This permits individual source code
audits in accordance with national and international
Configurable OS security profiles verification and certification standards designed to verify
Hardware module controller and permission enforcement device integrity mechanisms, correct implementation of all
module control access to network, data and sensors (camera, encryption algorithms, and the absence of backdoors
microphone, etc.), keeping you in control of your individual
security policies Compatibility
Fully compatible with all GSMK CryptoPhone IP secure
Baseband Firewall 2.0 mobile, desktop and satellite phones, including all GSMK
Unique protection against over-the-air attacks with constant CryptoPhone 400, 450, 500/500i and IP19 series secure
monitoring of baseband processor activity • Baseband attack phones as well as GSMK CryptoPhone IP PBX Gateways
detection and initiation of counter-measures • Automatic
discovery of IMSI Catchers and rogue base stations • Detection of
attempts to track user location via SS7 or silent SMS

AS SEEN ON

ESD America // esdcryptophone.com // @cryptophoneusa // info@esdamerica.com // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Enterprise customers asked for more features...
Cryptophone 600G is the answer

Technical Data Display


Quad–core Krait CPU 2.3GHz, graphics accelerator, QDSP, 5” Full HD (1080*1920) LCD, Glove-usable capacitive touch,
microSD card slot functional in wet conditions

Radio Camera
GSM/GPRS/EDGE (850/900/1800/1900 MHz), UMTS/HSDPA+ 8 MP with Autofocus and LED Flash, 2 MP for front facing
(B1, B2, B4, B5, B8), LTE advanced (3GPP, FDD, IMS, VoLTE, applications, Full HD video capture and playback, both
Carrier Aggregation, B2, B3, B4 , B5, B7, B13, B14, B17, B20) cameras can be disabled

Connectivity Mechanical
USB 3.0 (fast charging), Wi-Fi 802.11 a/b/g/n/ac, accessory Dimensions 141mm x 75,5mm x 13,5mm, 180g, IP67 rating, MIL-
interface for connecting custom extension modules, such STD-810G shock resistant, Temperature range -20°C to +55°C
as sensor accessories, TETRA or tactical radio modules, car (-4°F to 131°F)
charger and satellite modules

Audio
High-performance speakers, multi-microphone ANC

360˚ SECURITY: END-TO-END ENCRYPTED VOICE AND MESSAGING ON A FULLY ARMORED PLATFORM

nnHigh Assurance CryptoPhone Security nnFull source code available for review
nnIP67 water and dust protection nnHardened Android OS
nnMIL-STD-810G shock resistant nnEmergency erase function
nnGlove-usable touch screen nnMade in Germany
nnExtremely durable mechanical design

USER
SHA-256
Encryption Overview value II 0x02 256 bit key

Diffie - Hellman 4096bit SHA-256 value II 0x01 SHA-256 256 bit key Twofish
Counter
128 bit
value II 0x00 SHA-256 256 bit key AES-256

XOR
Your local reseller
keystream
Voice Data
from Codec
MUX XOR
User Data
Messages
ENCRYPTED DATA

ESD America // esdcryptophone.com // @cryptophoneusa // info@esdamerica.com // 7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128
The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. CryptoPhone is a registered trademark of GSMK.
Not all secure phones are created equal. Accept no compromise.

 %#"! 
! "! 
#("%!"! ,))

&# !
%#

 %#
#("%

!!"

 

 #("%$

 #("% $$$

!.! 

 ! %     '
  !$ !'

""#$$! $
$      
  " $

"" !%!
#     !    
$!*    # '

 .*+)#%
''"  !  ! $  
!  " $   !

!'#%'
 "   $#   !
  $!   

 %#%%!
  $ $"  ! ! #
    


#%%!
!     (

- (% %##!%! %%!


 !   & #
!  

%%/ % 0
!    $
) 

!& %#(!#

!#$%!"&

info@esdamerica.com / @cryptophoneusa / esdcryptophone.com


7251 W Lake Mead Blvd, Suite 300, Las Vegas NV 89128

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy