Closed

CSD mobile Voice Encryption

This project received 8 bids from talented freelancers with an average bid price of $8963 USD.

Get free quotes for a project like this
Employer working
Project Budget
$2000 - $10000 USD
Total Bids
8
Project Description

Here is a Description of the software we need:
---------------------------------------------------------------------------------------------
The Software should work on Symbian, Windows Mobile Phones and maybee Iphone..
The Secure Call and SMS application is advanced Voice and SMS encryption solution.
This solutions is a 100% software solution without any hardware tweaking, adjustments or enhancements made
to the phone. Simply install the software, enter the encryption code and your calls and SMS will be encrypted.
You can change the keys as many times as you want, without the need to send the phones back to us or contacting
,us. You have complete control on the software.
# 256 Bit encryption# Encrypted Voice Calls# Encrypted SMS# Complete Key control# 1.5 Second voice delay
# No echos or static# Phonebook Integration# Protected Inbox# Protected Call Logs# Law Enforcement friendly
# No backdoors# Very Stable# Supports CSD/HSCSD# EDGE Supported# Wide range of phones# 100% software solution# Installs in 10 seconds# Password protected application
1) No need to configure the CSD line settings or voice settings.
2) The application has an intelligent line detection engin that auto detects CSD/HSCSD and EDGE Support and
will auto adjust the settings in the backgound! Moreover the application picks the default voice settings
of your phone without the requirement to adjust voice to reduce Echo. The auto detect engine also has auto
echo cancellation so that you dont have to bother about managing any further settings or why the line echos.
A truly advanced sms and voice encryption product
3) All calls and SMS are encrypted with 256 AES, where you enter the Initializing Vector (IV) for calls and SMS.
4) All SMS are 256 bit encrypted and come to a secure Inbox, which is not available for view in the Normal Inbox of
your phone. The secure Inbox is accessible from inside the application which is password protected. No one can read
your secure Inbox without having a password to the application.
5) Encrypted Voice calls have a delay of 1.5 seconds only! Moreover, the Advanced buffering systems and noise reduction
algorithms ensure that there are a) No Echo, b) No background noises/static/disturbance and c) Crystal clear voice, NO
exceptions. We stand by this promise and quality to assure that none of the competitors can offer such voice clarity.
6) Voice calls require that the network should support CSD/HSCSD (both with EDGE Support). Even if your network has a low
data transfer rate, our software will auto detect that and send compressed voice between the handsets, thus ensuring that the
voice quality will not be deterred by the low transfer rate. This improvement also ensures that there will NOT be a delay of
more than 1.5 seconds even if network speed is slow.


7) No need to send us the phone to change the keys. Simply enter the key code yourselves and have full control on the software
and on your security. The recommended key size is 32 with as many special characters as possible to ensure the highest level of
security for a 256 bit encrypted Voice and SMS solution.
9) You can choose from an array of handsets that are compatible with this software. For details list of compatible handsets, click here.
10) This application is very easy to use and requires minimal setup to get it up and running. You don't need to enter any complicated
Network Settings, simply install and you are ready to go.
11) No call logs are available on the normal call log of the phone. All call logs are protected and can be viewed only within
the application, which is password protected. You have complete history of call logs, including date, time and duration. Simply
click on a log to call or edit the call logs as well.
13) All Copyrights and Source codes must be given to us. We need detailed informations about the development enviroment. We must be able to recompile the sources
in our company without any problems.

Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online