top of page

SECURE COMMUNICATIONS

PKI and Orex Research's Proprietary Augmented PKI is the basis for secure communications. Orex Research has developed a secure communications protocol that can be utilised in any form of digital communication, be it voice or data.

Sound Equipment
Typing on a Computer

AUGMENTED PKI  /  DRONES  /  CLOUD SECURITY  /  SECURE COMMUNICATIONS  /  ENCRYPTION & EMPSECURE

1 - Secure Comms Overview

OVERVIEW & BACKGROUND

The emergence of quantum computing presents a potential new and emerging threat to existing PKI systems. Quantum computing postulates that all states can be achieved simultaneously, thus rendering encryption systems obsolete. However, a key principle in quantum computing has been absent in all of the breathless marketing hype surrounding it: it must have some knowledge of the answer in order to select from the nearly infinite possible solutions.

​

Augmented PKI removes all traces of information (metadata) upon which quantum computing systems rely, thus rendering it useless.

Background

The communications systems of highly secure and sensitive environments (HSSE) are subject to a range of potential threats and risks. Proprietary communication subsystems within HSSE are integrated to ensure reliable communication on and off-site, particularly under emergent circumstances. A variety of communication sub-systems are implemented throughout (and amongst different) HSSE as a means of exchanging a range of information, including voice, data and imagery. A panoply of end point devices (wireless, wired, phones, smart devices, and the like) are all plugged into these various communication systems, making for a diverse and complex ecosystem.

 

Amongst the various communications systems in use throughout HSSE, one weakness is a common denominator amongst them all: potential data exposure. Unsecured communications leave proprietary data vulnerable to interception, manipulation and corruption, all with serious implications. Even systems claiming to be secure often suffer from potential security flaws. On the other hand, securing all the various forms of communication within and among HSSE is a non-trivial exercise, fraught with confusion and significant costs.

2 - Augmented PKI Comms

AUGMENTED PKI IN SECURE COMMS

Secure Communication System (SCS) Solution from Orex

Orex integrates its EMPSecure technology (EMPSecure SCS) to provide an elegant secure communications system (SCS) solution, based upon proprietary, on-the-fly data encryption systems that are tightly integrated into existing communication structures for HSSE

Description of EMPSecure SCS

Empyrean SCS is a product that seamlessly integrates with existing communication systems, providing data encryption on the fly of data without intervention by, and transparent to, users.

Secure_Comms_System.jpg

Empyrean SCS provides real-time encryption based upon its proprietary Public Key Infrastructure (PKI) approach. PKI implementation performs encryption and end-to-end communication security through the use of public and private keys, digital certificates, that are exchanged and authenticated.

 

Once a connection has been made to the Empyrean SCS, all the complex, proprietary encryption and digital authentication that provides secure communication for HSSE takes place behind the scenes. At the user level, no additional training is required. Empyrean SCS performs its work in the background while the end user simply continues to use systems with which they are already familiar, such as Windows Explorer and macOS Finder.

 

Empyrean SCS is differentiated by the fact that no one, not even Empyrean personnel, can access a user’s data. The system can be configured to roll keys at any time, to add an additional level of trust and security.

Principles

Tightly integrates with existing systems

  1. Minimal Modification to existing systems

  2. Minimal Interference on existing structures

  3. Plug and Play Solution
     

Works the way user work

  1. No additional training is necessary

  2. Employs interfaces with which the user is already familiar
     

Provides:

  1. Confidentiality

  2. Authentication

  3. Trust
     

Security the way you need it:

  1. Data is not readable by any other party

  2. Data is secure in transit and at rest

  3. The level of security can be configured

Secure Messaging Component

Empyrean SCS adds a secure messaging component to the existing HSSE communication environment. For each information packet transmitted through the network, Empyrean SCS encrypts, signs and transmits it to the various end points within the network (smart phones, tablets, computers and the like) where they are decrypted and authenticated.

 

Empyrean SCS is device agnostic, whatever operating system or device manufacturer is used, the encryption and decryption process is the same, at least it appears to be so to each user.

Rolling Keys and Authentication

To add an additional level of trust and security, Empyrean SCS employs rolling key generation in its PKI protocol.

 

As growing volumes of data are encrypted and transmitted through Empyrean SCS, it could theoretically be possible to deduce patterns from the metadata generated in the process. Empyrean SCS defeats this potential risk before it even starts by the random and continuous generation of new keys, digital certificates, such that no discernible data pattern exists.

Cloud Storage

For portions of the communication system used in a HSSE that involve storage of folders and files hosted by third party cloud providers, data can be compromised given that the third-party providers can access end user’s data.

 

Cloud storage providers claim that they provide high levels of security.

However, cloud storage providers have access to their digital keys used for encryption. As a consequence, these third-party providers can grant access to user’s unencrypted data to whomever they choose, including but not limited to:
 

  1. Law Enforcement

  2. Tax Agencies

  3. Intelligence Agencies

  4. 3rd Party Commercial Ventures

  5. Military Agencies

  6. Unauthorized Employee Access
     

Empyrean SCS encrypts your data before it ever enters the cloud, and only the originator holds the private encryption key. So, even if the data were to be accessed in transit or redirected enroute, no other party can read the data.

bottom of page