NCoded UltraCom operates on Android smartphones and tablets
Keys are generated at the endpoint device creating a one-time use NIST FIPS 140-2 accredited AES-256 encryption key per communication session. The session initiator and the recipients are the only ones that know these keys. The keys are not stored on our servers are also not saved on the UltraCom endpoint. There are destroyed after the communication session is completed with an advanced version of a DOD Wipe.Key negotiations are performed using a Diffie-Hellman exchange, and will only communicate with
Key negotiations are performed using an automated Diffie-Hellman exchange, and will only communicate with other licensed NCoded Communications licensed endpoints.
Yes. The UltraCom communications are synchronous. UltraCom does not store your communications on our servers. Your communications are encrypted and sent to the intended recipient(s), never requiring decryption along the communication path. This creates endpoint-to-endpoint encryption, and it requires the recipient to be online to receive the communications in real time.
Both are available. NCoded Communications provides a turnkey cloud solution. We also have the ability to provide hardware servers in a datacenter, or even downrange in a moving vehicle. NCoded Communications solutions do not store your communications content or the fact the communication ever occurred on the servers. Your communication sessions register to the UltraCom communications server for awareness of when your contacts are online and offline. The servers themselves act as a secure centralized transport mechanism. This allows more flexibility in hosting methods.
Yes. UltraCom supports group chat and group file sharing.
ATAK and RaptorX are US government sponsored systems of record providing stand-alone blue force tracking system integrated into UltraCom. Specifically, UltraCom delivers CoTs messages to ATAK and RaptorX
Ready to get started?
Copyright © NCoded Communications LLC