enables you to make phone conversations securely and in complete privacy on your mobile phone.
exists in two main editions:
...
...
can be used on the company network equipped with
...
and a locally installed
...
...
.
It does
...
require
...
some server configuration
...
...
...
and it needs to be installed on both caller's and callee's devices.
...
uses
VoIP technology (Voice over IP) and requires Internet access
.This guide provides you a complete overview of all the features and scenarios using both Enterprise and Professional.
Requirements
works on VoIP technology (Voice over IP) and thus an internet access is mandatory.
Goals
The present manual will explain to you how to:
- install and update
- configure the client
- perform secure calls
- send and receive secure messages
Intended audience
This guide is intended for advanced users or customer care operators that would work directly on customers' devices. The reader should also read each Quick Start Guide. No particular background is needed.
The present manual won't explain anything about how the service works or what's under the client's hood. For a better understanding of the service you should read <ac:macro ac:name= as well .
Glossary
In the present documentation you'll meet the following terms:
PBX
A private branch exchange (PBX) is a telephone exchange that serves a particular business or office, as opposed to one that a common carrier or telephone company operates for many businesses or for the general public.
PBXs make connections among the internal telephones of a private organization—usually a business—and also connect them to the public switched telephone network (PSTN) via trunk lines.
Trunk
A trunk line is a circuit connecting telephone switchboards (or other switching equipment), as distinguished from local loop circuit which extends from telephone exchange switching equipment to individual telephones or information origination/termination equipment.
When dealing with a private branch exchange (PBX), trunk lines are the phone lines coming into the PBX from the telephone provider. This differentiates these incoming lines from extension lines that connect the PBX to (usually) individual phone sets.
Extensions
...
Secure Call
A Secure Call is a voice connection which can't be wiretapped. It runs on Voice Over IP (VoIP) communication protocol and can operate in two security models:
...
The end to site provides a strong security level and can be used among two or more equipped devices and/or among SNOM 300 landline devices or also for connecting other PBX, secure or not. If PBX is not secure, we face a crypto-to-clear scenario, where the call is secured between and , but is not secured between and PBX. is the PBX committed to perform Secure Calls both end to end and end to site. It differs from a standard PBX for exposing just the Secure Call service to VoIP clients and can be connected to a standard PBX via SIP Trunks if configured accordingly.
is the VoIP client for Secure Calls connections. It has to be used along with and is deployed in two different models to perform two different security models:
- Professional: used for end to end communications
- Enterprise: used for end to site communications
Because of the security model each one implements, the two versions can't communicate with each other. Plus, the Professional edition can only perform direct calls to another Professional Devices. On the other hand the Enterprise Edition can also perform Conference Calls and Three-Way Calls.
Conference Rooms
The Conference Room is the kind of call that more persons can partecipate. The conference calls are usually defined as "rooms", whose access can be limited by time settings or pass code.
Warning |
---|
Conference rooms can be accessed only by using Enterprise Edition. |
Conference Calls
Conference Call, as its name implies, is a call involving at least three users. It differs from Conference Room by the fact that Conference Call is one Secure Call at which third parties got invited. So it's one sort of dynamic conference room. All users invited are thus added to conversation in progress by either caller or callee.
Warning |
---|
Conference rooms can be accessed only by using Enterprise Edition. |
Call transfer
Call transfer is a typical PBX performance which is implemented in as well, but only if the users are running a Enterprise Edition. One of the partecipant can hold on his/hers peer and perform a new call to the number to which trasfer the call. If the desired number picks up the call, then the transferrer can close the communication and let his/hers peer talk with the trasferred number.
Jitter
In VoIP systems audio signal is split into multiple packets, which are sent over network. Due to network equipment behavior, packets flow is never regular and constant. Especially on mobile/radio networks packets are delivered in bursts, leading to irregular and variable latency. Jitter is the variation in latency as measured in the variability over time of the packet latency across a network.
Automatic Activation
The Automatic Activation is the way of create new users automatically without any need they interact with anybody. As from user's side the procedure is that he/she gets first an invite SMS useful to download the application
and then a configuration SMS which provides automatic configuration of the client itself. All the user has to do is follow the links into both the SMSes and it goes automatically on line.Provisioning
The Provisioning is the configuration needed for delivering both for the
application and its configuration and nowadays it's used by the Automatic Activation only. Presence
The Presence is how we call the user's status, also known as the user's reachability. By checking an user's Presence it is possible to know if a he/she is on line and can receive a secure call before trying to.
Audio Messaging
The Audio Messaging is the means used by
for communicating to an user about the failed calls. You have several messages that can be spoken and each of them can be localised in English, French, Italian, Spanish and German.Secure Message
Secure Message is a text message that can be sent and received only by using and that shares the same communication infrastructure of Secure Call. The maximum length of each message is 160 character.
...
Manuals.
Caveat
The figures in this document are solely for illustrative purposes. They give you an idea about the essential information you are supposed to see on the screen while executing the test cases. However the layout of the screen and the details of the information may be changed in subsequent revisions of the software and these modifications are not obligatory reflected in this document. When considering whether a test case passed or not, you should relay only on the textual description of the test case.
...