R&D

END-TO-END ENCRYPTED COMMUNICATION

Overview

To avoid privacy exposure or secret leakage when using communication software, the demand for secure communication has become increasingly intense in recent years. Traditional communication encryption can only ensure that the communication between the user end and the server end is protected. However, end-to-end encrypted communication must ensure only the communicating end users can learn of the communication content. Neither the communication service provider nor the nodes along the transmission path could intercept the content. Gartner, an international research company, pointed out that the field of secure communication is still on the rise. The market research agency GII also indicated that the market size of global communication security is estimated to reach US$11.2 billion in 2027. CHT-TL has developed an end-to-end encrypted communication solution which integrates diverse key management components, Public Key Infrastructure, and multiple client communication architectures. The solution has been licensed to a managed security service provider to build high-security communication services on a zero-trust network environment for governments and enterprises.
END-TO-END ENCRYPTED COMMUNICATION

CORE TECHNOLOGY

  • Communication Software Engineering Technology
  • End-to-End Encryption Technology
  • Key Exchange and Management Technology

End-to-End Encrypted Communication

END-TO-END ENCRYPTED COMMUNICATION

Application Status

Communication Software Engineering Technology:Combining the communication protocols with software technologies, CHT-TL developed communication software on both the client side and the server side with functions of audio calls, video calls, and messaging. This technology has been applied to enterprise mobile extension systems, intelligent home intercom systems, and remote consultation systems. Relevant patents of this technology have been honored with the silver medal award of "2017 Taipei International invention Show & Technomart" and the gold medal award of "2019 Taiwan Innotech Expo."
End-to-End Encryption Technology:End-to-end encryption is a communication method that only the communicating end users can encrypt and decrypt the content. The features of our technology include man-in-the-middle attack protection, remote user authentication, encrypted group calls, multi-client encrypted communication architecture, etc. All of those mentioned above have taken into account both security and practical needs. Different solutions can be provided for various security levels and various demand scenarios, in the form of SDK solutions or total solutions. Relevant patents of this technology have been honored with the silver medal award of "2020 Taiwan Innotech Expo." and the gold medal award of "2022 Taiwan Innotech Expo."
Key Exchange and Management Technology:Key exchange and management are the core of encrypted communication technology. CHT-TL develops a high security key exchange mechanism that supports various forms of key management components, such as hardware security chips, Bluetooth carriers, and software key components. This technology prevents the leakage of messages and ensures that only the communicating end users can encrypt and decrypt the communication content. No third parties, including the servers and the network nodes, can obtain the key needed to decrypt messages.
A total of 12 patents have been applied for and certified by 2022.