Using C-Hear Intelligent Format Files to Aid our Country’s Fighting Men and Women
Military Use Cases and Examples
The US Armed Forces need communications systems that are light, flexible, and extremely secure.
C-Hear Technologies has patented a file format that is a data container, where you can encrypt independent data pieces in the container.
Use Case 1:
Command and Control
Orders are created and assembled at headquarters then compartmentalized and encrypted.
Disparate files, like research, surveillance reports, weather, and operational orders and more are then put into the custom client software from there disseminated out into the field.
Command and Control Process
Orders entered into DOD software
data encoded into C-Hear data compartments
Different data given different levels of encryption
Data sent over DOD network onto orders repository
Disseminates to soldiers’ or teams’ devices deployed in-theater
Use Case 2: Using CHIFs for Personnel Management and Logistics
Use Case 2: Official Military Personnel File (OMPF)
We can offer a secure way for organizations like the Navy Personnel Command (BUPERS) to update and securely transfer things like personnel reports and medical records and have them interface with other organizations like the Veterans Affairs (VA).
Portable, Secure, and Efficient Personnel Files
This secure, portable file could aid in everything from gear inventory to operational status. CHIFs can be used to house everything from maintenance records to letters home.
Interface with Other Organizations
With a secure, standardized file type, US Armed Forces can securely interface with organizations like Veterans Benefits Administration and the IRS.
Piece-by-Piece Encryption Creates Levels of Confidentiality
Create different levels of records access for different needs. Gear, inventory, and supplies can be encrypted at different levels of security than medical records or personal information.
Unique Identifiers and Remote Control File Features
Utilizing the CHIF file’s UUID feature, a Unique Identifier is created for each file, and each file can be monitored from a central location. This helps administrators control their file’s destination and access.
Use Case 2:
OMPF – Based Sentry and Entry
Sentries at entry and exit points on ships, bases, federal buildings, and even campaign events can use apps loaded with OMPF or identity-based CHIF files.