Using C-Hear Intelligent Format Files to Aid our Country’s Fighting Men and Women

Military Use Cases and Examples

The US Armed Forces need communications systems that are light, flexible, and extremely secure.

C-Hear Technologies has patented a file format that is a data container, where you can encrypt independent data pieces in the container.


Use Case 1:
Command and Control

Orders are created and assembled at headquarters then compartmentalized and encrypted.

Disparate files, like research, surveillance reports, weather, and operational orders and more are then put into the custom client software from there disseminated out into the field.


Command and Control Process

.1

Orders entered into DOD software

.2

data encoded into C-Hear data compartments

.3

Different data given different levels of encryption

.4

Data sent over DOD network onto orders repository

.5

Disseminates to soldiers’ or teams’ devices deployed in-theater

Use Case 2: Using CHIFs for Personnel Management and Logistics

ScreenShot of Orders

Use Case 2: Official Military Personnel File (OMPF)

We can offer a secure way for organizations like the Navy Personnel Command (BUPERS) to update and securely transfer things like personnel reports and medical records and have them interface with other organizations like the Veterans Affairs (VA).

Portable, Secure, and Efficient Personnel Files

This secure, portable file could aid in everything from gear inventory to operational status. CHIFs can be used to house everything from maintenance records to letters home.

Interface with Other Organizations

With a secure, standardized file type, US Armed Forces can securely interface with organizations like Veterans Benefits Administration and the IRS.

Piece-by-Piece Encryption Creates Levels of Confidentiality

Create different levels of records access for different needs. Gear, inventory, and supplies can be encrypted at different levels of security than medical records or personal information. 

Unique Identifiers and Remote Control File Features

Utilizing the CHIF file’s UUID feature, a Unique Identifier is created for each file, and each file can be monitored from a central location. This helps administrators control their file’s destination and access.

Use Case 2:
OMPF – Based Sentry and Entry

Sentries at entry and exit points on ships, bases, federal buildings, and even campaign events can use apps loaded with OMPF or identity-based CHIF files.