G05 telephone scrambler telephone encryption telephone security box (the United States of Taiwan design)
This product is encrypted by a party to pull the fixed telephone voice, be decrypted at the receiver of the telephone voice, can prevent all penetrate into the illegal listener listening fixed telephone network, to achieve communication security.
Scrambler telephone 128bit encryption technology, about one million password combination, difficult to break, to prevent the telecommunication bureau illegal hanging line monitoring TING.
The microcomputer (CPU) control, can ensure the safety and secret call. Memory 9 groups of communication password simple operation, by battery or external power supply does not affect the quality of the telephone line in the online meeting, do secret talks for a specific object. Set exclusive line with password can be used offline (OFF-LINE) password setting, prevent password leakage to improve safety, can be on call at any time setting and change the security code.
DIY is designed for easy installation or disassembly, applicable to all kinds of telephone, lightweight and easy to carry.
The design procedures for the protection of compound, not easy to decode, ensure the conversation content is not stolen TING, machine of two groups of light, easy to understand the feature is enabled, can choose the general power supply or battery of 9V power, low power consumption, both calls are installed, in order to achieve the effect of secrecy.
Ensure personal privacy in the words of the phone call, Microphone, must at the same time in the audio connection encrypted Scramble signal Audio Link Signal, and De-scramble in the device to decrypt incoming call receiver Speaker. The principle of voice encryption device - tone lock, is one of the most direct and effective voice encryption method that is in the middle of the telephone base and handset plus tone lock voice encryption device.
Please provide the power for normal use, do not use a long time. Please remove the battery, please do not disassemble. Unauthorized disassembly without warranty.
Recommend the use of 1 - 5 and five set of frequently used objects from 6 to 0 to join the variable object
As a communication object too much you an address book must be, used to record the password secret combination, general user 10 password is enough. When the tone lock start, both parties can hear the sound from the table tennis. Tone lock using both encryption and decryption. Using the tone lock startup encryption function is different, encryption program at any time change, no one can answer. At any time can change the password (offline settings), the ten groups have been enough (can be replaced at any time daily, Doubleday, password).
Tone lock without encryption, both parties will immediately know (a party encryption, the other party is not encrypted, unilateral cannot use).
Confidential talk, alternative encryption and decryption, mutual use, try not to talk too long unilateral. At the start, terminate, encryption, decryption of the parties may at any time.
This product specification with software version is slightly different, without notice.
Talk to everyone with a high frequency, low points, higher frequency of women and children to speak, speak low frequency adult male. So, the first speech frequency limit for the 300 to 3300 Hertz (Hz). Speech rate into the system, tone lock immediately seize the central frequency (the central frequency, relative example: 1550 Hz in frequency, treble to 1800 Hz, the bass part to 700 Hz).
Tone lock system first speech frequency divided into high frequency (fH) and low frequency (fL) two. The high frequency part is divided into five kinds of frequency (fH1, fH2, fH3, fH4, fH5) and the low frequency part (fL1, fL2, fL3, fL4, fL5). The system will fH frequency and fL frequency portion is mixed, then do the anti frequency inversion (Inverted), and then the transmission of voice encryption to the party. When the calling party receives the encrypted voice, i.e. reverse operation, will restore the voice. But this kind of operation can only make the analog voice.
The system encryption segmentation ten different speech frequency (high frequency and low frequency of each split into five parts), using mathematical methods, subtraction, multiplication, and mixed mode in addition to a variety of different speech. So only in the moment users start the encryption device, encryption method of decision system, a specific formula is not, so every time the encryption equation are not the same. So the encryption, decryption, no solution to crack the party.