SlideShare a Scribd company logo
1 of 39
Download to read offline
© 2005 - 2011 PrivateWave Italia SpA - All trademarks are property of their respective owners. All rights reserved.
Demo version for evaluation only
NOT FOR SALE: the PrivateGSM version you can purchase
is sold within the Enterprise VoIP Security Suite solution.
1
User manual, September 2010
Contents
1. Introduction........................................................................................................................................ 3
2. PrivateGSM Demo installation pre-requisites ................................................................................. 4
3. Downloading and installing the software....................................................................................... 5
3.1. Installation via email/text message ..................................................................................................... 5
3.1.1. Download............................................................................................................................... 6
3.1.2. Installation.............................................................................................................................. 6
3.1.3. Activation ............................................................................................................................... 7
3.1.4. Selecting the access point after installation ............................................................................. 8
3.2. PC installation.................................................................................................................................... 8
3.2.1. Installation via Bluetooth......................................................................................................... 8
3.2.2. Installation via USB.................................................................................................................. 8
4. PrivateGSM Demo operating modes................................................................................................ 9
4.1. Opening the PrivateGSM menu.......................................................................................................... 9
5. Making a secure call with PrivateGSM Demo ............................................................................... 10
5.1. Secure number ................................................................................................................................ 10
5.2. Call modes....................................................................................................................................... 10
5.3. Secure call to phone numbers and contacts entering the PrivateGSM +801 prefix ........................... 11
5.3.1. Dialing a secure call .............................................................................................................. 11
5.3.2. Dialing a secure call from contacts........................................................................................ 11
5.4. Secure call to phone numbers and contacts using the PrivateGSM menu and not the +801 prefix... 12
5.4.1. Dialing a secure call .............................................................................................................. 12
5.4.2. Dialing a secure call from contacts........................................................................................ 13
6. Receiving a secure call..................................................................................................................... 15
7. Inviting a contact to use PrivateGSM Demo.................................................................................. 16
8. Verifying call security ...................................................................................................................... 18
9. Identifying a wiretapping attempt ................................................................................................ 19
9.1. Attempt to wiretap a call to a "trusted" contact.............................................................................. 19
9.2. Attempt to wiretap a call to a contact not yet saved as "trusted".................................................... 19
10. Checking the call in progress........................................................................................................ 21
10.1. Call status...................................................................................................................................... 21
10.1.1. Call status icons.................................................................................................................. 21
10.2. Call quality level............................................................................................................................. 22
10.2.1. Call quality level icons......................................................................................................... 22
2
User manual, September 2010
11. Call functions.................................................................................................................................. 24
11.1. Adjusting audio volume ................................................................................................................. 24
11.2. Turning speaker phone and microphone on and off ...................................................................... 24
12. Other functions and settings........................................................................................................ 25
12.1. Changing the Access Point ............................................................................................................ 25
12.2. Ending and re-starting an Internet connection ............................................................................... 25
12.3. Exit the application and end the Internet connection ..................................................................... 26
13. What you should know before you use PrivateGSM Demo ...................................................... 28
13.1. Standard call priority (voice) ........................................................................................................... 28
13.2. When doesn't PrivateGSM protect your data ................................................................................. 28
13.3. Call quality when moving............................................................................................................... 28
13.4. Networks and call quality............................................................................................................... 29
13.5. Rates ............................................................................................................................................. 30
13.5.1. Limited traffic rate plan disadvantages................................................................................ 31
13.6. Differences between secure and standard calls .............................................................................. 31
14. User license and license code........................................................................................................ 32
14.1. License code .................................................................................................................................. 32
14.2. Receive Only mode ........................................................................................................................ 33
14.3. Checking your user license............................................................................................................. 33
15. Most frequent VoIP network problems ....................................................................................... 34
15.1. PrivateGSM does not connect and does not let me make calls ....................................................... 34
15.2. The call interrupts with a failed connection error ........................................................................... 34
15.3. Only one caller can hear the other (one-way)................................................................................. 35
15.4. Dialing takes one or more minutes................................................................................................. 35
15.5. Frequent audio interferences ......................................................................................................... 36
16. Functional notes............................................................................................................................. 37
16.1. Incompatibility with other installed applications............................................................................. 37
17. How to contact us.......................................................................................................................... 38
Note:
The following manual contains valid yet generic technical information. Some phone screen and menu
references may vary according to the model.
3
User manual, September 2010
1. Introduction
PrivateGSM, within the Enterprise VoIP Security Suite guarantees phone conversation security and
privacy on mobile phones in a company network. The Demo version can be used to try how the UI
works and what is the software operating principle. Once installed on a phone, the demo is able to
encrypt all incoming and outgoing calls from/to other PrivateGSM users: thus, the software must be
installed on the caller and the called party’s phones.
To help you to build a contact network to make some tests, the Demo version has the “invite others”
function.
PrivateGSM uses VoIP technology (Voice over IP) and requires Internet access.
Before making a secure call, PrivateGSM checks the exchange keys, letting callers personally check call
security.
4
User manual, September 2010
2. PrivateGSM Demo installation pre-requisites
Before installing the software, make sure the following requisites are met:
Mobile phone compatibility. Check the Support section at: www.privatewave.com
International text message capability. Check your service contract. A text message must be sent
to a number in the United Kingdom to activate the
product.
Full internet access service. The phone service contract must include full internet
access. WAP or MMS connections are not admitted.
Note:
NOKIA PC Suite must be installed on your PC to install the software via USB.
5
User manual, September 2010
3. Downloading and installing the software
You can install PrivateGSM Demo on your mobile phone via email/text message or PC (via Bluetooth or
USB port).
Note:
You can also download PrivateGSM to your phone at www.privatewave.com. In this case, enter the
Trial section to download the file to the phone connected to Internet.
Once the installation file download has completed, the installation wizard completes the setup.
3.1. Installation via email/text message
The phone must have Internet access for this installation.
To download, install and activate software via email/text message:
1. Open pages Trial and product Download at www.privatewave.com.
2. Read and accept the license and privacy consent terms.
3. Select your phone model.
4. Select option via email/text message.
5. Enter your email address or mobile phone number.
Click Download to receive an installation email/text message. Click on the link in the message to
download the software and launch the installation and activation procedure.
Note:
The text message is sent to a UK PrivateWave number (UK + 44). Therefore, your SIM card must be
enabled to send international text messages and your credit balance must be able to cover these charges.
6
User manual, September 2010
3.1.1. Download
 
1. Click on the link 2. Confirm download 3. Check
progress
3.1.2. Installation
 
4. Confirm installation 5. Confirm to continue 6. Select the phone
memory
7
User manual, September 2010
 
7. Accept the license agreement 8. Enable
auto-start
9. Activate technical support
3.1.3. Activation
 
10. Select the full
internet access point
11. Select automatic activation 12. A text message is sent
to a PrivateGSM number
IMPORTANT
We strongly encourage automatic activation.
Manual activation lets you change advanced PrivateGSM settings but this is only
recommended for expert users. Some automation, specifically designed to
simplify product use, will be lost with manual activation.
!
8
User manual, September 2010
3.1.4. Selecting the access point after installation
After installation, select the full internet access point. If you selected an incorrect access point (with
consequent difficulties in accessing the internet or sending the activation text message) you can change it
later and re-launch product activation (see chapter 12.1 “Changing the Access Point”).
3.2. PC installation
You can download the software to your PC and install it on your phone via Bluetooth or USB port (in the
latter case, you will need the Nokia PC Suite Application Installation function).
To download, install and activate software via PC:
1. Open pages Trial and product Download at www.privatewave.com.
2. Read and accept the license and privacy consent terms.
3. Select your phone model.
4. Select option via PC.
Click Download, save the file on your PC and install it on your phone via Bluetooth or USB port.
3.2.1. Installation via Bluetooth
1. Send the file to your phone via Bluetooth protocol.
2. Open the message in your Inbox. The wizard is launched (see procedure screen 4
3.1 “Installation via email/text message”).
3.2.2. Installation via USB
1. Connect your phone to the PC via USB port.
2. Run Nokia PC Suite, select your phone and install the software using the Application
Installation function.
3. The wizard is launched (see procedure screen 4 3.1 “Installation via email/text message”).
9
User manual, September 2010
4. PrivateGSM Demo operating modes
If you selected auto-start during installation, PrivateGSM will automatically activate each time you turn on
your phone (hidden in the background). When an Internet connection is available, you can:
• Open the PrivateGSM main menu.
• Receive and make secure calls.
• End the connection without exiting the application.
• End the connection and exit the application.
IMPORTANT
To make a secure call, the called party must be running PrivateGSM software and
be connected to the Internet as well!!
4.1. Opening the PrivateGSM menu
All other application functions are accessible from the PrivateGSM menu.
To open the PrivateGSM menu:
1. Dial “801” and press
the dial button
2. The PrivateGSM menu appears.
Click Hide to return the application to
thebackground
10
User manual, September 2010
5. Making a secure call with PrivateGSM Demo
5.1. Secure number
Calls with PrivateGSM are simply identified by the “+801” prefix in front of the number to be dialed
including the international prefix without zeros. For example:
“+801 44 333 1234567”
+801 PrivateGSM prefix, including ‘+’
44 International country code for UK without zeros
333 1234567 Phone number
Note:
For quick dialing, we recommend you save numbers with the +801 prefix as "secure" contacts in your
phone book.
5.2. Call modes
PrivateGSM lets you:
• Make secure calls to phone numbers and contacts using the PrivateGSM +801 prefix. In this case,
you need not open the main menu if the application is on in background.
• Make secure calls to phone numbers and contacts without entering the PrivateGSM prefix by
using directly the application menu.
11
User manual, September 2010
5.3. Secure call to phone numbers and contacts entering the PrivateGSM
+801 prefix
5.3.1. Dialing a secure call
You can dial a secure call by entering the “+801” prefix before the number to be dialed, including the
international country code without zeros.
To dial a secure call complete with prefix:
Enter the “+801” prefix before
the number and press
the dial button
5.3.2. Dialing a secure call from contacts
You can call a number previously saved in the phone book with the PrivateGSM prefix (see chapter
5.1 “Secure number”).
12
User manual, September 2010
To make a secure call to a contact saved in your address book with the PrivateGSM prefix:
Select a "secure" contact and press the
dial button
5.4. Secure call to phone numbers and contacts using the PrivateGSM menu
and not the +801 prefix
5.4.1. Dialing a secure call
You can make a secure call from the PrivateGSM menu by simply entering the number complete with
international country code (i.e.: +44 for UK) and pressing the dial button.
Note 1:
On devices with OS Symbian 9 5th ed. (touch screen) select Type number in Options menu: a virtual
keyboard will appear.
Note 2:
Using this method, the call will not leave any indication in your phone register.
Suggestion:
If you intend to frequently make secure calls to the same number, add it to your phone book with the
PrivateGSM prefix (see chapter 5.1 “Secure number”).
13
User manual, September 2010
To dial a secure call using the PrivateGSM menu:
1. Dial “801” and press
the dial button
2. Enter the phone number complete
with international country code and press
the dial button
5.4.2. Dialing a secure call from contacts
You can make secure calls from the PrivateGSM menu by simply selecting a contact from your phone
book.
Note:
Using this method, the call will not leave any indication in your phone register.
Suggestion:
If you intend to frequently make secure calls to the same number, add it to your phone book with the
PrivateGSM prefix (see chapter 5.1 “Secure number”).
14
User manual, September 2010
To dial a secure call to a contact using the PrivateGSM menu:
 
1. Dial “801” and press
the dial button
2. Select Secure call 3. Select a contact and press the dial
button
15
User manual, September 2010
6. Receiving a secure call
PrivateGSM must be on and you must be connected to the Internet to receive a secure call.
Note 1:
A secure call has a ring tone other than a standard call and can be answered or refused. The ring tone is
set by PrivateGSM and cannot be customized.
Note 2:
Regardless of the license status, if PrivateGSM is correctly installed (on with connection available) you can
always receive calls (see chapter 14 “User license and license code”).
To receive a secure call:
Accept the secure call by pressing
the dial button
16
User manual, September 2010
7. Inviting a contact to use PrivateGSM Demo
You can invite a contact from your phone book to use PrivateGSM. The contact will receive a text
message with a link, inviting him to install the product.
To invite a contact from you phone book:
 
1. Select Invite others 2. Select a contact 3. Confirm
invitation delivery
The invited contact need only click on the link in the message: if the mobile phone is compatible, the
wizard launches (see procedure screen 4 3.1 “Installation via email/text message”).
17
User manual, September 2010
To accept an invitation to install PrivateGSM:
1. Click on the link: the installation
wizard will be launched
Note:
The “Invite others” option is available only for the Demo version, in order to allow users to build a contact
network to make secure calls.
18
User manual, September 2010
8. Verifying call security
PrivateGSM Demo uses an encryption and security system based on ZRTP protocol. This protocol also
includes "human" verification of the two key exchanges displayed at the beginning of a call. Key
exchanges are made up of two words in English, randomly generated for each call. The key exchanges
displayed on the two phones must be verbally compared by the two callers to guarantee call security.
To verify call security:

Matching key
exchanges:
the call
is secure!

1. The caller reads
his key out loud
2. The called party
makes sure it matches his
Suggestion:
After making sure the key exchanges match and that the called party is the person you want to contact,
save the contact in the phone book as “trusted” by clicking Trust. This way, you need not verify the key
exchange whenever you call this contact (trusted) in the future. Key exchanges are no longer highlighted
in orange. Security is already guaranteed.
Thus, in normal conditions, subsequent communications with a "trusted" contact can start without the
need of verbal verification.
Keys are highlighted in orange and should only be verified in the event of wiretapping attempts or
changes to one of the two phones' configurations. In this case, the keys must be verbally verified or the
call immediately interrupted.
19
User manual, September 2010
9. Identifying a wiretapping attempt
9.1. Attempt to wiretap a call to a "trusted" contact
If a third party attempts to wiretap a call to a previously verified contact saved as trusted, PrivateGSM
automatically detects the wiretapping attempt, interrupts the call and displays the following security alert.
Wiretapping attempt alert
After receiving a security alert, you must always verbally re-verify the key exchanges and re-save your
contact as trusted for future calls (see chapter 8 “Verifying call security”).
IMPORTANT
The security alert may even be displayed when there is no wiretapping attempt
but when your contact changes his phone number or phone. It may also be
displayed when the software is re-installed on one of your trusted contact's
phones. You must always re-verify contact security after a security alert.
!
9.2. Attempt to wiretap a call to a contact not yet saved as "trusted"
In the event a third party attempts to wiretap a call to a contact not yet saved as trusted, PrivateGSM
displays two different key exchanges on the two phones. The callers should verbally verify the differences
between the two key exchanges and interrupt the call.
20
User manual, September 2010

NON matching key
exchanges:
wiretapping
attempt
in progress!

1. The caller reads
his key out loud
2. The called party verifies
that keys do NOT match
and interrupts the call!
21
User manual, September 2010
10. Checking the call in progress
During a secure call, PrivateGSM displays:
• key exchange status at the beginning of the call
• connection quality
10.1. Call status
To establish a connection, PrivateGSM completes three phases; an icon shows on the screen the call
status:
Exchanging ZRTP keys
10.1.1. Call status icons
Red light
Starting the
connection
Connection not yet established. This
step may take several seconds (see chapter
13.6 “Differences between secure and
standard calls”).
22
User manual, September 2010
Yellow light
Key
exchange
Connection established but ZRTP keys
are being exchanged.
Green light
Secure call
established
Connection established and secure. You
can now speak in a secure way.
10.2. Call quality level
Some factors that affect the GSM network (i.e.: GPRS use, poor signal, frequent radio cell changes,
roaming), could decrease call quality, increasing voice delay. An icon shows the current call quality level:
Poor connection quality
10.2.1. Call quality level icons
Poor connection quality
23
User manual, September 2010
Average connection quality
Good connection quality
Note:
If connection quality remains poor, we suggest you seek better network coverage or connect to a better
broadband Wi-Fi access point.
24
User manual, September 2010
11. Call functions
11.1. Adjusting audio volume
Adjusting secure call volume is the same as adjusting standard call volume.
To adjust the volume during a secure call:
• Use the volume key on your phone (if applicable).
• Use the scroll key, scrolling left to lower volume or right to raise it.
11.2. Turning speaker phone and microphone on and off
You can turn on your speaker phone or mute your microphone during a call.
To turn speaker phone on/off during a secure call:
• Click Options > Activate loudspeaker
To turn the microphone on/off during a secure call:
• Click Options > Mute microphone
Speaker phone and microphone menu
25
User manual, September 2010
12. Other functions and settings
12.1. Changing the Access Point
To change the Access Point, select Settings > Default access Point from the PrivateGSM menu. Restart
the application for change to take effect. PrivateGSM automatically reconnects after the change.
IMPORTANT
WAP or MMS access points cannot be used.!
To change the access point:
1. Select Default access point 2. Select the access point
12.2. Ending and re-starting an Internet connection
You can end the Internet connection to stop receiving secure calls. The application remains in the
background and can be started at any time by starting a connection.
26
User manual, September 2010
To end and re-start an Internet connection
1. Select Options 2. Select Go offline/Go online
IMPORTANT
You cannot receive or make secure calls when you are not connected to the
Internet.!
12.3. Exit the application and end the Internet connection
To stop receiving secure calls, exit the application, automatically ending the Internet connection.
To re-launch the application, open the mobile phone menu and select PrivateGSM .The connection is
automatically re-started.
IMPORTANT
You cannot receive or make secure calls when you are not connected to the
Internet.!
27
User manual, September 2010
To exit the application and automatically close the connection:
1. Select Options 2. Select Exit
28
User manual, September 2010
13. What you should know before you use PrivateGSM
13.1. Standard call priority (voice)
If the user receives a standard call (voice) during a secure call (VoIP), the following may occur:
1. The user accepts the voice call: since this channel takes priority over VoIP, the secure call is
automatically interrupted.
2. The user refuses the voice call: the VoIP call remains connected and the user can continue the
secure conversation.
13.2. When doesn't PrivateGSM protect your data
PrivateGSM cannot protect your conversations in the following cases:
1. Wiretapping by bugs placed in your home, office or car.
2. Wiretapping by long distance directional microphones.
PrivateGSM cannot protect you from the following geographic tracking systems:
1. GSM mobile phone locators
2. GPS locators
Note:
We suggest you consult security experts to protect yourself against these types of devices.
13.3. Call quality when moving
It may take longer to establish a connection or experience short audio interruptions when travelling by car
or high speed train. This is because you are switching from one GSM network radio cell to another. Call
quality depends on the local infrastructures the phone operator uses.
For example, in the suburbs, the GSM network is made up of less cells but with higher coverage;
switching from one cell to another is less frequent (i.e.: highway). Contrarily, in metropolitan areas, the
29
User manual, September 2010
GSM network is made up of more cells but with lower coverage; switching from one cell to another is
more frequent (i.e.: expressways and ring roads).
Note:
No perceivable vocal defects were demonstrated in tests conducted at 150 km/h with PrivateGSM.
13.4. Networks and call quality
Secure calls with PrivateGSM use VoIP technology that exploits an Internet connection to make a call via
TCP/IP and UDP packet exchange. Thus, data packets containing voice, encoded and encrypted
information are routed on the network during a call.
PrivateGSM secure calls thus require an open Internet connection without any firewall or restriction by the
caller or called party.
Mobile phone operators typically offer two types of Internet access with two different Access Points:
• Full Internet access: supports all transmission protocols. Required by PrivateGSM.
• WAP/MMS access: does not allow PrivateGSM to work.
Following is a list of network types, ordered by quality, band width1
and latency2
:
Technology Wi-Fi HSD PA UMTS EDGE GPRS Satellite
Quality Best Worst
1
Band width determines the amount of data transmitted per second.
2
Latency determines the time required for data to reach its destination.
30
User manual, September 2010
Note:
To check your mobile phone network, check the symbol next to the signal bar:
3.5G network (HSDPA)
Suggestion:
Use Wi-Fi when available. There are no additional access costs and call quality is definitely better. For
further information, see chapter 12.1 “Changing the Access Point”.
13.5. Rates
PrivateGSM secure calls use an Internet connection thus data traffic is charged. Costs depend on the rate
set with your phone service provider.
To receive secure calls, PrivateGSM must keep an Internet connection open. You should, therefore,
choose a rate that lets you stay online as long as you need to receive and make secure calls (i.e.: 24/7,
or business hours).
Note:
We suggest you consult your operator to set a flat rate tied to your connection needs.
Note:
When using PrivateGSM abroad, make sure you have a data traffic rate plan that lets you check costs.
31
User manual, September 2010
13.5.1. Limited traffic rate plan disadvantages
Data limited traffic rate plan You pay according to data traffic when online. On average,
PrivateGSM exchanges data packets for a total of 2MB a
month. This is calculated considering average band width
between 100k/minute and 200k/minute. Thus 1MB of Internet
traffic equals a minimum of 5 minutes to a maximum of 10
minutes.
Time limited rate plan You pay according to connection time. These planes are
unfavorable and not recommended for PrivateGSM use.
13.6. Differences between secure and standard calls
Delays in establishing a connection To establish a connection with the called party, PrivateGSM
needs from 5 to 60 seconds based on the caller and called
party's Internet connection qualities.
Voice delay Unlike standard calls, VoIP secure calls may be subject to voice
delays from 1/5 of a second to a maximum of two seconds.
This depends on the technology adopted by the data
transmission network. The better the connection, the shorter
the voice delay.
Different ring tone PrivateGSM secure calls use different ring tone than standard
calls (not customizable).
Battery charge Internet connection may lower your phone's battery life.
Average mobile phone battery consumption may increase from
a minimum of 5% to a maximum of 35% based on the type of
network used by the Internet connection.
Note:
A Wi-Fi network consumes more than a 3G network. A 3G
network consumes more than a 2G network.
32
User manual, September 2010
14. User license and license code
PrivateGSM Demo can work in two different modes:
• Full: you can both make and receive secure calls in this mode.
• Receive Only: you can only receive secure calls in this mode.
Upon first installation, PrivateGSM is set to Full mode for a 15-day trial period. At the end of the trial
period, the software automatically switches to Receive Only.
Note:
In a contact network, you only need one contact with a Full license. Other PrivateGSM users can have
Receive Only modes. To expand the contact network, invite contacts using the specific PrivateGSM
function (see chapter 7 “Inviting a contact to use PrivateGSM Demo”). Each contact must have a mobile
phone model compatible with the software.
14.1. License code – status icon
License status is shown by the license icon that appears in PrivateGSM menu:
Trial period Full mode
Receive Only mode
Waiting for server response after
license code registration.
33
User manual, September 2010
1. User license expired: you are asked to enter
a new license code.
14.2. Receive Only mode
Receive Only mode starts when the trial license expires. It lets you continue to receive secure calls for as
long as the software is installed on your phone.
14.3. Checking your user license
To check your current user license:
1. Select License 2. Check your user license
34
User manual, September 2010
15. Most frequent VoIP network problems
15.1. PrivateGSM does not connect and does not let me make calls
Problem
PrivateGSM does not correctly go online and generates an error during registration/connection.
• Diagnostics
The access point in use is incorrect and/or PrivateGSM is connected to a network that is not
correctly set.
Possible solution
- Check whether the phone can access the Internet, opening any web page.
- Check whether the access point in use is a full Internet connection and not a WAP or MMS
connection. You can only use PrivateGSM with a full Internet connection.
- Check whether the Wi-Fi network you're connected to supports TCP/IP and UDP protocols.
Internet connections with proxy servers do not work with PrivateGSM and firewalls need to
be opened to allow internal networks to work with a proxy server.
- Check whether your SIM card balance (top-up) is sufficient.
- Check whether Internet connections are enabled on the SIM card. Some phone operators
require you set a specific rate plane for Internet access which must be requested by the user
and confirmed by the operator.
15.2. The call interrupts with a failed connection error
Problem
PrivateGSM is correctly online and lets you make/receive a secure call but the call never gets past the
Exchanging keys phase (yellow light). PrivateGSM interrupts the call with a failed connection error and
you cannot hear the called party.
• Diagnostics
The access point in use is incorrect and/or PrivateGSM is connected to a network that is not
correctly set.
35
User manual, September 2010
Possible solution
- Check whether the phone can access the Internet, opening any web page.
- Check whether the access point in use is a full Internet connection and not a WAP or
MMS connection. You can only use PrivateGSM with a full Internet connection.
- Make sure the firewall allows UDP protocol output.
- Change access point.
15.3. Only one caller can hear the other (one-way)
Problem
PrivateGSM is correctly online and lets you make/receive a secure call.
It reaches the Secure call established (green light) status, exchanging keys, but only one caller can hear
the other.
• Diagnostics
The caller's PrivateGSM has audio problems, due to incorrect settings. For example, it is using a
WAP access point and not a full Internet access point or a network with incorrect settings.
Possible solution
- Check whether the access point in use is a full Internet connection and not a WAP or MMS
connection. You can only use PrivateGSM with a full Internet connection.
15.4. Dialing takes one or more minutes
Problem
PrivateGSM makes/receives a secure call but remains in the Starting a connection phase (red light) for
one or more minutes, hanging up with a failed connection message. Re-dialing, the call sometimes goes
through.
36
User manual, September 2010
• Diagnostics
PrivateGSM uses the Internet via a radio frequency range provided by the operator or Wi-Fi
connection in use. Radio frequencies are subject to data packet loss in certain environmental
conditions such as if you are close to a large wall, a repeater or in the event of network overload,
for example, during a public event.
During a voice call, a minimum level of data packet loss is negligible for voice quality but may be
a determinant factor for that part of the signal dedicated to the phone system (i.e.: SIP/TLS
protocols used to make a call, receive a call, end a call, and so on). Data transmission may thus be
difficult during the start/end call phase even if the phone displays a good signal level.
Possible solution
- Check whether the two callers are surrounded by radio disturbances.
- If using PrivateGSM in a crowded place, decide whether you should switch from the UMTS
network to the GSM network. In fact, a UMTS network that works at 2,100 MHz is more
crowded than a GSM network that works at 900/1,800 MHz.
15.5. Frequent audio interferences
Problem
PrivateGSM calls are subject to frequent audio interruptions or interferences and the conversation is
difficult.
• Diagnostics
Internet connections are often overloaded and mobile phone operators do not have enough
bandwidth. In these cases, establishing a connection may be difficult or impossible or, once
established, audio may be suddenly interrupted and similar problems occur.
Possible solution
- Make sure the network is actually overloaded: open a web page (N.B.: pick a web page you
do not frequently open). A page that does not load or loads slowly, timing out, indicates that
the network is overloaded and cannot be used for secure calls.
37
User manual, September 2010
16. Functional notes
16.1. Incompatibility with other installed applications
PrivateGSM uses APS (Audio Proxy Server) and VAS (VoIP Audio Service) which, if installed on your phone
since used by other applications (i.e.: Fring, instant message software), may interfere with correct software
operations. In this case, uninstall the other applications and re-install PrivateGSM.
38
User manual, September 2010
17. How to contact us
Visit us at:
http://www.privatewave.com
Contact our technical staff:
tel: +39 02 911930891 Monday through Friday, 10 AM to 12 PM, 2.30 PM to 4.30 PM.
email: support@privatewave.com
We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the
software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed-
mobile encryption in a company network.
For more information or technical details on the Enterprise VoIP Security Suite, get in contact with our
sales team:
email: sales@privatewave.com

More Related Content

What's hot

Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...
Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...
Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...SANTIAGO PABLO ALBERTO
 
Alcatel lucent 400 dect user guide
Alcatel lucent 400 dect user guideAlcatel lucent 400 dect user guide
Alcatel lucent 400 dect user guideDarule Drone
 
iBonus Loyalty Card
 iBonus Loyalty Card  iBonus Loyalty Card
iBonus Loyalty Card smartloyalty
 
MXIE Phone User's Manual
MXIE Phone User's ManualMXIE Phone User's Manual
MXIE Phone User's ManualMatthew Rathbun
 
A byte of python (2005)
A byte of python (2005)A byte of python (2005)
A byte of python (2005)vaibhsss
 
Gigaset S650H Pro Digital Cordless Phone
Gigaset S650H Pro Digital Cordless PhoneGigaset S650H Pro Digital Cordless Phone
Gigaset S650H Pro Digital Cordless PhoneTelephones Online
 
Dvdr77 17b Dfu Aen
Dvdr77 17b Dfu AenDvdr77 17b Dfu Aen
Dvdr77 17b Dfu Aenguest5e61fbf
 
Huawei u8220
Huawei u8220Huawei u8220
Huawei u8220Nay Soe
 
Adv android 1-0-cc
Adv android 1-0-ccAdv android 1-0-cc
Adv android 1-0-ccTiểu Khê
 
Salesforce Administrator | Security Implementation Guide 2014
Salesforce Administrator | Security Implementation Guide 2014Salesforce Administrator | Security Implementation Guide 2014
Salesforce Administrator | Security Implementation Guide 2014Piper powered by Icontrol
 
Datavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveDatavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveAV ProfShop
 
Catalogo Lineas Y Colores
Catalogo Lineas Y ColoresCatalogo Lineas Y Colores
Catalogo Lineas Y Coloresyoviraca
 

What's hot (17)

Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...
Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...
Microcontroladores: Introducción para principiantes al lenguaje ensamblador p...
 
Alcatel lucent 400 dect user guide
Alcatel lucent 400 dect user guideAlcatel lucent 400 dect user guide
Alcatel lucent 400 dect user guide
 
iBonus Loyalty Card
 iBonus Loyalty Card  iBonus Loyalty Card
iBonus Loyalty Card
 
MXIE Phone User's Manual
MXIE Phone User's ManualMXIE Phone User's Manual
MXIE Phone User's Manual
 
A byte of python (2005)
A byte of python (2005)A byte of python (2005)
A byte of python (2005)
 
Spelling bee
Spelling beeSpelling bee
Spelling bee
 
Gigaset S650H Pro Digital Cordless Phone
Gigaset S650H Pro Digital Cordless PhoneGigaset S650H Pro Digital Cordless Phone
Gigaset S650H Pro Digital Cordless Phone
 
Dvdr77 17b Dfu Aen
Dvdr77 17b Dfu AenDvdr77 17b Dfu Aen
Dvdr77 17b Dfu Aen
 
Huawei u8220
Huawei u8220Huawei u8220
Huawei u8220
 
Icp
IcpIcp
Icp
 
Adv android 1-0-cc
Adv android 1-0-ccAdv android 1-0-cc
Adv android 1-0-cc
 
Working withunix
Working withunixWorking withunix
Working withunix
 
Salesforce Administrator | Security Implementation Guide 2014
Salesforce Administrator | Security Implementation Guide 2014Salesforce Administrator | Security Implementation Guide 2014
Salesforce Administrator | Security Implementation Guide 2014
 
Datavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard driveDatavideo DN-600 HArd Drive Recorder with removable hard drive
Datavideo DN-600 HArd Drive Recorder with removable hard drive
 
Assembly
AssemblyAssembly
Assembly
 
Samsung Vice0
Samsung Vice0Samsung Vice0
Samsung Vice0
 
Catalogo Lineas Y Colores
Catalogo Lineas Y ColoresCatalogo Lineas Y Colores
Catalogo Lineas Y Colores
 

Viewers also liked

Soft White Wheat Analysis
Soft White Wheat AnalysisSoft White Wheat Analysis
Soft White Wheat AnalysisDrew Lein
 
Adoptame Plis
Adoptame PlisAdoptame Plis
Adoptame Plismelysiu3m
 
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03C:\Documents And Settings\Demon\Desktop\Edulugu 04 03
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03LKK
 
Ortuella!
Ortuella!Ortuella!
Ortuella!Leire8
 
H:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety TrainingH:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety Trainingguestdd47c0
 
Utility Cost Savings Presentation
Utility Cost Savings PresentationUtility Cost Savings Presentation
Utility Cost Savings Presentationdivemanga
 
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaper
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaperInsourcing_through_Social_Referrals_HAPPY2REFER_WhitePaper
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaperAtul Chatur
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Pointmichael foxwell
 
PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateWave Italia SpA
 
Gala Alumnas Danya Sharif. Diciembre 2010
Gala Alumnas Danya Sharif. Diciembre 2010Gala Alumnas Danya Sharif. Diciembre 2010
Gala Alumnas Danya Sharif. Diciembre 2010Paula Velozo
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)PrivateWave Italia SpA
 
Clf 7 steps to becoming an engaging leader
Clf   7 steps to becoming an engaging leaderClf   7 steps to becoming an engaging leader
Clf 7 steps to becoming an engaging leaderThe Impact Factory
 

Viewers also liked (20)

Soft White Wheat Analysis
Soft White Wheat AnalysisSoft White Wheat Analysis
Soft White Wheat Analysis
 
Adoptame Plis
Adoptame PlisAdoptame Plis
Adoptame Plis
 
News Writinghernan
News WritinghernanNews Writinghernan
News Writinghernan
 
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03C:\Documents And Settings\Demon\Desktop\Edulugu 04 03
C:\Documents And Settings\Demon\Desktop\Edulugu 04 03
 
Ortuella!
Ortuella!Ortuella!
Ortuella!
 
H:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety TrainingH:\Esafety\Esafety Staff Training 100609\E Safety Training
H:\Esafety\Esafety Staff Training 100609\E Safety Training
 
Internships
InternshipsInternships
Internships
 
Ernando
ErnandoErnando
Ernando
 
La sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobiliLa sicurezza dei dispositivi mobili
La sicurezza dei dispositivi mobili
 
Utility Cost Savings Presentation
Utility Cost Savings PresentationUtility Cost Savings Presentation
Utility Cost Savings Presentation
 
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaper
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaperInsourcing_through_Social_Referrals_HAPPY2REFER_WhitePaper
Insourcing_through_Social_Referrals_HAPPY2REFER_WhitePaper
 
C:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power PointC:\Fakepath\Genre Power Point
C:\Fakepath\Genre Power Point
 
PrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_enPrivateGSM demo quickstart guide nokia_en
PrivateGSM demo quickstart guide nokia_en
 
Ayuda tareas
Ayuda tareasAyuda tareas
Ayuda tareas
 
Mo willems2
Mo willems2Mo willems2
Mo willems2
 
Gala Alumnas Danya Sharif. Diciembre 2010
Gala Alumnas Danya Sharif. Diciembre 2010Gala Alumnas Danya Sharif. Diciembre 2010
Gala Alumnas Danya Sharif. Diciembre 2010
 
Habibaty
HabibatyHabibaty
Habibaty
 
Privacy story by Privatewave (english)
Privacy story by Privatewave (english)Privacy story by Privatewave (english)
Privacy story by Privatewave (english)
 
Private gsm demol manuale nokia_it
Private gsm demol manuale nokia_itPrivate gsm demol manuale nokia_it
Private gsm demol manuale nokia_it
 
Clf 7 steps to becoming an engaging leader
Clf   7 steps to becoming an engaging leaderClf   7 steps to becoming an engaging leader
Clf 7 steps to becoming an engaging leader
 

Similar to Private gsm demo user_manual_nokia_en

Profiset3030 user guide
Profiset3030 user guideProfiset3030 user guide
Profiset3030 user guideVictor Nalin
 
Manual instructiuni-pirelli-dpl-10-black
Manual instructiuni-pirelli-dpl-10-blackManual instructiuni-pirelli-dpl-10-black
Manual instructiuni-pirelli-dpl-10-blackQuickmobile
 
Hypermedia Telular manual-ver5
Hypermedia Telular manual-ver5Hypermedia Telular manual-ver5
Hypermedia Telular manual-ver5Victor Jaramillo
 
Gigaset e49 telephone handset user guide
Gigaset e49 telephone handset user guideGigaset e49 telephone handset user guide
Gigaset e49 telephone handset user guideTelephones Online
 
Inter-Tel Web Conferencing and Remote Support User Guide
Inter-Tel Web Conferencing and Remote Support User GuideInter-Tel Web Conferencing and Remote Support User Guide
Inter-Tel Web Conferencing and Remote Support User GuideVideoguy
 
Gigaset c59 handset user guide
Gigaset c59 handset user guideGigaset c59 handset user guide
Gigaset c59 handset user guideTelephones Online
 
Securing your mobile business with ibm worklight
Securing your mobile business with ibm worklightSecuring your mobile business with ibm worklight
Securing your mobile business with ibm worklightbupbechanhgmail
 
Jobeet 1.4-doctrine-en
Jobeet 1.4-doctrine-enJobeet 1.4-doctrine-en
Jobeet 1.4-doctrine-enModu Labs LLC
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Banking at Ho Chi Minh city
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Banking at Ho Chi Minh city
 
Fortigate utm-40-mr1
Fortigate utm-40-mr1Fortigate utm-40-mr1
Fortigate utm-40-mr1Yusuf Usmani
 
Polycom soundpoint ip650 user guide
Polycom soundpoint ip650 user guidePolycom soundpoint ip650 user guide
Polycom soundpoint ip650 user guidebest4systems
 
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...ENVIMART
 
Gigaset sl78 handset telephone user guide
Gigaset sl78 handset telephone user guideGigaset sl78 handset telephone user guide
Gigaset sl78 handset telephone user guideTelephones Online
 

Similar to Private gsm demo user_manual_nokia_en (20)

6757i user guide
6757i user guide6757i user guide
6757i user guide
 
Profiset3030 user guide
Profiset3030 user guideProfiset3030 user guide
Profiset3030 user guide
 
Manual instructiuni-pirelli-dpl-10-black
Manual instructiuni-pirelli-dpl-10-blackManual instructiuni-pirelli-dpl-10-black
Manual instructiuni-pirelli-dpl-10-black
 
Hypermedia Telular manual-ver5
Hypermedia Telular manual-ver5Hypermedia Telular manual-ver5
Hypermedia Telular manual-ver5
 
Gigaset e49 telephone handset user guide
Gigaset e49 telephone handset user guideGigaset e49 telephone handset user guide
Gigaset e49 telephone handset user guide
 
Inter-Tel Web Conferencing and Remote Support User Guide
Inter-Tel Web Conferencing and Remote Support User GuideInter-Tel Web Conferencing and Remote Support User Guide
Inter-Tel Web Conferencing and Remote Support User Guide
 
Gigaset c59 handset user guide
Gigaset c59 handset user guideGigaset c59 handset user guide
Gigaset c59 handset user guide
 
Securing your mobile business with ibm worklight
Securing your mobile business with ibm worklightSecuring your mobile business with ibm worklight
Securing your mobile business with ibm worklight
 
Jobeet 1.4-doctrine-en
Jobeet 1.4-doctrine-enJobeet 1.4-doctrine-en
Jobeet 1.4-doctrine-en
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
 
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922Implementing the ibm system storage san32 b e4 encryption switch - sg247922
Implementing the ibm system storage san32 b e4 encryption switch - sg247922
 
Fortigate utm-40-mr1
Fortigate utm-40-mr1Fortigate utm-40-mr1
Fortigate utm-40-mr1
 
Using IBM Features on Demand
Using IBM Features on DemandUsing IBM Features on Demand
Using IBM Features on Demand
 
Polycom soundpoint ip650 user guide
Polycom soundpoint ip650 user guidePolycom soundpoint ip650 user guide
Polycom soundpoint ip650 user guide
 
LSI_SAS2008_Manual_v100.pdf
LSI_SAS2008_Manual_v100.pdfLSI_SAS2008_Manual_v100.pdf
LSI_SAS2008_Manual_v100.pdf
 
Diamond
DiamondDiamond
Diamond
 
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...
Dynasonics is 6000 manual badger meter-doppler stationary area velocity flow ...
 
Gigaset sl78 handset telephone user guide
Gigaset sl78 handset telephone user guideGigaset sl78 handset telephone user guide
Gigaset sl78 handset telephone user guide
 
Recommend_Cases
Recommend_CasesRecommend_Cases
Recommend_Cases
 
Utc android v1
Utc android v1Utc android v1
Utc android v1
 

More from PrivateWave Italia SpA

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateWave Italia SpA
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateWave Italia SpA
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivateWave Italia SpA
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateWave Italia SpA
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_esPrivateWave Italia SpA
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itPrivateWave Italia SpA
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication onlinePrivateWave Italia SpA
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazionePrivateWave Italia SpA
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishPrivateWave Italia SpA
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkPrivateWave Italia SpA
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiPrivateWave Italia SpA
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)PrivateWave Italia SpA
 

More from PrivateWave Italia SpA (20)

PrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_enPrivateGSM user manual multiplatform_en
PrivateGSM user manual multiplatform_en
 
PrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_enPrivateGSM demo quickstart guide blackberry_en
PrivateGSM demo quickstart guide blackberry_en
 
PrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_itPrivateGSM demo quickstart guide iphone_it
PrivateGSM demo quickstart guide iphone_it
 
PrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_enPrivateGSM demo quickstart guide iphone_en
PrivateGSM demo quickstart guide iphone_en
 
Private gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_itPrivate gsm demo quickstart guide nokia_it
Private gsm demo quickstart guide nokia_it
 
PrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical OverviewPrivateGSM - Voice Encryption Technical Overview
PrivateGSM - Voice Encryption Technical Overview
 
Ict encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosantiIct encryption agt_fabio_pietrosanti
Ict encryption agt_fabio_pietrosanti
 
Enterprise voip security suite brochure_es
Enterprise voip security suite brochure_esEnterprise voip security suite brochure_es
Enterprise voip security suite brochure_es
 
Enterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_itEnterprise vo ip security suite brochure_it
Enterprise vo ip security suite brochure_it
 
Privatewave e marketing communication online
Privatewave e marketing communication onlinePrivatewave e marketing communication online
Privatewave e marketing communication online
 
Sicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica AmministrazioneSicurezza delle comunicazioni nella Pubblica Amministrazione
Sicurezza delle comunicazioni nella Pubblica Amministrazione
 
Technical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - englishTechnical Sheet - PrivateGSM VoIP - english
Technical Sheet - PrivateGSM VoIP - english
 
Technical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSDTechnical Sheet - PrivateGSM CSD
Technical Sheet - PrivateGSM CSD
 
Technical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIPTechnical Sheet - PrivateGSM VoIP
Technical Sheet - PrivateGSM VoIP
 
Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP Sicurezza per le comunicazioni VoIP
Sicurezza per le comunicazioni VoIP
 
Khamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social networkKhamsa Italia lancia PrivateWave sui social network
Khamsa Italia lancia PrivateWave sui social network
 
Enterprise VolP Security Suite
Enterprise VolP Security SuiteEnterprise VolP Security Suite
Enterprise VolP Security Suite
 
Privatewave e i social network
Privatewave e i social networkPrivatewave e i social network
Privatewave e i social network
 
Cellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tuttiCellulare Magazine: PrivateGSM e parli con tutti
Cellulare Magazine: PrivateGSM e parli con tutti
 
Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)Privacy story by PrivateWave (italiano)
Privacy story by PrivateWave (italiano)
 

Recently uploaded

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfOverkill Security
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 

Recently uploaded (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Private gsm demo user_manual_nokia_en

  • 1. © 2005 - 2011 PrivateWave Italia SpA - All trademarks are property of their respective owners. All rights reserved. Demo version for evaluation only NOT FOR SALE: the PrivateGSM version you can purchase is sold within the Enterprise VoIP Security Suite solution.
  • 2. 1 User manual, September 2010 Contents 1. Introduction........................................................................................................................................ 3 2. PrivateGSM Demo installation pre-requisites ................................................................................. 4 3. Downloading and installing the software....................................................................................... 5 3.1. Installation via email/text message ..................................................................................................... 5 3.1.1. Download............................................................................................................................... 6 3.1.2. Installation.............................................................................................................................. 6 3.1.3. Activation ............................................................................................................................... 7 3.1.4. Selecting the access point after installation ............................................................................. 8 3.2. PC installation.................................................................................................................................... 8 3.2.1. Installation via Bluetooth......................................................................................................... 8 3.2.2. Installation via USB.................................................................................................................. 8 4. PrivateGSM Demo operating modes................................................................................................ 9 4.1. Opening the PrivateGSM menu.......................................................................................................... 9 5. Making a secure call with PrivateGSM Demo ............................................................................... 10 5.1. Secure number ................................................................................................................................ 10 5.2. Call modes....................................................................................................................................... 10 5.3. Secure call to phone numbers and contacts entering the PrivateGSM +801 prefix ........................... 11 5.3.1. Dialing a secure call .............................................................................................................. 11 5.3.2. Dialing a secure call from contacts........................................................................................ 11 5.4. Secure call to phone numbers and contacts using the PrivateGSM menu and not the +801 prefix... 12 5.4.1. Dialing a secure call .............................................................................................................. 12 5.4.2. Dialing a secure call from contacts........................................................................................ 13 6. Receiving a secure call..................................................................................................................... 15 7. Inviting a contact to use PrivateGSM Demo.................................................................................. 16 8. Verifying call security ...................................................................................................................... 18 9. Identifying a wiretapping attempt ................................................................................................ 19 9.1. Attempt to wiretap a call to a "trusted" contact.............................................................................. 19 9.2. Attempt to wiretap a call to a contact not yet saved as "trusted".................................................... 19 10. Checking the call in progress........................................................................................................ 21 10.1. Call status...................................................................................................................................... 21 10.1.1. Call status icons.................................................................................................................. 21 10.2. Call quality level............................................................................................................................. 22 10.2.1. Call quality level icons......................................................................................................... 22
  • 3. 2 User manual, September 2010 11. Call functions.................................................................................................................................. 24 11.1. Adjusting audio volume ................................................................................................................. 24 11.2. Turning speaker phone and microphone on and off ...................................................................... 24 12. Other functions and settings........................................................................................................ 25 12.1. Changing the Access Point ............................................................................................................ 25 12.2. Ending and re-starting an Internet connection ............................................................................... 25 12.3. Exit the application and end the Internet connection ..................................................................... 26 13. What you should know before you use PrivateGSM Demo ...................................................... 28 13.1. Standard call priority (voice) ........................................................................................................... 28 13.2. When doesn't PrivateGSM protect your data ................................................................................. 28 13.3. Call quality when moving............................................................................................................... 28 13.4. Networks and call quality............................................................................................................... 29 13.5. Rates ............................................................................................................................................. 30 13.5.1. Limited traffic rate plan disadvantages................................................................................ 31 13.6. Differences between secure and standard calls .............................................................................. 31 14. User license and license code........................................................................................................ 32 14.1. License code .................................................................................................................................. 32 14.2. Receive Only mode ........................................................................................................................ 33 14.3. Checking your user license............................................................................................................. 33 15. Most frequent VoIP network problems ....................................................................................... 34 15.1. PrivateGSM does not connect and does not let me make calls ....................................................... 34 15.2. The call interrupts with a failed connection error ........................................................................... 34 15.3. Only one caller can hear the other (one-way)................................................................................. 35 15.4. Dialing takes one or more minutes................................................................................................. 35 15.5. Frequent audio interferences ......................................................................................................... 36 16. Functional notes............................................................................................................................. 37 16.1. Incompatibility with other installed applications............................................................................. 37 17. How to contact us.......................................................................................................................... 38 Note: The following manual contains valid yet generic technical information. Some phone screen and menu references may vary according to the model.
  • 4. 3 User manual, September 2010 1. Introduction PrivateGSM, within the Enterprise VoIP Security Suite guarantees phone conversation security and privacy on mobile phones in a company network. The Demo version can be used to try how the UI works and what is the software operating principle. Once installed on a phone, the demo is able to encrypt all incoming and outgoing calls from/to other PrivateGSM users: thus, the software must be installed on the caller and the called party’s phones. To help you to build a contact network to make some tests, the Demo version has the “invite others” function. PrivateGSM uses VoIP technology (Voice over IP) and requires Internet access. Before making a secure call, PrivateGSM checks the exchange keys, letting callers personally check call security.
  • 5. 4 User manual, September 2010 2. PrivateGSM Demo installation pre-requisites Before installing the software, make sure the following requisites are met: Mobile phone compatibility. Check the Support section at: www.privatewave.com International text message capability. Check your service contract. A text message must be sent to a number in the United Kingdom to activate the product. Full internet access service. The phone service contract must include full internet access. WAP or MMS connections are not admitted. Note: NOKIA PC Suite must be installed on your PC to install the software via USB.
  • 6. 5 User manual, September 2010 3. Downloading and installing the software You can install PrivateGSM Demo on your mobile phone via email/text message or PC (via Bluetooth or USB port). Note: You can also download PrivateGSM to your phone at www.privatewave.com. In this case, enter the Trial section to download the file to the phone connected to Internet. Once the installation file download has completed, the installation wizard completes the setup. 3.1. Installation via email/text message The phone must have Internet access for this installation. To download, install and activate software via email/text message: 1. Open pages Trial and product Download at www.privatewave.com. 2. Read and accept the license and privacy consent terms. 3. Select your phone model. 4. Select option via email/text message. 5. Enter your email address or mobile phone number. Click Download to receive an installation email/text message. Click on the link in the message to download the software and launch the installation and activation procedure. Note: The text message is sent to a UK PrivateWave number (UK + 44). Therefore, your SIM card must be enabled to send international text messages and your credit balance must be able to cover these charges.
  • 7. 6 User manual, September 2010 3.1.1. Download   1. Click on the link 2. Confirm download 3. Check progress 3.1.2. Installation   4. Confirm installation 5. Confirm to continue 6. Select the phone memory
  • 8. 7 User manual, September 2010   7. Accept the license agreement 8. Enable auto-start 9. Activate technical support 3.1.3. Activation   10. Select the full internet access point 11. Select automatic activation 12. A text message is sent to a PrivateGSM number IMPORTANT We strongly encourage automatic activation. Manual activation lets you change advanced PrivateGSM settings but this is only recommended for expert users. Some automation, specifically designed to simplify product use, will be lost with manual activation. !
  • 9. 8 User manual, September 2010 3.1.4. Selecting the access point after installation After installation, select the full internet access point. If you selected an incorrect access point (with consequent difficulties in accessing the internet or sending the activation text message) you can change it later and re-launch product activation (see chapter 12.1 “Changing the Access Point”). 3.2. PC installation You can download the software to your PC and install it on your phone via Bluetooth or USB port (in the latter case, you will need the Nokia PC Suite Application Installation function). To download, install and activate software via PC: 1. Open pages Trial and product Download at www.privatewave.com. 2. Read and accept the license and privacy consent terms. 3. Select your phone model. 4. Select option via PC. Click Download, save the file on your PC and install it on your phone via Bluetooth or USB port. 3.2.1. Installation via Bluetooth 1. Send the file to your phone via Bluetooth protocol. 2. Open the message in your Inbox. The wizard is launched (see procedure screen 4 3.1 “Installation via email/text message”). 3.2.2. Installation via USB 1. Connect your phone to the PC via USB port. 2. Run Nokia PC Suite, select your phone and install the software using the Application Installation function. 3. The wizard is launched (see procedure screen 4 3.1 “Installation via email/text message”).
  • 10. 9 User manual, September 2010 4. PrivateGSM Demo operating modes If you selected auto-start during installation, PrivateGSM will automatically activate each time you turn on your phone (hidden in the background). When an Internet connection is available, you can: • Open the PrivateGSM main menu. • Receive and make secure calls. • End the connection without exiting the application. • End the connection and exit the application. IMPORTANT To make a secure call, the called party must be running PrivateGSM software and be connected to the Internet as well!! 4.1. Opening the PrivateGSM menu All other application functions are accessible from the PrivateGSM menu. To open the PrivateGSM menu: 1. Dial “801” and press the dial button 2. The PrivateGSM menu appears. Click Hide to return the application to thebackground
  • 11. 10 User manual, September 2010 5. Making a secure call with PrivateGSM Demo 5.1. Secure number Calls with PrivateGSM are simply identified by the “+801” prefix in front of the number to be dialed including the international prefix without zeros. For example: “+801 44 333 1234567” +801 PrivateGSM prefix, including ‘+’ 44 International country code for UK without zeros 333 1234567 Phone number Note: For quick dialing, we recommend you save numbers with the +801 prefix as "secure" contacts in your phone book. 5.2. Call modes PrivateGSM lets you: • Make secure calls to phone numbers and contacts using the PrivateGSM +801 prefix. In this case, you need not open the main menu if the application is on in background. • Make secure calls to phone numbers and contacts without entering the PrivateGSM prefix by using directly the application menu.
  • 12. 11 User manual, September 2010 5.3. Secure call to phone numbers and contacts entering the PrivateGSM +801 prefix 5.3.1. Dialing a secure call You can dial a secure call by entering the “+801” prefix before the number to be dialed, including the international country code without zeros. To dial a secure call complete with prefix: Enter the “+801” prefix before the number and press the dial button 5.3.2. Dialing a secure call from contacts You can call a number previously saved in the phone book with the PrivateGSM prefix (see chapter 5.1 “Secure number”).
  • 13. 12 User manual, September 2010 To make a secure call to a contact saved in your address book with the PrivateGSM prefix: Select a "secure" contact and press the dial button 5.4. Secure call to phone numbers and contacts using the PrivateGSM menu and not the +801 prefix 5.4.1. Dialing a secure call You can make a secure call from the PrivateGSM menu by simply entering the number complete with international country code (i.e.: +44 for UK) and pressing the dial button. Note 1: On devices with OS Symbian 9 5th ed. (touch screen) select Type number in Options menu: a virtual keyboard will appear. Note 2: Using this method, the call will not leave any indication in your phone register. Suggestion: If you intend to frequently make secure calls to the same number, add it to your phone book with the PrivateGSM prefix (see chapter 5.1 “Secure number”).
  • 14. 13 User manual, September 2010 To dial a secure call using the PrivateGSM menu: 1. Dial “801” and press the dial button 2. Enter the phone number complete with international country code and press the dial button 5.4.2. Dialing a secure call from contacts You can make secure calls from the PrivateGSM menu by simply selecting a contact from your phone book. Note: Using this method, the call will not leave any indication in your phone register. Suggestion: If you intend to frequently make secure calls to the same number, add it to your phone book with the PrivateGSM prefix (see chapter 5.1 “Secure number”).
  • 15. 14 User manual, September 2010 To dial a secure call to a contact using the PrivateGSM menu:   1. Dial “801” and press the dial button 2. Select Secure call 3. Select a contact and press the dial button
  • 16. 15 User manual, September 2010 6. Receiving a secure call PrivateGSM must be on and you must be connected to the Internet to receive a secure call. Note 1: A secure call has a ring tone other than a standard call and can be answered or refused. The ring tone is set by PrivateGSM and cannot be customized. Note 2: Regardless of the license status, if PrivateGSM is correctly installed (on with connection available) you can always receive calls (see chapter 14 “User license and license code”). To receive a secure call: Accept the secure call by pressing the dial button
  • 17. 16 User manual, September 2010 7. Inviting a contact to use PrivateGSM Demo You can invite a contact from your phone book to use PrivateGSM. The contact will receive a text message with a link, inviting him to install the product. To invite a contact from you phone book:   1. Select Invite others 2. Select a contact 3. Confirm invitation delivery The invited contact need only click on the link in the message: if the mobile phone is compatible, the wizard launches (see procedure screen 4 3.1 “Installation via email/text message”).
  • 18. 17 User manual, September 2010 To accept an invitation to install PrivateGSM: 1. Click on the link: the installation wizard will be launched Note: The “Invite others” option is available only for the Demo version, in order to allow users to build a contact network to make secure calls.
  • 19. 18 User manual, September 2010 8. Verifying call security PrivateGSM Demo uses an encryption and security system based on ZRTP protocol. This protocol also includes "human" verification of the two key exchanges displayed at the beginning of a call. Key exchanges are made up of two words in English, randomly generated for each call. The key exchanges displayed on the two phones must be verbally compared by the two callers to guarantee call security. To verify call security:  Matching key exchanges: the call is secure!  1. The caller reads his key out loud 2. The called party makes sure it matches his Suggestion: After making sure the key exchanges match and that the called party is the person you want to contact, save the contact in the phone book as “trusted” by clicking Trust. This way, you need not verify the key exchange whenever you call this contact (trusted) in the future. Key exchanges are no longer highlighted in orange. Security is already guaranteed. Thus, in normal conditions, subsequent communications with a "trusted" contact can start without the need of verbal verification. Keys are highlighted in orange and should only be verified in the event of wiretapping attempts or changes to one of the two phones' configurations. In this case, the keys must be verbally verified or the call immediately interrupted.
  • 20. 19 User manual, September 2010 9. Identifying a wiretapping attempt 9.1. Attempt to wiretap a call to a "trusted" contact If a third party attempts to wiretap a call to a previously verified contact saved as trusted, PrivateGSM automatically detects the wiretapping attempt, interrupts the call and displays the following security alert. Wiretapping attempt alert After receiving a security alert, you must always verbally re-verify the key exchanges and re-save your contact as trusted for future calls (see chapter 8 “Verifying call security”). IMPORTANT The security alert may even be displayed when there is no wiretapping attempt but when your contact changes his phone number or phone. It may also be displayed when the software is re-installed on one of your trusted contact's phones. You must always re-verify contact security after a security alert. ! 9.2. Attempt to wiretap a call to a contact not yet saved as "trusted" In the event a third party attempts to wiretap a call to a contact not yet saved as trusted, PrivateGSM displays two different key exchanges on the two phones. The callers should verbally verify the differences between the two key exchanges and interrupt the call.
  • 21. 20 User manual, September 2010  NON matching key exchanges: wiretapping attempt in progress!  1. The caller reads his key out loud 2. The called party verifies that keys do NOT match and interrupts the call!
  • 22. 21 User manual, September 2010 10. Checking the call in progress During a secure call, PrivateGSM displays: • key exchange status at the beginning of the call • connection quality 10.1. Call status To establish a connection, PrivateGSM completes three phases; an icon shows on the screen the call status: Exchanging ZRTP keys 10.1.1. Call status icons Red light Starting the connection Connection not yet established. This step may take several seconds (see chapter 13.6 “Differences between secure and standard calls”).
  • 23. 22 User manual, September 2010 Yellow light Key exchange Connection established but ZRTP keys are being exchanged. Green light Secure call established Connection established and secure. You can now speak in a secure way. 10.2. Call quality level Some factors that affect the GSM network (i.e.: GPRS use, poor signal, frequent radio cell changes, roaming), could decrease call quality, increasing voice delay. An icon shows the current call quality level: Poor connection quality 10.2.1. Call quality level icons Poor connection quality
  • 24. 23 User manual, September 2010 Average connection quality Good connection quality Note: If connection quality remains poor, we suggest you seek better network coverage or connect to a better broadband Wi-Fi access point.
  • 25. 24 User manual, September 2010 11. Call functions 11.1. Adjusting audio volume Adjusting secure call volume is the same as adjusting standard call volume. To adjust the volume during a secure call: • Use the volume key on your phone (if applicable). • Use the scroll key, scrolling left to lower volume or right to raise it. 11.2. Turning speaker phone and microphone on and off You can turn on your speaker phone or mute your microphone during a call. To turn speaker phone on/off during a secure call: • Click Options > Activate loudspeaker To turn the microphone on/off during a secure call: • Click Options > Mute microphone Speaker phone and microphone menu
  • 26. 25 User manual, September 2010 12. Other functions and settings 12.1. Changing the Access Point To change the Access Point, select Settings > Default access Point from the PrivateGSM menu. Restart the application for change to take effect. PrivateGSM automatically reconnects after the change. IMPORTANT WAP or MMS access points cannot be used.! To change the access point: 1. Select Default access point 2. Select the access point 12.2. Ending and re-starting an Internet connection You can end the Internet connection to stop receiving secure calls. The application remains in the background and can be started at any time by starting a connection.
  • 27. 26 User manual, September 2010 To end and re-start an Internet connection 1. Select Options 2. Select Go offline/Go online IMPORTANT You cannot receive or make secure calls when you are not connected to the Internet.! 12.3. Exit the application and end the Internet connection To stop receiving secure calls, exit the application, automatically ending the Internet connection. To re-launch the application, open the mobile phone menu and select PrivateGSM .The connection is automatically re-started. IMPORTANT You cannot receive or make secure calls when you are not connected to the Internet.!
  • 28. 27 User manual, September 2010 To exit the application and automatically close the connection: 1. Select Options 2. Select Exit
  • 29. 28 User manual, September 2010 13. What you should know before you use PrivateGSM 13.1. Standard call priority (voice) If the user receives a standard call (voice) during a secure call (VoIP), the following may occur: 1. The user accepts the voice call: since this channel takes priority over VoIP, the secure call is automatically interrupted. 2. The user refuses the voice call: the VoIP call remains connected and the user can continue the secure conversation. 13.2. When doesn't PrivateGSM protect your data PrivateGSM cannot protect your conversations in the following cases: 1. Wiretapping by bugs placed in your home, office or car. 2. Wiretapping by long distance directional microphones. PrivateGSM cannot protect you from the following geographic tracking systems: 1. GSM mobile phone locators 2. GPS locators Note: We suggest you consult security experts to protect yourself against these types of devices. 13.3. Call quality when moving It may take longer to establish a connection or experience short audio interruptions when travelling by car or high speed train. This is because you are switching from one GSM network radio cell to another. Call quality depends on the local infrastructures the phone operator uses. For example, in the suburbs, the GSM network is made up of less cells but with higher coverage; switching from one cell to another is less frequent (i.e.: highway). Contrarily, in metropolitan areas, the
  • 30. 29 User manual, September 2010 GSM network is made up of more cells but with lower coverage; switching from one cell to another is more frequent (i.e.: expressways and ring roads). Note: No perceivable vocal defects were demonstrated in tests conducted at 150 km/h with PrivateGSM. 13.4. Networks and call quality Secure calls with PrivateGSM use VoIP technology that exploits an Internet connection to make a call via TCP/IP and UDP packet exchange. Thus, data packets containing voice, encoded and encrypted information are routed on the network during a call. PrivateGSM secure calls thus require an open Internet connection without any firewall or restriction by the caller or called party. Mobile phone operators typically offer two types of Internet access with two different Access Points: • Full Internet access: supports all transmission protocols. Required by PrivateGSM. • WAP/MMS access: does not allow PrivateGSM to work. Following is a list of network types, ordered by quality, band width1 and latency2 : Technology Wi-Fi HSD PA UMTS EDGE GPRS Satellite Quality Best Worst 1 Band width determines the amount of data transmitted per second. 2 Latency determines the time required for data to reach its destination.
  • 31. 30 User manual, September 2010 Note: To check your mobile phone network, check the symbol next to the signal bar: 3.5G network (HSDPA) Suggestion: Use Wi-Fi when available. There are no additional access costs and call quality is definitely better. For further information, see chapter 12.1 “Changing the Access Point”. 13.5. Rates PrivateGSM secure calls use an Internet connection thus data traffic is charged. Costs depend on the rate set with your phone service provider. To receive secure calls, PrivateGSM must keep an Internet connection open. You should, therefore, choose a rate that lets you stay online as long as you need to receive and make secure calls (i.e.: 24/7, or business hours). Note: We suggest you consult your operator to set a flat rate tied to your connection needs. Note: When using PrivateGSM abroad, make sure you have a data traffic rate plan that lets you check costs.
  • 32. 31 User manual, September 2010 13.5.1. Limited traffic rate plan disadvantages Data limited traffic rate plan You pay according to data traffic when online. On average, PrivateGSM exchanges data packets for a total of 2MB a month. This is calculated considering average band width between 100k/minute and 200k/minute. Thus 1MB of Internet traffic equals a minimum of 5 minutes to a maximum of 10 minutes. Time limited rate plan You pay according to connection time. These planes are unfavorable and not recommended for PrivateGSM use. 13.6. Differences between secure and standard calls Delays in establishing a connection To establish a connection with the called party, PrivateGSM needs from 5 to 60 seconds based on the caller and called party's Internet connection qualities. Voice delay Unlike standard calls, VoIP secure calls may be subject to voice delays from 1/5 of a second to a maximum of two seconds. This depends on the technology adopted by the data transmission network. The better the connection, the shorter the voice delay. Different ring tone PrivateGSM secure calls use different ring tone than standard calls (not customizable). Battery charge Internet connection may lower your phone's battery life. Average mobile phone battery consumption may increase from a minimum of 5% to a maximum of 35% based on the type of network used by the Internet connection. Note: A Wi-Fi network consumes more than a 3G network. A 3G network consumes more than a 2G network.
  • 33. 32 User manual, September 2010 14. User license and license code PrivateGSM Demo can work in two different modes: • Full: you can both make and receive secure calls in this mode. • Receive Only: you can only receive secure calls in this mode. Upon first installation, PrivateGSM is set to Full mode for a 15-day trial period. At the end of the trial period, the software automatically switches to Receive Only. Note: In a contact network, you only need one contact with a Full license. Other PrivateGSM users can have Receive Only modes. To expand the contact network, invite contacts using the specific PrivateGSM function (see chapter 7 “Inviting a contact to use PrivateGSM Demo”). Each contact must have a mobile phone model compatible with the software. 14.1. License code – status icon License status is shown by the license icon that appears in PrivateGSM menu: Trial period Full mode Receive Only mode Waiting for server response after license code registration.
  • 34. 33 User manual, September 2010 1. User license expired: you are asked to enter a new license code. 14.2. Receive Only mode Receive Only mode starts when the trial license expires. It lets you continue to receive secure calls for as long as the software is installed on your phone. 14.3. Checking your user license To check your current user license: 1. Select License 2. Check your user license
  • 35. 34 User manual, September 2010 15. Most frequent VoIP network problems 15.1. PrivateGSM does not connect and does not let me make calls Problem PrivateGSM does not correctly go online and generates an error during registration/connection. • Diagnostics The access point in use is incorrect and/or PrivateGSM is connected to a network that is not correctly set. Possible solution - Check whether the phone can access the Internet, opening any web page. - Check whether the access point in use is a full Internet connection and not a WAP or MMS connection. You can only use PrivateGSM with a full Internet connection. - Check whether the Wi-Fi network you're connected to supports TCP/IP and UDP protocols. Internet connections with proxy servers do not work with PrivateGSM and firewalls need to be opened to allow internal networks to work with a proxy server. - Check whether your SIM card balance (top-up) is sufficient. - Check whether Internet connections are enabled on the SIM card. Some phone operators require you set a specific rate plane for Internet access which must be requested by the user and confirmed by the operator. 15.2. The call interrupts with a failed connection error Problem PrivateGSM is correctly online and lets you make/receive a secure call but the call never gets past the Exchanging keys phase (yellow light). PrivateGSM interrupts the call with a failed connection error and you cannot hear the called party. • Diagnostics The access point in use is incorrect and/or PrivateGSM is connected to a network that is not correctly set.
  • 36. 35 User manual, September 2010 Possible solution - Check whether the phone can access the Internet, opening any web page. - Check whether the access point in use is a full Internet connection and not a WAP or MMS connection. You can only use PrivateGSM with a full Internet connection. - Make sure the firewall allows UDP protocol output. - Change access point. 15.3. Only one caller can hear the other (one-way) Problem PrivateGSM is correctly online and lets you make/receive a secure call. It reaches the Secure call established (green light) status, exchanging keys, but only one caller can hear the other. • Diagnostics The caller's PrivateGSM has audio problems, due to incorrect settings. For example, it is using a WAP access point and not a full Internet access point or a network with incorrect settings. Possible solution - Check whether the access point in use is a full Internet connection and not a WAP or MMS connection. You can only use PrivateGSM with a full Internet connection. 15.4. Dialing takes one or more minutes Problem PrivateGSM makes/receives a secure call but remains in the Starting a connection phase (red light) for one or more minutes, hanging up with a failed connection message. Re-dialing, the call sometimes goes through.
  • 37. 36 User manual, September 2010 • Diagnostics PrivateGSM uses the Internet via a radio frequency range provided by the operator or Wi-Fi connection in use. Radio frequencies are subject to data packet loss in certain environmental conditions such as if you are close to a large wall, a repeater or in the event of network overload, for example, during a public event. During a voice call, a minimum level of data packet loss is negligible for voice quality but may be a determinant factor for that part of the signal dedicated to the phone system (i.e.: SIP/TLS protocols used to make a call, receive a call, end a call, and so on). Data transmission may thus be difficult during the start/end call phase even if the phone displays a good signal level. Possible solution - Check whether the two callers are surrounded by radio disturbances. - If using PrivateGSM in a crowded place, decide whether you should switch from the UMTS network to the GSM network. In fact, a UMTS network that works at 2,100 MHz is more crowded than a GSM network that works at 900/1,800 MHz. 15.5. Frequent audio interferences Problem PrivateGSM calls are subject to frequent audio interruptions or interferences and the conversation is difficult. • Diagnostics Internet connections are often overloaded and mobile phone operators do not have enough bandwidth. In these cases, establishing a connection may be difficult or impossible or, once established, audio may be suddenly interrupted and similar problems occur. Possible solution - Make sure the network is actually overloaded: open a web page (N.B.: pick a web page you do not frequently open). A page that does not load or loads slowly, timing out, indicates that the network is overloaded and cannot be used for secure calls.
  • 38. 37 User manual, September 2010 16. Functional notes 16.1. Incompatibility with other installed applications PrivateGSM uses APS (Audio Proxy Server) and VAS (VoIP Audio Service) which, if installed on your phone since used by other applications (i.e.: Fring, instant message software), may interfere with correct software operations. In this case, uninstall the other applications and re-install PrivateGSM.
  • 39. 38 User manual, September 2010 17. How to contact us Visit us at: http://www.privatewave.com Contact our technical staff: tel: +39 02 911930891 Monday through Friday, 10 AM to 12 PM, 2.30 PM to 4.30 PM. email: support@privatewave.com We remind you that the PrivateGSM Demo version is for evaluation purpose only, to show how the software works. The full version on sale is part of the Enterprise VoIP Security Suite solution for fixed- mobile encryption in a company network. For more information or technical details on the Enterprise VoIP Security Suite, get in contact with our sales team: email: sales@privatewave.com