Call Girls Ooty Just Call 9907093804 Top Class Call Girl Service Available
HIPAA compliance statement
1. HOW qliq TECHNOLOGY WORKS
DATA FLOW OF MESSAGES THROUGH THE QLIQ NETWORK:
1 Sender submits message.
5a If the recipient’s IP address is
associated with a network
address, the network router
7 Recipient receives
message.
2a If sender has a WiFi connection, the
phone will preferentially transmit
the message to the wireless access
3a Network router
forwards message
to qliqServer.
will receive the message and
forward it to the WAP.
point (WAP), which will then
forward the message to the network
router. [The WAP and router may or
may not be integrated into a single
6a The WAP processes
the message and
transmits it to the
recipient’s device
piece of hardware.] over WiFi.
INTERNET
WIRELESS WIRELESS
ACCESS ROUTER ROUTER ACCESS
POINT POINT
SERVER
BASE CELLULAR DATA CELLULAR DATA BASE
STATION NETWORK NETWORK STATION
2b If sender has a 3G/4G data connection
with no active WiFi connection, the 4 qliqServer determines availability of
recipient, including current IP address. If
the recipient is available, the qliqServer
6b The BS processes
the message and
transmits it via the
cell tower to the
message is transmitted to the cell tower will forward the message. If the recipient
and processed by the base station (BS), is not available, qliqServer will send a recipient’s device
and then sent to the cellular data notice to the recipient’s device via push over 3G or 4G.
network (CDN). notification, letting the recipient know
that they have received a new qliqCon-
3b Packet Router
GGSN/PDSN
forwards the
nect message. Once the recipient opens
the application and becomes available,
qliqServer will send the message to the
5b If the recipient’s IP address is
associated with an CDN, the
CDN will receive the message
and forward it to the correct
message to recipient’s IP address.
base station (BS).
qliqServer.
2. HOW qliq TECHNOLOGY WORKS
2048-BIT PUBLIC KEY 1024-BIT PRIVATE KEY
PUBLIC KEY
REPOSITORY INTERNET
WIRELESS WIRELESS
ACCESS ROUTER ROUTER ACCESS
POINT POINT
SERVER
BASE CELLULAR DATA CELLULAR DATA BASE
STATION NETWORK NETWORK STATION
STOR STOR
SECURITY FEATURES
A PHYSICAL SECURITY C qliqSERVER ACCOUNT MANAGEMENT
Through the qliqWeb console, the group administrator can:
through the qliq network. Rather, storage is distributed and
in using authorized credentials. information is controlled by end-users and their organizations.
access is available. the cloud only long enough to complete message delivery. timeout, and other security settings
When delivery occurs, user information is deleted from the
strength requirements. qliq servers. stolen device (group and individual management to
provide BYOD support)
B TRANSMISSION SECURITY D qliqSTOR
With the optional qliqStor feature, organizations can store
all message traffic exchanged between users of a qliq group
across port 443). on group-controlled virtual server that can be queried by
the group administrator, or authorized designees, for
(image, audio, and various document formats). auditing purposes.
decrypted by the receiving device, using a combination of
public and private keys. Only the intended recipient can
decrypt the message.
then stored on end-user devices in an encrypted file.
No unencrypted messages are stored in the cloud.