SPEECH INFORMATION SECURITY DEVICE «PRIBOI»

 



 

 

 

 

 

 

PURPOSE

Speech information security device «Priboi» is used for security of rooms to prevent information leak (speech) through acoustic and vibrational channels.

Uses automatic control of  noise contamination level from the volume level of the speech.

 

TECHNICAL CHARACTERISTICS

Frequency range of masking signals as «white noise» + «speech-like signals», Hz                                                                                                                                              125...8000
Correlation «white noise» + «speech-like signals», dB 0, +3, +6
Range of reproducible frequencies of vibration transformer, Hz 125...8000
Range of reproducible frequencies of acoustic transformer, Hz 125...8000
Output power from acoustic channel, W, no less than 15
Output power of any of three vibration channels, pcs., no less than  6
Number of connected vibration transformers to every channel, pcs., no less than 30
Number of connected acoustic transformer, pcs., no less than 10
Sensitivity of external microphone in the frequency range from 200 to 4000 Hz
with built-in amplifier, V/Pa, no less than
10

 

APPLICATION SCHEME

  • creation of masking signals in leak channels («white noise», «speech-like signals», «white noise» + «speech-like signals»), which correspond to the formal qualities of speech (signals can be adapted to a specific person)

 

COMPLETED WITH 

  • acoustic transformers (no less than 10 pcs.)
  • vibroacoustic transformers (no less than 30 pcs.)

 

SERVICES

  • installation and maintenance of the device

 

 

DEVELOPER

R&D LAB 5.3 «Materials and components of electronics and superconducting equipment»

 

CONTACTS

6, P.Brovki, 220013, Minsk, Republic of Belarus
☏  +375 17 293 89 39
🖷  +375 17 293 89 39
🖂   nil53@bsuir.edu.by

 

OTHER INNOVATIONS IN THIS AREA

Speech information security device «Priboi-R»

Electromagnetic-pulse protection device «Impulse-N»

Indoor voice data protection suit «Echo»

Detector – testing complex of computing equipment for the presence of devices of unauthorised opportunities 

Locator for detecting devices of unauthorized information collection