TeleH Service

$429.00 / month

TeleH service features:-

    • Unlimited user
    • Unlimited rooms 
    • Unlimited meeting time 
    • HD Video and audio
    • Screen share
    • End to end encryption
    • No Data retentions
    • No logs
    • No analytics
    • Easy login without sing up
    • Cross-Platform 



TeleH service features:-

    • Unlimited users.
    • Unlimited rooms. 
    • Unlimited meeting time .
    • HD Video and audio.
    • Screen share.
    • End to end encryption.
    • No Data retention.
    • No logs.
    • No analytics.
    • Easy login without sing up.
    • Cross-Platform 
    • Web-app
    • IOS 
    • Android 

Architecture based on Jitsi

Comprises a collection of projects:

  • Jitsi Meet – WebRTC compatible JavaScript application that uses Jitsi Video bridge to provide high quality, scalable video conferences
  • Jitsi Video Bridge (jvb) – WebRTC compatible server designed to route video streams amongst participants in a conference
  • Jitsi Conference Focus (jicofo) – server-side focus component used in Jitsi Meet conferences that manage media sessions between each of the participants and the video bridge

External Software used by Jitsi:

  • Prosody – XMPP server used for signaling

Network description

Modified features for healthcare project:-

  • Auto-view the active speaker or click on any attendee to see their video
  • Android and iOS clients apps
  • Text chatting 
  • Lock a room with a password
  • Screen sharing (if jidesha is setup, only required in Chrome)
  • Audio-only option
  • External API that can be used to embed an existing Meet instance into any webpage 
  • Automated unique link creation with/without UPI

Setting up

  • Debian-based GNU/Linux system. The following distributions are supported out-of-the-box:
  • Debian 10 (Buster) or later
  • Ubuntu 18.04 (Bionic Beaver) or later

Security & Privacy:

  • All meeting rooms are ephemeral
  • Does not require users to create accounts
  • No information retain after the meeting.
  • Other pieces of data such as the chat, or speaker stats, for example, are stored for the duration of the meeting and then destroyed when it ends
  • Using UUID Generator for rooms.
  • Set a meeting password
  • End-to-end encryption (e2ee) as long as you are using Jitsi Meet on a browser with support for insertable streams
  • Based on WebRTC Security Architecture:
  • General operates in 2 ways: peer-to-peer (P2P) or via the Jitsi Video Bridge (JVB). This is transparent to the user. P2P mode is only used for 1-to-1 meetings. In this case, audio and video are encrypted using DTLS-SRTP all the way from the sender to the receiver, even if they traverse network components like TURN servers.
  • No pre-configured analytics engines.