• +886 2-2934-3166
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

SW Protection

The digitization of enterprise data has become the mainstream in the IT field. All the information such as enterprises’ financial data, clients’ information, research results, invaluable knowledge bases can be easily searched, modified, transmitted, and stored. However, what follows are those intruders, information leaks, unwarranted modification or even deletion. One way or another, threats put enterprises into jeopardy.

Fortunately, there is Application & Content Protection (ACP). This security solution aims to help those in need but without astronomical sums of capitals to enhance IT security in the face of adverse impacts of risks and deteriorating IT environments. It applies to IT systems like ERP (Enterprise Resource Planning) and CRM (Customer Relationship Management) and knowledge products like electronic galleries, e-books, digital textbooks and so on.

You need more than security

The picture illustrates seamless integration of ACP with business value and technical value. Following implementation of ACP, precious contents are available for clients and equipped with robust ACP encryption and strong authentication. 

Image
Seamless Integration

ACP Wizard dramatically upgrades the security of original systems in a few simple steps, preventing threats from copying, appropriating and even skimming. In addition, the patent transparent real-time encryption engine exceptionally encrypts data within the operating system, leaving threats that exploit apps’ vulnerabilities ignorant of multilayer protection ACP has executed onto the OS.



Multiple Identity Authentication Modes
(Evaluated according to budgets and requirements)

  1. Software mode: lowest cost, invalid and failed copy attempt.
  2. Smart card mode: high cost, card readers required, robust authentication mechanism in the IT field
  3. USB Key mode:moderate cost, less secure than the Smart card mode.


Hardware Environment Forensic Technique

This technique wards off illegal copy since ACP is able to identify features of hardware environment and generates encryption keys based on hardware environment. Any attempt to copy will fail even with an ISO virtual drive.



ACP Product

ACP for windows
VDP, Virtual Drive Protection

VDP-R, VDP Recordable

ACP for Linux
LED, Linux Encryption Drive
Linux applications and content protection in OEM model

ACP Specification

  • Loadable windows driver module (Linux v2.6, WinXP, 2003, Vista, XPE,Win7)‏
  • Running above physical Ext2/Ext3/NTFS file-system partition
  • Real-time encryption of raw sectors
  • Support token as key storage
  • Locked by host or by key token
  • Cryptographic algorithms: T-DES/DES, AES, RC5, and Cast
  • Provide application authorization
  • Protect application from memory dump cracking
  • Cipher shell tool to protect application run-time memory
  • License management

 

The digitization of enterprise data has become the mainstream in the IT field. All the information such as enterprises’ financial data, clients’ information, research results, invaluable knowledge bases can be easily searched, modified, transmitted, and stored. However, what follows are those intruders, information leaks, unwarranted modification or even deletion. One way or another, threats put enterprises into jeopardy.

Fortunately, there is Application & Content Protection (ACP). This security solution aims to help those in need but without astronomical sums of capitals to enhance IT security in the face of adverse impacts of risks and deteriorating IT environments. It applies to IT systems like ERP (Enterprise Resource Planning) and CRM (Customer Relationship Management) and knowledge products like electronic galleries, e-books, digital textbooks and so on.

The picture illustrates seamless integration of ACP with business value and technical value. Following implementation of ACP, precious contents are available for clients and equipped with robust ACP encryption and strong authentication. 

Image

ACP Wizard dramatically upgrades the security of original systems in a few simple steps, preventing threats from copying, appropriating and even skimming. In addition, the patent transparent real-time encryption engine exceptionally encrypts data within the operating system, leaving threats that exploit apps’ vulnerabilities ignorant of multilayer protection ACP has executed onto the OS.

(Evaluated according to budgets and requirements)
  1. Software mode: lowest cost, invalid and failed copy attempt.
  2. Smart card mode: high cost, card readers required, robust authentication mechanism in the IT field
  3. USB Key mode:moderate cost, less secure than the Smart card mode.
This technique wards off illegal copy since ACP is able to identify features of hardware environment and generates encryption keys based on hardware environment. Any attempt to copy will fail even with an ISO virtual drive.

ACP for windows

VDP, Virtual Drive Protection
VDP-R, VDP Recordable

ACP for Linux

LED, Linux Encryption Drive
Linux applications and content protection in OEM model
  • Loadable windows driver module (Linux v2.6, WinXP, 2003, Vista, XPE,Win7)‏
  • Running above physical Ext2/Ext3/NTFS file-system partition
  • Real-time encryption of raw sectors
  • Support token as key storage
  • Locked by host or by key token
  • Cryptographic algorithms: T-DES/DES, AES, RC5, and Cast
  • Provide application authorization
  • Protect application from memory dump cracking
  • Cipher shell tool to protect application run-time memory
  • License management

Send your message

Image

Address: No. 218, Section 6, Roosevelt Rd,

Wenshan District, Taipei City, 116 

TEL:+886-2-29343166

FAX:+886-2-29343167

 
Copyright © 2022 InfoKeyVault Technology. All rights reserved.