|
|
|
|
|
 |
|
|
※ |
Data encryption & sharing software utilizing AES 256 |
|
|
 |
Meets the Advanced Encryption Standard (AES), which, in terms of current technology, is not computationally feasible to be cracked in a reasonable amount of time |
|
|
 |
SP7 utilizing modules can be adapted for secure transfer and privacy protection of all forms of data
|
|
|
 |
Storage box, cloud, intercloud, work-group protection, B2B, B2C, C2C and need-specific applications (both corporate and individual)
|
|
|
|
|
|
|
 |
|
|
※ |
Encryption of sent, received and stored data |
|
|
 |
Users are given keys (one for encryption and one for authentication) similar to a keyholder for personal devices, so data can be stored and used in a safe and secure manner
|
|
|
 |
Keys can be created and stored for individuals and groups (multiples can be freely created) and various services can be used in a safe and secure manner for each key
|
|
|
 |
Increased operational security is realized as storage professionals handle the data and users (individuals and groups) hold the keys
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|