1.Virtual disk technology. No need to change the existing partition, but in the existing space to create a virtual encrypted disk partition, partition encrypted disk is identical with ordinary use. 2.Real-time load technology. Encrypted partition load quickly, without frequent and time-consuming to wait for the process of encryption and decryption. 3.OTP (fuse) technology. Ensure that irreversible change is not, anti-hacker tracking, hardware cannot crack the copy. 4.The only key, no two keys cannot be exchanged, and only have both key and password to work properly. 5.High strength AES encryption algorithm. To ensure that data is not subjected to brute force. 6.Data hiding techniques. Encrypted data hidden in the system, only in the electronic key is inserted to find and use. 7.Mobile security technology. Use mobile hard disk, U disk, memory cards and other mobile devices to store and transmit encrypted data. 8.Easy to use. Electronic key operation is very simple, no complex setup, a look that will. 9.Full support for Windows operating systems. Windows 2000, XP, Vista and Windows 7. 10.DNA unique data recovery technologies. Even if the electronic key is lost or damaged, data recovery can be successful.