As Internet is now an important communication interface among people, many companies now use Internet to communicate. With every electronic devices going for mobility, data files are easily transferred to another media. However, unseen management leaks are also hidden behind these convenience. Companies are often unable to control or prevent employees actions such as transferring vital data to outside which may lead to company damages. DCI's product, EZ-Lock DRM (Digital Rights Management), uses advanced AES Algorithm Standard (256 bits) to automatically produce an encryption key. Through lower encryption driver, the program can transparently encrypt all files in the computer. If a file is stolen, it becomes unreadable and wasted as the encryption rendered the file useless in an unprotected environment. Most encryption products require the user to manually encrypt/decrypt files and save to committed folders. It is troublesome and unsafe! Our product adopts transparent encryption technology to directly encrypt/decrypt files; you can save them into any folder. Even unsaved temporary files are encrypted immediately. For example, when the client program is successfully installed into the computer and after you've edit a new file by notepad, you do not find yourself encrypting the file (You've done it TRANSPARENTLY!). When they are copied into USB Disk and moved into another computer (that is not in the protected environment), however, they become unreadable and unable to be edited. Such is the program's convenience! When encrypted files are transferred to another user, he will not be able to open the files if his computer is not licensed by EZ-Lock. The decrypted key must be obtained from the server. The key disappears when client computers are turned off. Even if the hard disk or computer is stolen, The files in the hard disk will not be cracked because the key is stored in the server. It is impossible for a user to crack the files encrypted by AES Algorithm (256 bits). Different hierarchical authorities are set with different policies when the server and client programs are installed. These groups are given different privileges according to the encryption key given by the server or the administrator (administrator can set the encryption keys manually or the keys can be server generated). For example, head of department has all the encryption keys, and he wishes to look at group A and B's documents. As he has all the keys, he is allowed view the actual information inside the documents. On the other hand, however, if any member of group B wants to view group A's files, all they will see is gibberish or they simply cannot open the file. As some of the vital information needs to be passed onto outsiders, there can be many different rules to which the information may be given to them without compromising the information's security. EZ-Lock has many tools to that make it a very humanized information security product. Potential partners/buyers are welcome to try out our 10 day trial software to gain a better understanding of the software. If there are any difficulties, you may contact us for a video conference demonstration and we can help you directly using remote access software.
.Encryption software
To overthrow the existing traditional time-wasting questionnaire reading with high cost, InfoAcer created a new opportunity for improvement. Just by using the popular document editing software such as Word, Excel and photoshop, you can design and print the questionnaire card/paper and scan them after being filled for the system to automatically process and recognize and deliver the reviewed result, information and score. Compared to the traditional complicated manual review and data calculation, Info OMR allows you to use flexible, reduce the cost and improve the work efficiency. If you are interesting in InfoOMR, please let us know then we will provide the testing version for you to do the test 2 weeks, please click as following link to contact with us, http://www.infoacer.com/TrialRequirement.aspx
Exporting 3C accessories including computer parts, communication and information accessories.
HDMI Switch & HDMI Splitter & HDMI repeater.
Computer software.
which uses our ¡§Mobile Encryption Proximity Sensor¡¨ to unlock mobile devices and apps. It incorporates NFC (Near Field Communication) technology and the conceptions of encryption and invisibility with the files to embody the key to decipher the password. It also increases the difficulties for mobile devices to crack the code and improves the safety of utilizing mobile devices. ¡§Mobile Encryption Lock¡¨ functions with its own application program and is able to encrypt and dematerialize all sorts of files existing within the mobile devices. With the capability to lock down all apps, Mobile Encryption Lock guarantees the protection of personal information security. The encrypted and dematerialized files and locked apps could only be accessed to the user with the Mobile Encryption Proximity Sensor itself. (for more information please go to https://www.youtube.com/watch?v=1lEXlGNrwbs )
Computer hardware, software, network facilities.
Networking accessories, cable, fiber optic, inline coupler, isdn, keystone jack, lan active, patch panel, surface mount box, telecom, telphone accessories, face plate & accessories.
Product Name : 2gb Micro SD Product Description 2GB Micro SD TF card
Product Name : 16GB Micro SD TF Product Description 16 GB micro SD Tf card
USB flash drive 4gb ~ 64gb.
Product Name : Battery USB flash drive Product Description 1) Casing: battery shape usb 2) NW:25.5g 3)Size: 6.3x1.7x1.7cm 2gb ~ 16GB
Micro SD card Product Description 512MB ~ 8 GB micro SD card
USB 3, 4 Outlets.
Smart band, pedometer, sleep monitor, stop watch, bluetooth, screen.
Micro SD memory card, USB flash pen drive, smart bracelet, digital audio video recorder, power bank, automobile power jumber booster, phone cables, power strip, electrical devices.
Electronic parts, hardware products, automobile spare parts & connectors, CNC-lathed parts for computers, medical equipment, survival games equipment and telecommunication applications.
Industrial monitors, panel pc, touch screen, lcd monitors, industrial embedded pc, all in one pos, industrial lcd kvm switches, video wall displays, industrial automation.
#High quality LPDDR3# - 256GB Yield rate: 88%. Well known and established technology company MOQ: 100 KPCS IN STOCKED: 1500 KPCS CIF TERM PAYMENT: T/T, SBLC, DLC