Application Enveloper

User can directly protect Application executable file/PE binary files like EXE, DLL, OCX etc. It supports both 32/64-bit PE format

As soon as an application is launched in the market, its cracks, patches are available online. There are many weak points in the developed application that results in cracking like simple key generation algorithms, weak registration schemes, application file itself is not protected against tampering or modifications of source code etc. Unprotected software is highly vulnerable to reverse engineering analysis & may result in recovering the fragments of source code or in some cases, the entire source code of the application.
VCrypt software security solution is designed to protect your windows 32/64 bit application against any such cracking, tampering or reverse engineering. It’s also equipped with a build in licensing system to enable you to add license key system to your application.

How the application envelope works?

The protection & licensing features can be integrated in the application using dedicated SDK. User can protect any compiled application file for Windows as long as it’s compatible with the PE (Portable Executable) format irrespective of the programming language or development environment used to create it. VCrypt software supports PE file formats like exe, dll, ocx etc.
Code, data and additional application resources are encrypted using strong cryptographic algorithms and multilayer polymorphic encryption so in case the intruder tries to remove the protection code, the application would be safe & can’t be run.
Also, if the user wants to add extra DLL libraries to the application, it’s possible to merge the main application EXE file with them & make it as a single output EXE file.

Features of Vcrypt Application protection suite

File Settings

✔ Allows the user to define extensions for the file to be encrypted & thus encryption key is generated automatically.
✔ User can set the message & caption to be displayed when the file is opened.
✔ Allows the user to load config file.

Two Way authentication

    ✔ Allows the user to define two-way authentications so as to add extra layer of security to the encrypted data.
    ✔ Various types of Two-way authentications as available are:

Iris Scan

  • When enabled, to perform any file related operation, user needs to authenticate himself via Iris scan.
Fingerprint Scan

  • When enabled, to perform any file related operation, user needs to authenticate himself via fingerprint scan.
For (F.O.P)

  • Sender can configure the HDD serial numbers to provide access only on those PCs having that HDD
Network Public ID

  • Encrypted docs will open only in authorized networks as configured by Sender
Activation Key

  • Unique key linked to Soft/Hardware License. Sender can configure these keys linked to the receiver of encrypted docs.
GEO Location

  • Sender can set up Lat, Lon/coordinates of a location in which encrypted docs can be accessed/will get opened by the recipient.
Hard Disk Serial Number

  • Sender can configure the HDD serial numbers to provide access only on those PCs having that HDD
Local Public ID

  • Encrypted docs will open only on selected PCs by defining their IDs under a particular network
Remote Access Control

  • In case of unknown receivers, they need to verify the authentications as defined by Sender in Remote access control list by providing respective information on the Vcrypt website

  • Refers to unique ID of Receivers PC generated at the time of Launcher installation. Sender can configure these IDs to provide access only on those PCs
OTP (Email ID/Mobile Number)

  • If enabled by Sender, OTP will be sent to Email ID/Mobile No. of Receiver. To access encrypted docs, OTP needs to be verified by Receiver.
File Open (Day/Date/Time)

  • File will open on a particular day only i.e. on Mon/Tues/ Wed etc.
  • ...
Mobile Authentication

  • If the option is enabled, SMS notification will be sent to sender's mobile number whenever the recipient tries to...