VCrypt I-Sec Hardware license key


Hardware license key

With the H/W license, the client can control over how many times the VCrypt software got installed on a computer thereby preventing casual privacy. It's not bound to a particular PC.

H/W Key Pros

  • PC based will work for individual PC
  • Advantages are the portability, as well as the access to easy licensing for integrators and support technicians who may need to move from location to location to offer support on the go.
  • Another benefit of the H/W key is that if your machine goes down, you can easily remove the H/W key and put it into the other machine.
  • A soft key cannot become broken or damaged, because it is not a physical item.
  • H/W keys can be updated remotely using the built-in Remote Management tool
  • Single soft key supports multiple applications & different types of data format

H/W key Cons

H/W keys can be damaged or lost.

User-Defined Restrictions Apply with Soft Key


Authorization Key access code

In case two files to be shared are having the same batch id & package id, authorization key access code is used to differentiate between them it's always unique. The user will be able to access data with written authorization key access code in a file & the same code exists in Softkey.

Group ID

Group ID provides a common code among different encrypted files. The user can group the individual's file based on assigned group-id.

Owner Name

Name of the person who holds the hardware/Soft license.

Sub-Dealer Code

Sub-Dealer denotes the dealer id(s) in a specific area code, the Area code can contain multiple sub-dealers.

Select ID(s)

List of features to be given in Application/Software, the user can select the feature(s) to be given in license key.

Last Key Configuration Date

Refers to the date/time when the license was configured for the last time. The client can set/reset this date along with time.

Geo-location Box

It refers to the geographical location of a particular hardware/soft license key where it will be accessible. The client can select the latitude-longitude values from the map and enter them here to set the geo-location for selected hardware.

Batch ID

Batch & packages provide the unique combined encryption key for data encryption. Multiple batches/Packages can be created by the client for the same ID/Account. The user configures single batch with multiple packages in the license key.

Installed Packages

Batch & packages provide the unique combined encryption key for data encryption. Multiple batches/Packages can be created by the client for the same ID/Account. The user configures single batch with multiple packages in the license key.

Restrictions Apply With H/W Key


This section defines the number of times & ways in which hardware key can be plugged into/unplugged from the user's system after purchasing a hardware license.

Run Count

It refers to the maximum number of times the hardware key has been launched the application. These values can be updated remotely.

H/W Start/End Date-Time

When this option is selected, then the client can restrict the H/W to work within a selected duration by entering the required values for Date & Time. The user won't be able to access the application if H/W is read earlier than the Start Date or after the End Date. These values can be updated remotely.

Offline Count

It refers to the number of times the hardware key has been plugged in to open the application when the user doesn't have internet access. The client needs to enter the Maximum count to use the hardware key without internet access.
By default, the value is 0. Every time the user opens the application without the internet, the current count will get incremented by 1. H/W key blocked automatically when the current offline count exceeds Maximum offline count. These values can be updated remotely.

Key Unplugged

Client can set the duration(in seconds) for the system to detect the hardware key for VCrypt application. Following settings are required under this section

H/W Detection Cycle

Shows for how long the application will run without the hardware being plugged in. The client can set the duration by entering the required value in seconds.

Error Message

When Hardware is not Attached/Found, the required error message will be displayed. The client can select/set the Error message here.

H/W Activation

Hardware key needs to be activated before it is used for the first time. The client needs to select a suitable option to activate the H/W key. At the user's end, Hardware activation requires internet access.

Auth Key Verified Date

For internal use. It checks if Server Date is in sync with System Date. The client can also change the settings.