Digital Commerce Information

My photo
Welcome to Digital Commerce Information with Terry. The company SECURES YOUR SENSITIVE DATA with our tested product EZ-Lock DRM! Through automatically generated encryptions keys, we are able to protect your sensitive data! For more information, please contact Terry at +886937137873 or email Terry at dci_terry@kimo.com

Monday, February 22, 2010

EZ-Lock DRM by Digital Commerce Information

A. Why would you use the software?

1. Secret and vital data stored in your computer may be illegally transferred or stolen to your competitors.
2. Vital data may be stolen if hacker controls your computer.

B. About the software:

The software can prevent confidential data from illegally moved or copied. For example: primary design blueprint, technical data, and customer’s data etc. All edited files in the computer will be rigorously protected in encrypted environment. The users do not even know the files have been encrypted. It prevents files from being stolen by hackers or some Trojan programs. It provides integrated protection solutions. You do not need to change any using habits. It adopts Client/Server architecture and flexible strategy for administrators to manage your computers at centralized mode.

C. Brief Introduction:

As Internet is now an important communication interface among people, many companies now use Internet to communicate. However, unseen management leaks are also hidden behind the convenience. Companies are often unable to control or prevent employees’ actions such as transferring vital data to outside which may lead to company’s damages.

DCI's product, EZ-Lock DRM (Digital Rights Management), uses advanced AES Algorithm Standard (256 bits) to automatically produce an encryption key. Through lower encryption driver, the program can transparently encrypt all files in the computer. If a file is stolen, it becomes unreadable and wasted as the encryption rendered the file useless in an unprotected environment.

Most encryption products require the user to manually encrypt/decrypt files and save to committed folders. It is troublesome and unsafe! Our product adopts transparent encryption technology to directly encrypt/decrypt files; you can save them into any folder. Even unsaved temporary files are encrypted immediately.


EZ-Lock provides safe and integrated solutions for users. Users don’t need to worry about files getting stolen or cracked by employees or hackers. Users can freely manipulate their computers and don’t manually encrypt/decrypt any files. All files will be automatically encrypted/decrypted by the software.

For example, when the client program is successfully installed into the computer and after you've edit a new file by notepad, you do not find yourself encrypting the file (You've done it TRANSPARENTLY!). When they are copied into USB Disk and moved into another computer, however, they become unreadable and unable to be edited. Such is the program's convenience!

When encrypted files are transferred to another user, he will not be able to open the files if his computer is not licensed by EZ-Lock. The decrypted key must be obtained from the server. The key disappears when client computers are turned off. Even if the hard disk or computer is stolen, The files in the hard disk will not be cracked because the key is stored in the server. It is impossible for a user to crack the files encrypted by AES Algorithm (256 bits).

With the EZ-Lock, you can directly edit and save your designed manuscript, pictures, technical data, text files etc. Any other user without EZ-Lock support may fail to open or edit your files.