File Protect System (FPS) is a professional solution for the personal data protection.
The application can be used alone to encrypt files and folders, or as a component of a complete cyber defense system. FPS allows you to build a reliable confidential information exchange system using embedded e-mail client.
The application provides the user the option of choosing an encryption algorithm. Encryption can be done using a password or a digital objects (images or arbitrarily chosen file). Encrypted files can be stored on the local disk, on a server, on external storage or in the cloud.
With FPS you can create packages of protected files. This feature is extremely important when creating archives or backups of critical information.
A specialized text editor has been added to the application. The editor lays the protection of the application code in the development process.
If necessary, all processes can be documented in real time, allowing for subsequent analysis and optimization.
The application complies with the requirements of the EU General Data Protection Regulation (GDPR)
The standard encryption algorithms used in the application are validated within NIST's Cryptographic Module Validation Program (CMVP). FPS was developed in accordance with the requirements of ISO 9797 and ISO 9798-2. The development process complies with the requirements set out in ISO / IEC 15408-1, which guarantees high reliability.
File Protect System can convert any computer with an Windows operating system installed to extremely powerful cipher machine as used by special services and government agencies.
The application includes the following standard encryption algorithms:
- Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192 and 256 bits)
- Blowfish
- Haval (256 bit, 5 passes)
- CAST-128 (CAST-5)
- CAST-256 (CAST-6)
- Information Concealment Engine (ICE)
- Information Concealment Engine 2 (ICE-2)
- ICE Encrypt
- MISTY-1 (Mitsubishi Improved Security Technology)
- Ron's Code 2 or Rivest's Cipher 2 (RC-2)
- Ron's Code 4 or Rivest's Cipher 4 (RC-4)
- Ron's Code 5 or Rivest's Cipher 5 (RC-5)
- Ron's Code 6 or Rivest's Cipher 6 (RC-6)
- Serpent
- Tiny Encryption Algorithm (TEA)
- Twofish
Affordable hash functions:
- Secure Hash Algorithm 1 [SHA-1]
- RIPEMD-160
- Haval [256 Bit, 5 passes]
- Message Digest 5 [MD-5]
- Message Digest 4 [MD-4]
- Tiger
- RIPEMD-128
- SHA-256 (SHA-2 family)
- SHA-384 (SHA-2 family)
- SHA-512 (SHA-2 family)
Accordance with accepted standards:
ISO 10116: Information Processing ? Modes of Operation for an n-bit block cipher algorithm.
ISO 9797: Data cryptographic techniques ? Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
ISO 9798-2: Information technology ? Security technicues ? Entity authentication mechanisms ? Part 2: Entity authentication using symmetric techniques.
ISO 10118-2: Information technology ? Security technicues ? Hash-functions ? Part 2: Hash-functions using an n-bit block cipher algorithm.
ISO 11770-2: Information technology ? Security technicues ? Key management ? Part 2: Key management mechanisms using symmetric techniques.
The application can be used alone to encrypt files and folders, or as a component of a complete cyber defense system. FPS allows you to build a reliable confidential information exchange system using embedded e-mail client.
The application provides the user the option of choosing an encryption algorithm. Encryption can be done using a password or a digital objects (images or arbitrarily chosen file). Encrypted files can be stored on the local disk, on a server, on external storage or in the cloud.
With FPS you can create packages of protected files. This feature is extremely important when creating archives or backups of critical information.
A specialized text editor has been added to the application. The editor lays the protection of the application code in the development process.
If necessary, all processes can be documented in real time, allowing for subsequent analysis and optimization.
The application complies with the requirements of the EU General Data Protection Regulation (GDPR)
The standard encryption algorithms used in the application are validated within NIST's Cryptographic Module Validation Program (CMVP). FPS was developed in accordance with the requirements of ISO 9797 and ISO 9798-2. The development process complies with the requirements set out in ISO / IEC 15408-1, which guarantees high reliability.
File Protect System can convert any computer with an Windows operating system installed to extremely powerful cipher machine as used by special services and government agencies.
The application includes the following standard encryption algorithms:
- Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192 and 256 bits)
- Blowfish
- Haval (256 bit, 5 passes)
- CAST-128 (CAST-5)
- CAST-256 (CAST-6)
- Information Concealment Engine (ICE)
- Information Concealment Engine 2 (ICE-2)
- ICE Encrypt
- MISTY-1 (Mitsubishi Improved Security Technology)
- Ron's Code 2 or Rivest's Cipher 2 (RC-2)
- Ron's Code 4 or Rivest's Cipher 4 (RC-4)
- Ron's Code 5 or Rivest's Cipher 5 (RC-5)
- Ron's Code 6 or Rivest's Cipher 6 (RC-6)
- Serpent
- Tiny Encryption Algorithm (TEA)
- Twofish
Affordable hash functions:
- Secure Hash Algorithm 1 [SHA-1]
- RIPEMD-160
- Haval [256 Bit, 5 passes]
- Message Digest 5 [MD-5]
- Message Digest 4 [MD-4]
- Tiger
- RIPEMD-128
- SHA-256 (SHA-2 family)
- SHA-384 (SHA-2 family)
- SHA-512 (SHA-2 family)
Accordance with accepted standards:
ISO 10116: Information Processing ? Modes of Operation for an n-bit block cipher algorithm.
ISO 9797: Data cryptographic techniques ? Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.
ISO 9798-2: Information technology ? Security technicues ? Entity authentication mechanisms ? Part 2: Entity authentication using symmetric techniques.
ISO 10118-2: Information technology ? Security technicues ? Hash-functions ? Part 2: Hash-functions using an n-bit block cipher algorithm.
ISO 11770-2: Information technology ? Security technicues ? Key management ? Part 2: Key management mechanisms using symmetric techniques.
Tổng quan
File Protect System là một Thương mại phần mềm trong danh mục Bảo mật được phát triển bởi GEYA-92 OOD.
Phiên bản mới nhất của File Protect System hiện thời không rõ. Vào lúc đầu, nó đã được thêm vào cơ sở dữ liệu của chúng tôi trên 01/03/2019.
File Protect System đã chạy trên hệ điều hành sau: Windows.
File Protect System Vẫn chưa được đánh giá xếp hạng bởi người sử dụng của chúng tôi
Đánh giá mới nhất
![]() |
GOM Media Player
GOM Media Player: Trình phát đa phương tiện đa năng cho mọi nhu cầu của bạn |
![]() |
Canon G2000 series MP Drivers
Trình điều khiển máy in hiệu quả cho Canon G2000 Series |
smadav85
Tăng cường bảo vệ PC của bạn với Smadav85! |
|
![]() |
HiSuite by Huawei
Quản lý thiết bị Huawei của bạn hiệu quả với HiSuite |
![]() |
KMPlayer
Trình phát đa phương tiện mạnh mẽ cho Windows và Mac |
![]() |
Windows PC Health Check
Giữ cho PC của bạn chạy trơn tru với Windows PC Health Check! |
![]() |
UpdateStar Premium Edition
Giữ cho phần mềm của bạn được cập nhật chưa bao giờ dễ dàng hơn với UpdateStar Premium Edition! |
![]() |
Microsoft Edge
Một tiêu chuẩn mới trong duyệt web |
![]() |
Microsoft Visual C++ 2015 Redistributable Package
Tăng hiệu suất hệ thống của bạn với Microsoft Visual C++ 2015 Redistributable Package! |
![]() |
Google Chrome
Trình duyệt web nhanh và linh hoạt |
![]() |
Microsoft Visual C++ 2010 Redistributable
Thành phần cần thiết để chạy các ứng dụng Visual C++ |
![]() |
Microsoft Update Health Tools
Công cụ Sức khỏe Microsoft Update: Đảm bảo hệ thống của bạn luôn được cập nhật! |