East-Tec Logo

Activation Key = a string of numbers and letters which is used to activate a carrier or algorithm library

Since the structure of the algorithm and carrier libraries are public, someone could use these libraries to extract data from carriers or make a program which searches for data in carriers.

So, in order to secure these libraries, we have implemented a security system based on activation keys.

The keys are generated from a password, known only by the developer of the library. The library is activated with the call of a function which has as parameter the password. If the password is wrong the library will not function. Only east-tec InvisibleSecrets knows how to convert the password to an activation key or vice versa. If a developer wants to make public his library, he makes public also the activation key and not the password. So if the attacker doesn't know the password he can't use library.

The activation keys are generated in the Settings Dialog Box.

You'll find information on how to develop your own carriers or algorithms and implement the activation keys on our Web Site.

Subscribe to East-Tec Updates

Be the first to know when east-tec InvisibleSecrets is updated and improved, and when new security and privacy solutions are released!

Email Newsletter

Get news and updates delivered straight to your inbox.

Subscribe by Email

Facebook Page

Follow our page for the latest updates and tips in your feed.

Follow on Facebook

WhatsApp Channel

Join our channel for real-time updates and notifications.

Join on WhatsApp