Contact us
 
 
Powerful File Rules Callback and Change
File Displaying Runtime Management
Copy / Print Protection / License Control
Online Authentication / Monitoring
Defeat API Hook / Against Most Debuggers
PKI Featuring up to 1024 bit Public Key
SSL & CA Online Security Data Transfer
Run Time Encryption/Decryption
Defeat Reverse Engineering.........more

Five Functions

New type of Golden Key: Waha’s Golden Key can be set in any common document type. It can be chosen from the existing documents in the computer without any limits on its type when being set. So to choose the Golden Key completely depends on you. The golden key is the authority for the receiver. Only when they have the golden key and concerning code can they open the security envelope.

Unique Timing Setting: Flexible set the timing from 1sec. to 9999sec.to authorize the time continuance of reading or appreciation. Times and time period etc. can also be set in waha SE for enterprises.


Particular Automatic Deletion: In the function module, Waha has the particular function of automatic deletions which two distinctive characters. One is that document will be deleted automatically right after the set reading time is up and all of the envelope will be deleted totally from the computer. The other is that automatic deletion will be carried out once any plagiarist attempt to plagiarize the content in the envelope. Thus, it protects the content in the envelope and prohibits plagiary.


Unauthorized Copying Prohibition: Waha prohibits any unauthorized copying, saving, screen printing and printing when the security data is decoded and opened so as to prevent the content from being copied . Even those exterior softwares can not read and get any contents from using security file. It is because that once security file is opened then Waha forbids all the other application programmes to read the protected contents. Thus, the content in the Waha's secured are guaranteed safety.


Security Mode Setting: With Waha security, easy to set the reading continuance, times, the ways of coding as well as automatic deletion etc. All these security systems are up to purpose wish and under control without being damaged by anyone else.

 
copyright © 2007 waha Inc. All rights reserved