File Protect System (FPS) is a professional solution for the personal data protection. The application can be used alone to encrypt files and folders, or as a component of a complete cyber defense system. FPS allows you to build a reliable confidential information exchange system using embedded e-mail client. The application provides the user the option of choosing an encryption algorithm. Encryption can be done using a password or a digital objects (images or arbitrarily chosen file). Encrypted files can be stored on the local disk, on a server, on external storage or in the cloud. With FPS you can create packages of protected files. This feature is extremely important when creating archives or backups of critical information. If necessary, all processes can be documented in real time, allowing for subsequent analysis and optimization. The application complies with the requirements of the EU General Data Protection Regulation (GDPR) The standard encryption algorithms used in the application are validated within NIST's Cryptographic Module Validation Program (CMVP). FPS was developed in accordance with the requirements of ISO 9797 and ISO 9798-2. The development process complies with the requirements set out in ISO / IEC 15408-1, which guarantees high reliability. File Protect System can convert any computer with an Windows operating system installed to extremely powerful cipher machine as used by special services and government agencies. The application includes the following standard encryption algorithms: Advanced Encryption Standard (block size of 128 bits, key lengths: 128, 192 and 256 bits) Blowfish Haval (256 bit, 5 passes) CAST-128 (CAST-5) CAST-256 (CAST-6) Information Concealment Engine (ICE) Information Concealment Engine 2 (ICE-2) ICE Encrypt MISTY-1 (Mitsubishi Improved Security Technology) Ron's Code 2 or Rivest's Cipher 2 (RC-2) Ron's Code 4 or Rivest's Cipher 4 (RC-4) Ron's Code 5 or Rivest's Cipher 5 (RC-5) Ron's Code 6 or Rivest's Cipher 6 (RC-6) Serpent Tiny Encryption Algorithm (TEA) Twofish Affordable hash functions: Secure Hash Algorithm 1 [SHA-1] RIPEMD-160 Haval [256 Bit, 5 passes] Message Digest 5 [MD-5] Message Digest 4 [MD-4] Tiger RIPEMD-128 SHA-256 (SHA-2 family) SHA-384 (SHA-2 family) SHA-512 (SHA-2 family) Accordance with accepted standards: ISO 10116: Information Processing — Modes of Operation for an n-bit block cipher algorithm. ISO 9797: Data cryptographic techniques — Data integrity mechanism using a cryptographic check function employing a block cipher algorithm. ISO 9798-2: Information technology — Security technicues — Entity authentication mechanisms — Part 2: Entity authentication using symmetric techniques. ISO 10118-2: Information technology — Security technicues — Hash-functions — Part 2: Hash-functions using an n-bit block cipher algorithm. ISO 11770-2: Information technology — Security technicues — Key management — Part 2: Key management mechanisms using symmetric techniques.
What's new in this version
Ability to choose between fourteen encryption algorithms. Create strong protected data cases. BeMail LE added. E-Mail control functions Recipient geolocation. Choosing a hash function and determine the checksum of the file. Encrypt files and directories using any file (Object Relation Encryption - ORE). Creation of system reports and convert them into PDF, HTML or RTF format. Exchange encrypted files and messages when using a public account in Microsoft Outlook. Packet mode for file and directory handling on different devices. Create archives with a high level of content protection. Real time process control. Storing the result in encrypted form.
- Encrypt files and directories using a password.
- Send/receive encrypted files and messages.
- Encrypt files and directories using any file (Object Relation Encryption - ORE).
- Choice of twelve encryption algorithms and ten hash functions.
- Use digital image elements to generate secret keys (Object Relation Encryption Component).
- Real time process control.
- Reporting of the actions taken.
- Packet mode for file and directory handling on different devices.
- Ability to turn any computer into a professional encryption machine.
- Create archives with a high level of content protection.
- Interface that most approximates File Explorer.
- Create strong protected data case.
Published byGEYA-92 OOD
CopyrightCopyright © 2010-2019 G-92 Developers Group. All rights reserved
Developed byGate-92 DG (G-92 Developers Group)
InstallationGet this app while signed in to your Microsoft account and install on up to ten Windows 10 devices.
Language supportedEnglish (United States)
Terms of transaction
File Protect System - LE license terms
File Protect System - LE URL: http://fps.g-92.com END USER LICENSE AGREEMENT FOR FPS (version 3.01.01.04 LE) This end user license agreement (“Agreement”) is an agreement between the user (you) and G-92 Developers Group (GEYA-92 Ltd) for File Protect System computer software, the corresponding media and printed media, as well as all services electronically available "online" such as updates. This agreement comprises a license. When you install BS NGIT software, copy it for your own use or use otherwise you consent to be bound by the provisions of this Agreement. In case you do not agree to the provisions of this Agreement please return the unused product or the storage medium immediately and erase all software components from your hard disk. The software is protected by the U.S. - American copyright laws, B.G. - Bulgarian copyright laws and other international laws and treaties on intellectual property protection. The software is not being sold but licensed. The ownership remains with the manufacturer GEYA-92 Ltd. You are authorized to install and use one copy of the software on any single personal computer system. You are also authorized to install or store one copy on a storage medium such as a network server, disk, or band disk drive as long as it is only used to install or execute the software or service product on your computer. You must purchase another license for every additional computer. The user license may not be shared or used on several computers at the same time. GEYA-92 Ltd reserves the right to change or supplement the source of the online updates included with the software. You may not demand a specific medium or a specific source regarding the electronic download option and/or the download option itself. The license is valid for the existing product. It is not possible to claim an update or upgrade for specific parts or archives. In no event shall GEYA-92 Ltd be liable for any damage occurring to software or hardware. The manufacturer will not assume guarantee if the software is used in any way to cause death or personal injury. It is recommend not to use this software in life risking environment. In any cases a possible damage is limited to the paid price per user license. GEYA-92 Ltd offers a limited technical support only for the time of maximum of 3 months after the date of purchase. GEYA-92 Ltd would like to point out that currently it is not possible to create software that is bug free in all possible uses and combinations, especially in combination with various software components. Therefore the object of this agreement is the software as is. The licensee shall inform GEYA-92 Ltd of possible defects in the software as soon as possible, at the latest in 14 working days after the first installation. In case of defects in disks or CD's you are entitled to receive a free replacement or a replacement at the lowest possible cost from GEYA-92 Ltd. Multiple replacements are allowed. Should the replacement also fail the customer may request either a price reduction or a cancellation of agreement. Information You are not authorized to decompile or disassemble the software. The software product is licensed as a complete product. A separation of the individual components is not permitted. Lending or leasing GEYA-92 Ltd products is not allowed without written consent from GEYA-92 Ltd. Regardless of other existing rights GEYA-92 Ltd reserves the right to terminate the Agreement upon a 14-day notice if you fail to comply with any term or condition of the Agreement. You agree that upon any such termination by GEYA-92 Ltd, you will destroy all existing copies of the software and all its components. If you violate this Agreement by so-called unauthorized copying the user consents to purchase at least the same amount of licenses retroactively. The latter is irrespective of the actual signing of an agreement or purchase. The property and copyright of the product (including but not limited to graphics, animations, video, music, text, online update) remain with GEYA-92 Ltd. Graphics and animations, whose origin is not known, are not part of this license. The ownership rights remain with the manufacturer or licensor. A liability claim is excluded. The product was created to the best of GEYA-92 Ltd’s knowledge and belief. You acknowledge and agree that you have read and understand this Agreement. All company and product names are registered trademarks of their respective owners.