top of page

TeraKey PC  for personal use

An encryption engine disguised as a USB stick

Encrypt any type of files and save them anywhere.

TeraKey PC is an encryption tool built in a USB stick that can encrypt folders and files located in your Windows computer, network, NAS, or a cloud service, such as Google Drive, OneDrive, Dropbox, etc.

  • Send TeraKey encrypted files to other TeraKey users located anywhere.
     

  • Encrypt and decrypt entire folders preserving the file tree organization.
     

  • TeraKey generates random encryption keys destroyed after encryption verification.
     

  • An encryption key is never used again.

TeraKey PC USB

ARCHITECTURE FOR TOTAL SECURITY

TeraKey PC is a self-contained encryption engine desiged to carry sensitive documents protected with the highest possible security. At the same time, Terakey PC allows you to encrypt personal and business files using your computer to share them with other people.

THE PUBLIC SECTION

When plugging Terakey to a PC, the "PUBLIC" section is shown on Explorer. You can drag and drop files as you normally do with any other USB storage device.

THE PRIVATE SECTION

The PRIVATE section is invisible and hidden. Absolutely no one can access the PRIVATE section without dragging and dropping a programmable “Magic File” into the PUBLIC section. You need to access the PRIVATE section to run the TeraKey interface to encrypt and decrypt folders and files.

MAGIC FILES

A “Magic File” can be any type of file such as a music file, picture, video or a simple text file. For example, you can use a picture from an album where only you know which picture opens the PRIVATE section; or you can use a text file with the words of a phrase from your favorite song. With this complexity of entry, unauthorized access to the hidden PRIVATE section to decrypt and view sensitive files is impossible and uncrackable. You can program up to (4) Magic Files.

FOUNDATION FILES FOR VIRTUAL GROUPS

For total security, you must encrypt a file to a “virtual group”, which consists of a set of trillions of random and unique encryption keys that are created using a “foundation” file, such as a picture, music, a video, word file, etc.  Choose a foundation file that only you would know. These keys are not stored, rather a key is created when a file is processed through TeraKey’s encryption engine to be encrypted. You can create any number of virtual groups for your TeraKey PC.

SHARING TERAKEY PC ENCRYPTED FILES

Send to another TeraKey user the same foundation file used to create your virtual Group. The recipient creates a group using the same foundation file. A file encrypted by you can be decrypted by the recipient user, as long as it is encrypted to a group in which both users used the same foundation file. You can create multiple virtual groups identified by a name related to the people with whom you are sharing encrypted files.

THE ENCRYPTION ENGINE

After you access the PRIVATE section, run the TeraKey engine application. An intuitive, user-friendly screen will appear where you can select encryption or decryption operation.  In each case, you select a destination folder, an encryption group and the source folders and files. Each file will be encrypted with a unique key, which will never be used again.

ABSOLUTE FILE PROTECTION

For maximum protection of information when decrypting a file, select a destination folder in the same PRIVATE section. This way, you can work on your files without having the unencrypted file stored on your computer. When encrypting files, you can also encrypt them directly to the PRIVATE section. TeraKey PC requires no internet connection. Encryption is done locally.

ABSOLUTE GROUP CONTROL PROTECTION

An encrypted file can only be decrypted by a Terakey PC with a group created using the same foundation file. This is the fundamental reason why no one is able to decrypt your files, ever. 

INTEGRATION WITH WINDOWS

When ran on a computer with administrator privileges, TeraKey incorporates itself into Windows, which gives you different ways to perform an action. For example, you would be able to simply double click and open an encrypted file, or right click a folder to encrypt it without having to go through the TeraKey PC application.

KEEP YOUR DATA SAFE

Make backups of encrypted files carried in your TeraKey PC. If lost, buy another TeraKey PC and create the same virtual groups with the same foundation files and you will be able to decrypt your backup files.

bottom of page
google-site-verification: google43d31fc921668958.html