Network based authentication - When a Sender wants that the encrypted docs should be accessible to all the PCs connected within a network, then the Sender will enable Network based authentication. After encrypting the docs, Sender will configure the Networks in which docs will be accessible by defining Network IDs . At the receiving end, when the receiver tries to access the encrypted docs, the system will scan the PCs which fall under authorized networks & if verified successfully, Encrypted docs will open in respective target application under authorized networks.
Copyright © 2024 VCrypt Systems. All Rights Reserved.