Location based authentication - In case the Sender wants his docs to be accessed in a particular region, he can do so by Setting up Lat, Long Coordinates of that location. Sender will encrypt the docs using X-Encryptor tool & will enable location-based authentication for those docs. At the receiving end, if the PC of receiver lie within the authorized region, then only the encrypted docs will be accessible. Computer geolocation can be performed by associating a geographic location with IP address location data can include information such as country, region, city, postal/zip code, latitude, longitude, time-zone to correctly track the real time position of user.
Copyright © 2024 VCrypt Systems. All Rights Reserved.