SAGE Encrypt 4+

Document encryption management

南京思智信息科技 有限公司

Designed for iPad

    • 4.7 • 3 Ratings
    • Free
    • Offers In-App Purchases

Screenshots

Description

SAGE Encrypt supports multiple languages, cross-platform support for Mac, IOS, Window, Linux and other mobile computer encryption and decryption, is a fast intelligent encryption of your mobile computer files (pictures, videos, office, PDF,CAD,SolidWorks) Software, let you better protect your privacy and secrets, and can be safely shared with authorized secret friends to better enjoy work and life;

The main function:
1. Encryption: Do not change the file format, no one can open the encrypted file except yourself, you can safely save to cloud disk or export backup
2. Encrypted reading: the file can be read directly without decryption;
3. Intimate circle encryption: The encrypted files in the intimate circle can only be read by friends in the intimate circle, and cannot be decrypted and copied;
4. Shared encryption: Anyone who shares the encrypted files can browse without entering the circle of close friends. All encrypted files cannot be modified by copying screenshots and recording screens to protect the intellectual property rights of the files;
5. Photo encryption: After the photo is taken, it is automatically encrypted and saved in the safe.
Steps to share encrypted files in close circle
[1] Both close friends download the APP;
[2] Invite friends to join the close circle (share the link through social software, the other party is to enter the mobile phone number to register the mobile phone number, social software registration only needs to enter a nickname), you can also directly enter the close circle name to enter the close circle.
[3] The default is to automatically enter the close friends circle. If the close friends circle audit is enabled, the administrator's consent is required to enter the close friends circle;
[4] After entering the circle of close friends, the circle of close friends encrypts the file and shares it with the other party. The other party can only read without decryption authority;
[5] Remove the close friend. After selecting the close friend to move out of the close friend circle, the encrypted files received by the other party will be invalid and cannot be opened.

Technical features:
1. Users do not need to remember the password (one-click identification: WeChat + mobile phone dynamic code + fingerprint identification); remove the problem of complex password forgetting;
2. Support encrypted files without changing the format and storage path, without storing the files in a specific area for protection;
3. Encrypted files can be exported and shared at will, and the problem of file protection can only be solved on a single device;
4. Support mainstream terminal device file encryption and decryption: mobile phone, computer, tablet; realize multi-terminal platform unified encryption, decrypt file, not only file encryption and decryption processing on a single device;
5. Support file encryption reading; the other party can only view the file and cannot be maliciously transmitted;
6. Support file permission control;
7. Support file encryption and circulation;
8. Support file intelligent encryption: such as: automatic copying of files and automatic encryption of files in encrypted folders;
9. Enterprise-level document security protection;

contact us
WhatApp: +8615094302358
400 Tel: +86-4000897028
Official website: www.360jiami.net

What’s New

Version 7.7.7

1. Fix the inability to open encrypted videos and images received on WeChat;
2. Add file renaming function;
3. Modify and add encrypted video with unlimited size;
4. Optimize team management.

Ratings and Reviews

4.7 out of 5
3 Ratings

3 Ratings

App Privacy

The developer, 南京思智信息科技 有限公司, indicated that the app’s privacy practices may include handling of data as described below. For more information, see the developer’s privacy policy.

Data Used to Track You

The following data may be used to track you across apps and websites owned by other companies:

  • Location

Data Linked to You

The following data may be collected and linked to your identity:

  • Location

Data Not Linked to You

The following data may be collected but it is not linked to your identity:

  • Identifiers
  • Usage Data
  • Diagnostics

Privacy practices may vary, for example, based on the features you use or your age. Learn More

More By This Developer

You Might Also Like

机智水族
Utilities
Memorandum - Password Manager
Utilities
BMS Manager
Utilities
EncryptMe
Utilities
微域宝-个微工具箱
Utilities
福音歌谱
Utilities