Products Main Summary FAQ Customers Contact TOC Choose format
Ordering products
You will find them
indispensable!
Products Customize Simplified Detailed
So far we have developed a product family that includes six products. These are mainly for software and digital content protection. Contact us to order them. Payment is by credit card, money transfer or by post.
We can customize our products to your needs. Use our consulting services to find out your real needs! To lower your risk, we have a money back guarantee policy. If we have to make a major reengineering or development, you may be asked to give some prior payment and you have to sign a strong non-disclosure agreement. By our exclusive contract policy you may beat your competitors.
Ordering of products:
Stand alone products can be ordered by e-mail to info@tpvs.hu. Payment is by credit card, money transfer or by post.
Encrypting your products, or product customization is far more complicated. The complications are due to proper and fair assessment of responsibility and security.
We make a contract assessing the responsibilities of both of us.
You submit your signed program to us through a secure channel. It may be encrypted by other, conventional means, but cannot contain any parts encrypted by UPE.
We sign and encrypt your program as a text by strong encryption. We deposit it, maybe at a trusted third party if you want.
We encrypt the program, using some version of UPE and send it back to you through a secure channel.
We mutually sign a strong non-disclosure agreement.
We do not share any information about your program with third parties. We do not use it for anything without your permission. We analyze it only from security point of view.
You also have to make a very clear statement that to your best knowledge the code does not contain malicious code or wiretapping or other undocumented stealth features.
You also have to state it clearly that you do not want to use the encrypted program or routines as part of malicious programs, and tools for wiretapping or privacy violation.
You have to specify your needs, expectations and deadlines clearly.
You are required to make a note in a clearly visible place on your product that it contains software encrypted by TPVS. This statement is presented in a tamper-proof way. If removed, the program does not run.
We are allowed to check whether your statements are true by any technological means. (But we do not necessarily do it. We cannot give guarantees to your users, because in full generality it is mathematically undecidable. We may issue a statement that to our best knowledge it is secure.)
You agree that we may refuse the encryption at this stage if we do not trust you or your product for whatever reason in spite of any other agreement we previously made. We do not have to specify why we do not trust you or your product.
You submit your signed program, routines or source code in an encrypted form or through personal contact or other secure channel. In special cases we may go to your company to do most of our work there.
You agree that we may refuse the encryption at this stage if we do not trust your product for security or privacy reason in spite of any other agreement we previously made. At this stage we have to specify the reasons.
We sign and encrypt your program as a text by strong encryption. We deposit it in whatever form you like, e.g. at a trusted third party. The reason for this is to clear ourselves if the program is proved to contain security holes or malicious features not caused by UPE.
We clearly state that we did not implement malicious code and you have the right to test it by any technological means.
We encrypt the program, using some version of UPE and send it back to you through a secure channel.
Products
Main
Summary FAQ Customers Contact TOC
Choose format