Your Private Key is like your credit card. Don’t lose your Private Key, whatever you do. Always keep a backup of it in a secure location. Never give anyone your Private Key or password, or store your Private Key and password together. There are two ways to back up your Private Key.
The Cryptoloc Cloud mobile app is available on both the Google Play Store and Apple’s App Store. After logging in, go to menu > Private Key. Follow the steps and transport your Private Key securely to your mobile app.
Log in to Cryptoloc Cloud from your desktop browser. Go to Support > Private Key Export and click on the “Export to USB“ button.
If you have forgotten your password or lost your Private Key, go to the login page from your desktop browser and click on “Cannot login? Account Recovery”. You should be able to regenerate a new Private Key and new password by following the recovery process, fees apply. The fee is to cover costs from the escrow for account recovery. The escrow, Lloyds Solicitors, is an independent third party that holds part of your Cryptoloc Security. They are able to recover your credentials for file encryption/decryption.
Once you have recovered your account, remember to save a copy of your Private Key. You can download our Cryptoloc Cloud mobile app and transfer a copy of your Private Key over. If you lose your Private Key in the future, you will be able to retrieve it from your Cryptoloc Cloud app.
Your browser will remember the last location of your key. If you are using a different account or you have just recovered your account through an Account Recovery process, you will need to click on “Use another Private Key” and select the right Private Key. When going through the Account Recovery process, a new set of Private Key and password will be regenerated. That new Private Key is the acceptable one.
1. Log into Cryptoloc Cloud.
2. Click the Share button on the file you wish to share.
3. Enter the name of the person with whom you wish to share.
4. Click on the Send & Sign icon that appears.
5. Enter your recipient’s name and mobile number.
6. Set an expiry date for the Send & Sign and the recipient’s required action: “download”, “sign as received” or “sign and agree”.
7. Click “Send”.
You can have someone sign a file by firstly either sending the file directly through Cryptoloc Cloud or via Microsoft Outlook.
To send the file directly through Cloud select the file you wish to be signed. Click the SHARE icon on the file. Enter the email details of the person you wish to sign the document. Select the Bulk Actions, VIEW and SIGN and click APPLY.
To send the file via Microsoft Outlook, open a new email, enter the email details of the person you wish to sign the document. Click the SEND & SIGN Icon in the tool bar. Enter your Password, Hit CONNECT and enter your Password again to open your key. Select the file you wish the recipient to sign and then select if you want the recipient to sign as received or as an agreement. Hit START SECURING FILES. Once the file shave finished securing hit INSERT SHARES INTO EMAIL. Then send the email. The person you wish to sign the document will then receive an email notification requesting them to download and sign the document. Once the document is signed both you and the recipient will each receive a certificate of notification verifying the document was signed
Cryptoloc Cloud’s desktop sync app allows you to work seamlessly with your Windows or Mac computer. Encrypt and upload files from your desktop, straight to your Cryptoloc Cloud account. Receive desktop notifications and continue working while sync works in the background.
The fee is to cover costs from the escrow for account recovery. The escrow, Lloyds Solicitors, is an independent third party that holds part of your Cryptoloc Security and is able to recover your credentials for file encryption/decryption.
Log in to Cryptoloc Cloud from your desktop browser. In the top user menu, go to My account > Plan and Activity, you should be able to manage your subscription and top-ups.
To recover accounts under a business, it requires your business’s recovery account and recovery account’s Private Key. This recovery account was created as part of the registration process when you created your business account. You can find your business’s recovery account username by going into My Account > Account Details. Members who lost their passwords or Private Keys will need to go through the Account Recovery process. It will keep the member accounts locked until they are recovered. To recover their accounts, log in with the business recovery account’s credentials. In the recovery dashboard, click the “Recover“ button.
No, recoveries for Team accounts are handled by the escrow – Lloyds Solicitors. Lloyds Solicitors is an independent third party that holds part of your Cryptoloc Security, and are able to recover your credentials for file encryption/decryption.
- A QR code is generated for each product or batch manufactured. You add that code to your product or packaging.
- Your customer or distributor scans the QA code using a free smartphone app or direct software/website integration.
- QA tells your customer or distributor if the product is genuine or not and if it has been recalled.
- If a fake, compromised or invalid code is scanned, you are instantly notified and made aware of the exact geolocation of where the scan took place.
- This helps you to both identify the spread of counterfeit goods as well as take immediate action against someone who may be attempting to copy or counterfeit a code.
Cryptoloc QA is a solution that prevents and detects counterfeit items reaching customers. Utilising QR codes that contain unique embedded identifiers, a number of algorithms report in real time enabling companies to monitor their supply chain, protecting their brand reputation and capturing lost revenue.
With Cryptoloc QA every code has information specific to that particular item itself embedded into the code. The QA code can contain any form of data such as a serial number, batch number, manufacturing date, expiry date, and more. The data is encrypted using Cryptoloc’s patented technology and a unique hash (QA code is generated). It’s like giving every item its own fingerprint.
Cryptoloc QA uses industry-standard QR code formats. This ensures that the solution integrates seamlessly with already established manufacturing and printing processes. The QA codes can be scanned by any normal scanning device or a mobile phone. QR codes are also a format that your customers are familiar with and by simply downloading the Cryptoloc QA App to their phone, they can verify the authenticity of the product they are purchasing.
Cryptoloc QA uses an App for security purposes as links are too insecure and prone to being replicated by cyber criminals.
Cryptoloc QA can be applied to any single product, a carton of products, a pallet of products, a batch of products or a shipment of products. It can also be applied to paperwork such as a Bill of Lading or Air Waybill, to verify the authenticity of a document.
Cryptoloc QA has been designed for all industrial processes, from small run items through to fast moving consumer goods. Cryptoloc QA codes can be applied directly to packaging or directly to the product and through a number of formats from ink jet, thermal print, silk screen, litho print, laser CNC printed/etched and self-adhesive labels. Cryptoloc QA can also be used with other technologies including RFID, Electronic Article Surveillance and more.
There are two methods through which the codes can be generated:
- Direct Integration
Your supply chain, CAD or CAM software communicates with our secure servers to request and receive new codes. This is suitable for production runs of all sizes.
- Manual Generation
You can manually create new codes using a Secure Web Portal, ideal for production runs where a batch number and/or manufacturing/expiry date is the only identifier used. New codes can then be exported in CSV format.
- Direct Integration
Cryptoloc QA has advanced counterfeit detection algorithms that can determine if a code has been compromised or if a counterfeiter is attempting to duplicate a QA code.
The two main detection factors are:
- Geolocation – Identifies if a code has been compromised by analysing the location of scans.
- Multi-Scan – Identifies if a code has been compromised by analysing the number of scans.
The information is accessed through the Cryptoloc QA Web Portal, which reports in real time suspect/compromised codes.
Cryptoloc QA has a volume-based pricing model.
Customers simply download the Cryptoloc QA product and scan the code using their mobile device. They will then be instantly notified if the product is genuine or suspect.
Yes, the Cryptoloc QA App can be customised with a manufacturer’s branding. There is an additional cost for this service.