Privacy Policy
Privacy Policy
Suzhou Jainkre Electronic Technology Co., Ltd. (hereinafter referred to as "we", "our company") highly values user privacy protection. This Privacy Policy aims to clearly and transparently explain how CryptKey software (hereinafter referred to as "this software") handles user data. Please read and understand this policy carefully before using this software.
1. Overview
This software is a locally operated password management tool. Our core design philosophy is to maximize user privacy and data security.
We firmly believe that your password data belongs to you and only you. No one, including us, should or has the right to access this sensitive information.
2. Information We Collect and Collection Methods
We strive to minimize data collection to the greatest extent. The following is a detailed explanation:
2.1 Information We Do Not Collect in Principle
We solemnly commit that this software does not, and has no necessity to, collect or upload any of the following types of user data:
Any of your account passwords, private keys, or key files.
Any data content you create, store, manage, or encrypt using this software.
Your identity information (such as name, phone number, email, etc.), as this software does not require account registration.
Your usage habits or behavioral data.
Any form of operation logs or runtime logs. This software does not generate or store any log files locally. The log information displayed in the interface only exists in memory during runtime and is automatically destroyed after closing the software, without being transmitted to us.
2.2 Extremely Limited Necessary Information Processing
In the following two specific, necessary scenarios, the software will communicate with our servers in an extremely limited manner:
- License Activation and Verification
Scenario: When you activate a license or when license verification is required (e.g., for the licensed version), and the device is connected to the internet, the software will contact our license server.
Transmitted Content: To generate a unique identifier bound to your device, we collect your device hardware information (such as motherboard, CPU serial number, etc.). Considering absolute security and privacy, we do not directly transmit any readable raw hardware information. This information undergoes an irreversible multi-layer encryption and hashing process, ultimately generating a 32 to 128-bit hash value. This hash value does not contain any personal identity information or restorable original device information; it is merely a meaningless digital fingerprint used to identify your device.
Purpose: Used to verify the activation status of the license and prevent license abuse across too many devices under the same license key.
Storage: The server only stores this hash value and license status. This data cannot be linked to you personally or your specific device and is regularly cleaned up.
- Software Update Checks
Scenario: When the software is connected to the internet, it may automatically check for new versions upon startup.
Transmitted Content: Only the current software version number is sent. Again, no user data, device information, or personal identity information is included.
Purpose: To inform you if there are functional updates or important security updates available for download, ensuring the software you use is in its optimal state.
Storage: We may aggregate statistics on the activity of different software versions (e.g., how many instances are using a particular version). This data is anonymous and aggregated, unable to identify specific users.
3. Data Storage, Security, and Encryption
3.1 Data Storage Locations
Your Password Data: All password files, keys, and other data created by you are, by default, only encrypted and stored on your own local device's hard drive. Our company's servers never access and cannot access this data.
The Extremely Limited Data We Collect: The anonymous hash value generated by the aforementioned license verification and the anonymous data generated by update checks are stored on our servers located in China.
3.2 Data Security and Encryption Technology
Local Data Security - High-Strength Composite Encryption: Your password files are encrypted locally on your device using a composite strong-parameter encryption algorithm combining RSA asymmetric encryption and multiple layers of AES-256 symmetric encryption. The encrypted files are in our unique proprietary format and cannot be opened or read in any other software, fundamentally eliminating potential risks from compatibility. From a data perspective, the encrypted file is just a pile of completely disordered, meaningless binary data on the computer. Only through this software and with the correct private key can it be restored to meaningful information.
Key Strength Recommendation: The software uses secure and reliable 2048-bit RSA keys by default, but we strongly recommend that you generate and use higher-bit keys whenever possible (currently supporting up to 12288 bits). Although higher-bit keys require more computation time during initial generation and decryption operations, this significantly enhances encryption strength, providing a higher level of security protection for your data.
Transmission Security: All communication between the software and the server is transmitted using encrypted protocols such as HTTPS to prevent data from being stolen or tampered with during transmission.
Server Security: Our servers are deployed in secure environments and protected by various technical and administrative measures including access control and firewalls.
3.3 Local Operation Description
All core operations of this software revolve around the encrypted password files stored locally by you, ensuring your data sovereignty and privacy security:
Data Reading: Only when the operator provides the correct private key can the software decrypt and read the contents of the corresponding password file. Please note that this software cannot and has no authority to verify whether the operator is the user themselves.
Data Writing: When you edit content and save, the software uses the corresponding public key to re-encrypt the data and overwrite it into your local password file.
Configuration Storage: To ensure the normal functionality and user experience of the software, we store necessary runtime configuration parameters locally (such as interface language, window size, etc.). This type of information absolutely does not contain any user-sensitive data, operation history, or private content.
No-Trace Principle: Apart from the aforementioned explicitly stated operations on password files and necessary configurations, this software will never write or store data anywhere else on your device, including but not limited to any form of sensitive information, operation history, runtime logs, or tracking information.
4. Data Sharing and Disclosure
We will never sell, trade, or otherwise share any of your data (including anonymous data) with third parties for any purpose.
Only under the following extremely special circumstances might we disclose information:
Compliance with Laws and Regulations: If we believe it is necessary to comply with applicable laws, regulations, legal processes, or mandatory government requirements.
Protection of Rights and Safety: To enforce our terms of service or protect the rights, property, and safety of us, our users, or others.
5. Your Rights
Since we collect almost no personal data from you, your rights are mainly reflected in the complete control over local data:
Right of Access and Control: You can access, encrypt, decrypt, edit, and delete all data stored locally at any time. Deleting local files permanently deletes the data.
Right to Portability: You can freely copy and move local encrypted files to any other device or location.
Right to Choose: You can avoid any network communication by using this software completely offline. Simply block the software's access to the network after installation or activation.
6. Children's Privacy
This software is not designed for children, and we do not knowingly collect any personal information from children.
7. Changes to the Privacy Policy
We may revise this policy from time to time. The updated policy will be published on the CryptKey official website https://CryptKey.jeiku.net/privacy/. Your continued use of our services signifies your acceptance of the revised policy.
8. Contact Us
If you have any questions, comments, or concerns regarding this Privacy Policy or CryptKey's data processing practices, please contact us through the following methods:
📧 Email: CryptKey-sp@jainkre.com
💬 Enterprise WeChat Customer Service: Customer Service QR Code
We will review and address your questions as soon as possible.
Thank you for choosing CryptKey, and thank you for your trust.
Policy Version: 20250910
Release Date: September 10, 2025