Software License Agreement
Software License Agreement
Thank you for choosing to use CryptKey (hereinafter referred to as "the Software"). Before installation, please read the following legal agreement carefully. This agreement is a legally binding contract between you (an individual or a single entity) and the software developer, Suzhou Jainkre Electronic Technology Co., Ltd. (hereinafter referred to as "the Company"), regarding the use of the software product. Clicking the "I Agree" or "I Accept" button signifies that you have read, fully understood, and unconditionally accepted all the terms and conditions of this agreement.
Article 1 Acceptance and Modification of the Agreement
1.1 You must fully agree to all contents of this agreement before using the Software. If you do not agree to any term of this agreement, please terminate the installation process immediately and destroy or delete all copies of the Software you have obtained.
1.2 The Company reserves the right to revise the terms of this agreement from time to time. The revised agreement will be published on the CryptKey official website at https://CryptKey.jeiku.net/software-license/. You have the obligation to periodically review relevant changes. Your continued use of the Software constitutes acceptance of the revised agreement.
Article 2 Scope of Software License
2.1 License Types: The Company provides the following licensing models for the CryptKey software product:
(a) Free Edition: Allows free use of all basic features of the software;
(b) Feature-Limited Edition: Allows free use of some basic features; advanced features require authorization;
(c) Licensed Edition: Requires purchasing a valid license and completing the activation process to use all features.
2.2 Installation and Usage Rights:
- You may install and use the Software within the permitted number of authorized devices;
- Permits legitimate use of the authorized software version in commercial environments;
- Permits deployment of the Software as one component of a system integration.
2.3 Distribution Rights:
- Permits distribution of the original installation package provided by the Company via the internet or physical media;
- Strictly prohibits any form of modification, repackaging, or reverse engineering of the software installation package;
- Strictly prohibits charging any form of distribution fee for the software itself.
Article 3 Activation and License Verification
3.1 Activation Requirements:
If the version you use requires activation, you must:
(a) Obtain valid activation credentials (including but not limited to license keys, digital certificates, etc.) through the Company's official channels;
(b) Provide true, accurate, and legal activation information during the software activation process;
(c) Bear the obligation of confidentiality for the activation credentials and shall not transfer, lend, or disclose them to any third party.
3.2 The following acts are strictly prohibited:
(a) Using any activation tools, cracks, key generators, or other illegal activation methods not provided officially;
(b) Using license keys from unknown sources, unauthorized licenses, or any pirated activation methods;
(c) Bypassing, damaging, or interfering with the built-in license verification mechanism in any way.
3.3 Verification Mechanism Description:
(a) The Company has the right to use technical means to verify the activation status and license validity of the software regularly or irregularly;
(b) Implements strict genuine verification for commercial users, including but not limited to: - Regular online license status checks; - Audit of enterprise deployment environments; - Monitoring of multi-terminal activation situations;
(c) Implements reasonable license verification measures for individual users to ensure the normal use of basic software functions.
3.4 Risk Assumption:
(a) The Company assumes no responsibility for software malfunctions, security vulnerabilities, data loss, etc., caused by the use of non-genuine activation methods;
(b) The user shall bear all commercial losses or legal liabilities arising from the use of illegal activation;
(c) The Company only verifies the validity of the activation credentials themselves and provides no warranty regarding the legality of their source.
Article 4 Intellectual Property Protection
4.1 Ownership Statement:
All intellectual property rights of the Software (including but not limited to source code, object code, user interface, documentation, images, audio effects, and related data) are exclusively owned by Suzhou Jainkre Electronic Technology Co., Ltd. The Software is protected by the Copyright Law of the People's Republic of China, the Patent Law, the Trademark Law, and international intellectual property treaties.
4.2 Copyright Notice:
You must not remove, obscure, or modify any copyright notices, trademarks, patent statements, or other legal notices contained in the software and documentation. All copies of the software must retain the original copyright notice in its entirety.
4.3 Restrictive Clauses:
(a) Reverse engineering, decompilation, disassembly, or any attempt to extract the source code of the Software is strictly prohibited;
(b) Creating derivative works of the Software or conducting unauthorized secondary development is strictly prohibited;
(c) Circumventing or damaging any technical protection measures contained in the Software in any way is strictly prohibited.
Article 5 Usage Restrictions
5.1 Legitimate Use Commitment:
You commit to using the Software solely for lawful purposes and shall not use it for the following activities:
- Any activity that infringes upon the legitimate rights and interests of others;
- Disseminating computer viruses, Trojans, and other malicious programs;
- Interfering with, damaging, or illegally intruding into any network or system;
- Any act that violates the laws and regulations of the People's Republic of China.
5.2 Commercial Use Restrictions:
(a) It is prohibited to repackage the Software as a core component for commercial sale or service;
(b) It is prohibited to resell, lease, or sublicense the Software to any third party in any form.
Article 6 Privacy and Data Protection
6.1 Basic Principles:
The Company highly values user privacy and data security and strictly adheres to the following principles:
(a) The Software is designed solely for password management functions and does not collect any user personal information or data;
(b) Supports complete offline use; internet connection is only required for activation verification;
(c) In an online environment, apart from communicating with the license server to verify authorization status at startup, no other data is transmitted;
(d) Password files generated by users using the Software are protected by high-strength encryption algorithms and can only be decrypted with a key generated and held by the user.
6.2 Technology Neutrality Statement:
(a) The Software is a technologically neutral tool, and its functions are limited to performing related operations on password files using the correct private key;
(b) The Software does not verify or judge the source, content, legality, or purpose of the decrypted data in any form;
(c) Any entity holding the correct private key (including but not limited to authorized users, attackers, or malicious infringers) can use the Software to decrypt the corresponding password file;
(d) The Company assumes no responsibility for any data decryption behavior or its consequences resulting from the leakage, loss, or unauthorized acquisition of the private key.
6.3 User Data Rights and Risk Notice:
(a) The user has complete ownership and control over all data generated and stored using the Software;
(b) The Software uses high-strength composite encryption algorithms conforming to industry standards to encrypt user password files. There is no other technical means to complete decryption besides the key held by the user;
(c) The user must bear the sole custody responsibility for the private key and password files. Loss, forgetfulness, or leakage of the private key or password files may result in irrecoverable data or losses, for which the Company assumes no responsibility;
(d) Users are advised to take sufficient measures to back up the private key and password files and ensure they are stored in a secure environment.
Article 7 Update Mechanism
7.1 Update Provision Methods:
The Company may provide software updates through one or more of the following methods:
(a) Automatic background download and installation;
(b) Manual download and installation of update packages by the user;
(c) Prompting the user to install via the built-in update checker in the software;
(d) Providing a full installation package for user reinstallation.
7.2 Update Strategy:
(a) Security Updates: Users are advised to install immediately;
(b) Feature Updates: Users can choose the installation timing;
(c) Versions for which technical support has ceased will no longer receive any updates.
Article 8 Disclaimer
8.1 No Warranty Statement:
The Software is provided "as is" and "as available". The Company expressly disclaims all warranties, express or implied, including but not limited to:
- Warranties of merchantability;
- Warranties of fitness for a particular purpose;
- Warranties regarding continuous availability, timeliness, security, accuracy, or non-occurrence of faults.
8.2 Limitation of Liability:
In no event shall the Company be liable for any direct, indirect, incidental, special, consequential damages (including but not limited to data loss, profit loss, business interruption, information loss, etc.) arising from the use or inability to use the Software, even if the Company has been advised of the possibility of such damages.
8.3 Specific Exemptions:
The Company shall not be liable for any losses caused by:
(a) Use of non-genuine activation methods or illegal cracked versions;
(b) Failure to install security updates promptly as recommended;
(c) User's failure to properly safeguard the private key or password files, leading to data loss or leakage;
(d) Any act of decrypting data through the Software by any entity using the correct private key and its consequences;
(e) Use of the Software in violation of the terms of this agreement.
Article 9 Termination and Validity of the Agreement
9.1 Termination Circumstances:
This agreement terminates upon the occurrence of any of the following:
(a) You actively uninstall the Software;
(b) You violate any term of this agreement;
(c) The license validity period expires (if applicable);
(d) The Company terminates the software service.
9.2 Post-Termination Obligations:
Upon termination of this agreement, you must:
(a) Cease using the Software immediately;
(b) Destroy all copies of the software and related activation credentials;
(c) Completely uninstall and delete the Software from all devices.
Article 10 Governing Law and Dispute Resolution
10.1 Governing Law:
The formation, validity, interpretation, performance, and dispute resolution of this agreement shall be governed by the laws of the People's Republic of China (excluding conflict of laws rules).
10.2 Severability:
If any term of this agreement is deemed invalid or unenforceable by a competent authority, it shall not affect the validity of the other terms, which shall remain in full force and effect.
Article 11 Miscellaneous
11.1 Entire Agreement:
This agreement constitutes the entire agreement between the parties regarding the use of the Software and supersedes all prior oral or written agreements.
11.2 Force Majeure:
If a party is unable to perform its obligations under this agreement due to force majeure (including but not limited to natural disasters, war, unrest, government actions, network attacks, telecommunication service interruptions, etc.), that party shall not be liable for breach of contract.
11.3 Agreement Variations:
Specific terms for different versions or license types of CryptKey software may vary. Please refer to the End User License Agreement accompanying the software product you use.
You confirm that you have fully read, understood, and agreed to be bound by all the above terms. You understand that clicking the "I Agree" or "I Accept" button constitutes a legally binding commitment, equivalent to your written signature.
Agreement Version: 20250910
Release Date: September 10, 2025