Help Version: 2.12
Last Update: 06/14/01

Encryption Tool Help

The encryption tool uses a special algorithm for order encryption/decryption.

System Overview:
The QuikStore Order Encryption System is provided to help you ensure that your order files, order email, and customer information is kept secure from prying eyes.

While the QuikStore Order Encryption System is not as secure as PGP (Pretty Good Privacy), it does provide a level of security that would be very difficult to be broken into, even by an experienced computer hacker. And, it would be nearly impossible for any common person to decrypt the orders.

Creating a Public Key:
The first time you run the Encryption Tool, it will ask you to create a Public Key file.

Enter a Username, Password, and PIN number. These must be at least 5 characters long.

NOTE: Make sure to write down the values you have entered and keep them in a safe place. They are required to decrypt the orders!

Once the Public Key file has been created, a message box will come up showing you the location of the Public Key file. This file is called "serno.cgi".

Make New Keys:
If you want to regenerate your keys, you can do so at any time by clicking this button.

Decrypting Orders:
Go to your email and copy the encrypted section of the email. This includes the:

  • =====QEncrypt Version 1.00 Text Starts Here=====
  • =====QEncrypt Version 1.00 Text Ends Here===== 

...lines. Once you have the body of the email message on the clipboard, open the Encryption system, enter you login information, and then click the 'Paste From Clipboard' button at the bottom of the encryption tool screen.

Then click the 'Decrypt' button. This will run the decryption algorithm and decrypt the order.

Finally, you can use the file menu on the top left side of this window to either print out this file or save it as a file on your hard drive.

When you click the 'Decrypt' button one of three things will happen (provided 'Always Batch Decrypt' is not checked):

  1. It checks to see if there is anything in the text box. If there is, it tries to decrypt it.
  2. Next, it checks to see if there are any files in the "Encrypted" folder. If there are, it will loop through each file, decrypting them as it goes. When a file has been decrypted this way, it will move the decrypted file to the "Decrypted" folder.
  3. Finally, it will display a message that there is no text to decrypt if the other two steps do not work.

Get Log Files From Server:
This will open an FTP screen that allows you to login to your server and download the log files in the orders directory. Once the login information is correct, click the 'Get Files' button. This will connect to the server, change to the orders directory, download any log files that exist there, then disconnect. (It will go back to saying "Idle" in the status when it is done.) Close the screen. The list on the left side of the main screen should now have files in it.
Note: Once a file has been downloaded, you have the option of having it automatically deleted from the server.

Always Batch Decrypt:
If you click the 'Decrypt' button while this is checked, it will automatically attempt to decrypt each file in the 'Encrypted' directory. Once a file has been decrypted, it will be moved to the 'Decrypted' directory. As files are being batch decrypted you have the option of printing them out.
Note: If this is checked, you will only be able to decrypt the orders that are in the 'Encrypted' directory.

Using the tree:

  • If you click on a file in the tree, it will be displayed in the text box.
  • If you right-click on a file in the tree, a menu will pop-up that allows you to delete or decrypt the selected file.
  • If you click on a file in the tree and drag it to the other folder, it will be moved to that folder.

Clear Text:
This button will clear the text box when clicked.

Continue to Making New Keys


Copyright 1997-2003 iSoft-Solutions, inc.