KIYis physically separated from the protected data. Even if the encrypted data is stolen, lost or hacked, it is always safe because the key (stored inside the KIY) is physically outside the data storage devices.
The key always follow the user who carry the KIY. The user can access the protected data anywhere, using any computer (not necessarily his own computer) together with the KIY. It is very convenient.
KIY provides following three (3) key features:
Protect your private information,
Share encrypted data with another KIY-user,
Authentication for payment, access control and product or service login.