Content Verification Certificates
Content Verification Certificates (CVC) facilitate the verification of «web page content» - The essential requirement for trusted e-commerce services that are now being attacked with increasing frequency by ever more convincing web page spoofs and Phishing attempts. Now a billion $ method of identity theft, «Phishing» has become the number one security concern of the top e-commerce service providers.
CVCs afford providers a fully tested, fully patented protection system. As an X509 compliant certificate type, CVCs are created, distributed, and revoked using proven PKI (Public Key Infrastructure) methods to provide the highest level of security for web page content.
A web page before and after Verification
Content Verification Certificates allow verification of web site content. The content requiring protection is digitally bound within an X509 certificate also holding location information
Content Verification Certificates - Highlights
- Provision of Confidence, Assurance and Trust through Verification
- Protection of web page content through encryption of digitally bound content and location
- AntiSpoofing and AntiPhishing protection
- Brand and trademark protection
- Forming the basis of patent pending 'Browser Independent' verification tools
VerificationEngine™ - The free tool for Internet Explorer
VerificationEngine enhances the capabilities of the ubiquitous Internet Explorer web browser to that of a true trusted business tool - verifying SSL connectivity protecting the browser toolbars whilst at the same time extracting and displaying the contents of any valid CVCs. The only way to combat fraudulent/spoofed websites is to ratify for your self that site elements are verified - this requires the verification to take place outside of the browser so that the fraudster can have no input into the results.
Before and After - Example
Content Verification Certificates can be verified either individually or as a group. The demo below shows how trusted content elements are display during both of these methods of verification.