• slide-1
  • slide-2
  • slide-3
  • slide-4
  • slide-5

MailID can be activated by writing the word “secure” into the subject of the email or is enforced by a security policy for communicating with certain content, domains or addresses, likea banking eStatement to a client directly generated out of a web or mobile based transaction. MailID uses the strongest encryption within the industry to make sure your customers get their statements, and no one else does and cuts on costs and paper and delivers real-time like normal email.

The email and attachments will then be automatically encrypted and/or signed based on:
 PDF encryption with a static password or PIN Code;
One-Time Password sent by SMS to the recipient;
Generating a One-Time Response Password through the Challenge Response code system in the email by the recipient;
S/Mime encryption, decryption with(out) digital signature (PKI).

PDF encryption
MailID looks a lot like a courier service, but goes further by sealing the message and enclosed information with a signature of the sender by which only the recipient with the access key is static or sent by SMS or provided over the phone or generated through a web based challenge response system so his or her mail slot can only read the locked information. When the recipient does not have PKI in place the visible content of the recipient’s email shows only the MailID number and a notification that a SMS is delivered to the mobile phone of the recipient containing a One-Time password, or the recipient performs in the email a web based challenge response session or a static password is communicated over the phone or via post the first time by the sender to secure the PDF. The available PDF reader allows you to decrypt and read encrypted PDF documents. PDF documents can even contain attachments, like banking eStatements embedded within the encrypted PDF and these attachments could also be signed by the sender with a digital signature. This dynamically generated and via SMS distributed password, or generated code based on the challenge response system, or communicated static password, is connected to the email converted into an encrypted MailID PDF. Only by copying the right One-Time Password received via SMS, or the correct Response Code generation in the email and filling out the Challenge Code, or the communicated static password, the secured email message can be opened, decrypted and read and if wanted securely responded to the sender by the recipient. The MessageID for the corresponding MailID ensures the sender that the recipient of the mail must authenticate before being able to decrypt and read the email. After reading, the recipient can return an encrypted reply using the integrated web based reply function, as well as include attachments in his or her reply.

S/Mime encryption, decryption and siging (PKI)
MailID secures your email by means of automated encryption and use of digital signatures. MailID is easy to use and straightforward and both senders and recipients do not have to download any software clients. MailID cooperates with your existing email infrastructure, such as with Microsoft Exchange, BlackBerry® , Lotus Notes, etc. and it does not affect the existing functionality of current email applications. MailID is based on the current and generally accepted internet standards (PKI, X 509, S/Mime) for encryption, decryption and digital signatures. By following these standards, MailID is compatible with products and certificates from other parties but also offers a built in Certificate Management solution for external recipients and internal users. Certifcate creation and management can be done by the administrator and automatically be distributed through the web based administration console of MailID, limiting the amount of user interaction and making the use of MailID easy for both user and administrator. The certificate and private key can also be stored in a secured environment of the ID Control USB Token and even be used for other security purposes such as securing VPN or Web Applications with strong authentication.

What's your e-authentication method?

Go to top