web-Mail
  • web-Mail << new
  • web-Sign
  • e-Pen
  • e-Sign
  • e-Custodian
  • e-Workflow
  • e-Certificate
  • e-Payment
  • e-Bill
  • e-Seal
  • e-Identification
  • Smart Card
  • Fingerprint
  • Our Distributors
  • Security Partners
  • Our References
  • Price & Order
  • General Member
    Login :
    Password :
       
    Resellers & Distributors
    Login :
    Password :
       
  • DIY e-Document
  • Free Download
  • e-Sign
  • Viewer
  • web-Sign
  • web-Verifier
  • How to use...
  • e-Sign
  • e-Custodian
  • web-Sign
  • web-Verifier
  • Trouble Shooter

  • Compatible with
    World-class

    digital certificates:
    http://www.verisign.com
    http://www.thawte.com
    http://www.entrust.com
    and more...
     
    CRYPTBOT Secure web-Mail™ (V 3.60)
    Hi-Light of Secure web-Mail Processes

    >> Click picture to enlarge it.
    >> If you want to test it by yourself, click here to get a demo one or buy a real one.
    For Radically Preventing Spam
    e-Mails & Viruses and Digitally Signing on Web Mail
    With the CryptBot Secure web-Mail™, all users can choose to safely compose/send/receive their e-mails without interfering by junk/spam e-mails and viruses. Moreover, they can also keep the integrity and confidentiality of their e-mail messages with using its digital signature and encryption functions. The system consists of three modes of e-mails as follows:
    1. Normal Mail Mode
    2. Hidden Mail Mode
    3. Secure Mail Mode
    Normal Mail
    was designed for using in case you cannot really avoid to or have to expose your real e-mail address to other people or the public.
    Hidden Mail
    was developed for hiding your real e-mail address in order to radically protect your e-mail from the autonomous attacks of junk/spam e-mails and viruses. This mode can allow users to selfly control the outgoing/sending e-mail forms of senders.
    Secure Mail
    was designed for serving the sensitive e-mail that want to legally identify or confirm a sender and/or signer and keep its confidentiality by using the PKI (Public Key Infrastructure) technology to generate the "Multiple Digital Signature" or sign it by multiple signers and/or encrypt it with "Multiple Encryption" by multiple public keys on one e-mail.
    Able to Set Your Own Security Preferences
    You can set your own security preferences as follows:
    1. Mailbox Controls
    2. Security & Spamming Controls
    3. Mail Sending Controls
    4. Message Display Controls
    Normal Mail Compose
    is for creating/composing an e-mail, like other general web-mail systems. However, this normal e-mail compose function has the disadvantage about exposing the real e-mail address of sender which be easily attacked by spam e-mails and viruses. Therefore, this e-mail should be used for contacting with only whom that you can trust or only in case you cannot use the secure mail and hidden mail modes.
    Hidden Mail Compose
    is for creating/composing an e-mail which you want to hide your real e-mail address. This can help you to protect your real e-mail from the viruses and spam e-mails attacking since senders or who want to contact you have to use your special contact/reply form which does not show your real e-mail address. Therefore, this hidden mode is very suitable for using to contact or expose to the public, especially to be linked as the "Contact E-Mail" on your web site because it cannot be detected by the "E-Mail Mining or Harvesting" program of the mailling list and junk mail generating systems.
    Secure Reply of Hidden Mail Recipient
    1. Here is the example of the reply form of the hidden mail mode which recipient has to use this form to reply your e-mail, he/she cannot use the normal reply function of his/her e-mail program. An e-mail replied through this hidden form cannot be corrected or edited, therefore its content is reliable and can be used as a legal reference.
    2. The e-mail address shown in the "From" box or return or sender's e-mail is not the real e-mail address.
    Sets up Your Own Hidden-Mail Address
    Under the hidden mail mode, user can set up his/her own hidden e-mail address by him/herself. This created hidden e-mail address does not contain the "@" symbol but be set in the form of "AliasName.DomainName.xxx" such as john.cryptbot.com. So, you may call this hidden e-mail address pattern as the "URL Mail" address. The one that want to contact you via this e-mail address has to browse to this address by using a web browser instead of using an e-mail program. Therefore, he/she does not need to log into his/her e-mail account/program.
    E-mail Form of Hidden Mail
    This is the standard e-mail form of the hidden/URL mail address which anyone can browse and compose his/her e-mail for you without using his/her e-mail account/program. Just enter the hidden mail address in the address box of any web browser and then browse it. To send an e-mail with this standard form, sender will be forced to fill in the "Anti-Spam Code", designed for preventing an autonomous junk mail attack, before submitting.
    Radically Viruses and Junk Mail Preventing
    In case of having severe virus and spam e-mail attacks, the hidden mail users can absolutely protect these attacks by "blocking the attachment box", instead of simply filtering the file types of attachments, and additionally triggering the "security code" which will force everyone that would like to contact you has to fill in your assigned secret code.This security code will screen out whom that you do not know and allow only whom that you have assigned the secret code to contact. Moreover, the web-mail system administrator can also turn off the autonomous content hyperlink in order to protect e-mail users to carelessly click through some dangerous virus or hackers' linkages. If you have triggered all security measurements mentioned above, we do guarantee that your hidden mailbox will be absolutely protected from all attacks of viruses and spam e-mails.
    Secure Mail Compose
    1. This secure mail system was designed based on the high security technologies of S/MIME and PKI for specially using on the IE web browser. It can serve you with the "Multiple Digital Sinatures" which all senders can compose and digitally sign on the same responded e-mail.
    2. This e-mail system can be used with the workflow system for sending your e-document to any outside organization.
    Digitally Signing and Encrypting
    1. To rapidly compose a new e-mail, you can select many utilyties to help you such as address book of your required recipient's e-mail address, attachment, digital signature, encryption and draft saving functions.
    2. If you want to send an e-mail with digitally signing, just click the sign button or click the encrypt button if you want to encrypt an e-mail, or click both buttons if you want to digitally sign and encrypt which these functions can serve you with the multiple digital signatures and encryptions.
    3. In case you want to resend the sent and ecrypted e-mail, sender can select to either keep or cancel its existing encryption.
    Select Private Key for Digitally Signing
    1. Private key selecting panel where many key storing media are available for you to choose such as key store of web browser, smart card and other storing locations; hard disk, diskette and hady drive for instance.
    Public Key Selecting for Encrypting
    In case of encryption, the CryptBot Secure web-Mail™ will allow users to select a recipient's public key to encrypt an outgoing e-mail which it may do this encryption process either after digitally signing or just do the encryption only. This encryption function can also serve you with the multiple encryption if you want to repeatedly encrypt on top the existing encrypted e-mail.
    Decrypting for Opening The Encrypted E-Mail
    To open the encrypted e-mail, recipient has to use its corresponding private key to decrypt it.
    You have to enter the private key's password prior to decrypting the encrypted e-mail. At this step, the system will automatically check its availability and validity of a private key.
    Digital Signature Verification
    1. To open the digitally signed and/or encrypted e-mail, after decrypting, if it's been encrypted, the system will verify each digital signature of each signer. If it has been verified, the system will show you the verified button where you can click it to see the control certificate which will lead you to the verified e-mail message, attachment and a digital certificate of each signer.
    1. The "Control Certificate" of the digitally signed e-mail shows the brief information

    2. the e-mail subject


    3. signer's name, organization name of signer and signing date and time
    1. The recipient can verify the signer's digital signature by clicking through the signer button of each signer, then the system will show you the revocation checking result. If it's valid, the system will show you the verified e-mail message and/or its attachment page where you can click the signer digital certificate button to view the digital certificate of signer.
    2. In digitally signing process, the signed e-mail message will be stamped with date-time of signing, and inserted with the brief digital certificate information of signer which will be used as reference in case of printout.
    1. The system can show the verified e-mail message together with the signer's digital certificate which can be used as the legal reference for confirming its integrity and identity.

    2. The ability of multiple digital signatures function like this, lets us easily to digitally sign an e-mail and/or its attachment by many signers on the same e-mail, regardless the location of signers. It means you can legally and digitally sign any message or e-document even signers live in other countries.
    Protecting The Original Message of Replied E-Mail
    The e-mail replying function of the CryptBot Secure web-Mail™ is unlike other general e-mail system because it will legally protect its original message of sender from being altered while replying by recipient.
    To keep its original message from being altered, the system will separate it from the reply box where recipient cannot edit, insert and/or delete any part of it. Therefore, the system is able to absolutely keep its integrity according to the e-transaction laws.
    Multiple Digital Signature Creating
    In case many signers digitally sign on the same e-mail, after verifying the number of signers and their information will be listed on the control certificate which it can be clicked to get more information of the verified e-mail message and its digital certificate of each signer.
    To see the verified message and signer's digital certificate, just click the signer button of each signer.
    Integrity Verification and Its Digital Certificate
    Here are the examples of verified e-mai messages and signers' digital certicates.
    The verified attachments will be listed on their verified e-mail messages which they can be directly clicked to open with their associated programs.


    Partner Max Savings
       About Us
    | Enquiry | Disclaimer | Contact Us  
    © Copyright 1997- Max Savings Co., Ltd. Designed & Developed by Maxcyber® All rights reserved.   Please read our Privacy Policy