The Problem

Email account takeover is most commonly achieved through phishing attacks or social engineering.
With increasing frequency, fraudsters are generating corporate e-mails purporting to provide wire-transfer or other payment instructions whether within an enterprise, between an enterprise and their bank or between an enterprise and their clients, often waiting patiently to study then mimic the style, format, contents and timing of genuine communications.
Once an account is compromised, access information may be sold-on or the criminal may wait for an opportunity to glean banking or credit card information or even vacation plans that leave a property unprotected.
With increasing frequency, fraudsters are generating corporate e-mails purporting to provide wire-transfer or other payment instructions whether within an enterprise, between an enterprise and their bank or between an enterprise and their clients, often waiting patiently to study then mimic the style, format, contents and timing of genuine communications.
Once an account is compromised, access information may be sold-on or the criminal may wait for an opportunity to glean banking or credit card information or even vacation plans that leave a property unprotected.
How Trusted Mail works
When we share confidential information with a confidante we ideally do so “face to face” but how can that work using the speed and convenience of an e-mail?


Trusted Mail requires a facial-biometric sign-in with proprietary proof of life to create and send a secure e-mail and either the possession of a private key or a facial-biometric sign-in from the authorized recipient to open and decrypt the e-mail.

Mail that requires the recipient to sign-in with facial biometrics can be designated as one-to-one or one-to-many potentially permitting multiple authorized recipients to decrypt the email.
With Trusted Mail the recipient is confident that the communication was generated by a specific sender and has not been tampered with en-route


Optionally, the Trusted Mail certificate can include other material data such as location, time, IP address and device identification for the origination of the communication.
To protect e-mail in transit, Trusted Mail layers proprietary encryption techniques utilizing hashed facial biometrics


Over the symmetric cryptography inherent in the TLS protocol and unlike traditional encryption tools, facial biometrics with proof of life cannot be mislaid, socially engineered, loaned or stolen and thus offer unparalleled convenience and security.

Where desired, public keys for mail recipients can be stored in a Blockchain creating an immutable but readily accessible mechanism for designated authorized recipients whose biometrics can be used to decrypt specific messages.
Contact Us
Pleas enter a Name
Pleas enter a Company name
Pleas enter a valid Email
Pleas enter a Number of employees
back

Your message has been sent.

We will reply as soon as possible.