Authenticate Testimonial
Machine translation:

Authentication Protocol for Website Testimonials

This page presents the solution for properly providing website testimonial. It is well structured, free and an all-win scheme:

How to Make Your Website Trusted with Testimonials Protocol

Suppose that an individual or organization which will be attested, lets call them A, has a website offering products and services. Suppose that another individual or organization which will provide the testimony, lets call them T, has used the products/services of A and wishes to testify about them.

Typically T will give A the text of the testimonial and A will simply post it on their website. The visitors to the website of A will see the testimonial but have little reason to trust it.

In order to make the testimonial authenticable T has to make digital signature of the testimonial and provide it also to A. A publishes the testimonial and its signature on their website, as well as a link to the public key of T found on T's website. The visitors to the website of A then can use the signature of the testimonial and the public key to authenticate the testimonial, which can be done automatically with 2 mouse clicks using the Authenticate Testimonial service or manually using Act On File or other capable software. In detail this procedure is as follows:

Create and Provide an Authenticable Testimonial - T (testifying) person actions

  1. T writes the testimonial as a file directly embeddable in a webpage, such as text, html, pdf, image, etc.
  2. T uses their own private signing key to sign the testimonial file using Act On File or other capable software.
  3. T provides the testimonial file and its signature to A, as well as the URLs of the public key and preferred landing page on their website.

Publish an Authenticable Testimonial - A (attested) person actions

  1. A embeds the testimonial file in the testimonials page on their website. The testimonial must be readable and download-able "AS IS".
  2. A places a download link of the signature of the testimonial suitably.
  3. A places a link to the T website landing page, where T has published its public authentication key.
  4. A optionally places an automatic authentication link to enable the visitors to automatically authenticate the testimonial with 2 mouse clicks.

Authenticate Authenticable Testimonial - visitor actions

Automatic Authentication

  1. Visitor clicks on the automatic authentication link.
  2. When transferred to http://www.authenticatetestimonial.com the visitor verifies that the automatically populated controls contain URLs as expected.
  3. Visitor clicks the "Authenticate Testimonial Now" button to authenticate the testimonial.

Manual Authentication

  1. Visitor downloads the embedded testimonial file and its signature from the A website.
  2. Visitor follows the link to the T website and downloads the public authentication key.
  3. Visitor uses Act On File or other capable software to authenticate the testimonial using the downloaded files.

Comments and Conclusion

This simple protocol allows the visitors of the attested website to verify that the posted testimonials are genuine. The testifier does not necessarily need to have a website. It is sufficient for them to have authentic online presence where they can post their public authentication keys, for example: a blog, a Twitter or any other social media account where they could make their public authentication key(s) available for downloading.

Testifying websites receive back links to them. The more prominent the attested website is, the higher PR back link the testifier gets, as well as more traffic coming from the attested website. The protocol is not false testimonials proof. However, usually with not too much browsing the trustworthiness of a testifying website can become apparent, especially if it is a well-established site. For genuine testifying websites new visitors coming from attested websites are especially valued as in fact they are genuinely interested in finding out about the trustworthiness of the testifying website, and thus learn about it, and the services/products it provides.

Note: to generate public-private keys, digitally sign and authenticate files one can use the Act On File al-in-one software suite.
Previous: Add Authenticable Testimonials to Your Website - Introduction
Next: Authenticable Website Testimonials Best Practices
Custom Image Presenter
for Galleries and Museums
for Hotels, Resorts and Cruises
for Parks of any kind
for any business
Act On File
Audio Control
Custom Image Presenter
Photo Window
Vat # Validator
Encryption and Authentication
Safe Online Communication
Make Website Trusted
Learn how to store private keys
Photo Window, an Awesome Gift
My Account
FAQ - Forum
Buy Now
Public Authentication Key
Public Encryption Key
© Copyright 2016 MBBSoftware. All Rights Reserved.

What are public authentication and encryption keys?
Public Authentication Key
Click this link to download our Public Authentication Key. Public Authentication Key is used by the recipients of digitally signed documents, e.g. sent by email or otherwise, to confirm the authenticity and integrity of the documents. Use our Public Authentication Key and Act On File or other capable software to authenticate any digitally signed emails and documents that we may have sent you. Our public authentication key is also used to authenticate the authenticable testimonials which we have given to our suppliers, customers and other partners. The testimonials are usually posted on the testimonial recipients' website(s). Learn more here.
Public Encryption Key
Click this link to download our Public Encryption Key. Public Encryption Key is used to encrypt information, in a way that only the holder of the complement to it Private Key can decrypt it. Use our Public Encryption Key and Act On File or other capable software to send us any private information that you may want us to have. Learn more here.