- Customers using Internet Explorer for Windows® should
always check this security by holding the mouse pointer over
the padlock symbol at the bottom of the screen on secure pages. It will
read "SSL Secured (28 Bit)" (Customers
using other browsers and operating systems should refer to the
instructions they provide.)
Secure Server page will read: https://www.gojijuicetime.com/... in the Address Bar.
double clicking on the padlock symbol in the Status Bar (on
the Secure Server page), you will observe a valid certificate
- GOJI JUICE TIME© offers the same protection
that major banks offer with their Internet Banking services.
we ensure your protection:
your privacy is our priority we make sure that the personal information
you submit to us online remains strictly confidential.
ensure your protection with Secure Sockets Layer (SSL) which scrambles
your data, so that it is unreadable by third parties. It does this
- Server authentication. The web server sends a digital certificate
to your computer so that you can be sure of its identity.
authentication. Your computer in turn authenticates itself to
the server by showing its digital signature.
connection. During the Internet connection, data is encrypted
(i.e. scrambled) so that only your computer and the web server
can understand the contents. This prevents other Internet users
from intercepting the information sent between you and the web
is encryption technology?
is the transformation of text or data into a coded form that is
close to impossible to read without the key to decode the message.
This scrambling of the message is done by using a mathematical formula
making the message appear to be nonsense.
What are common uses for encryption?
Besides e-commerce applications (such as transmission of credit
card numbers, account numbers, and other sensitive information), encryption is also used by the military to guard secrets and pay-per-view
television channels to only grant access to paying customers.
How does encryption work?
In the most basic terms, the sender encodes the message using a
mathematical formula, which scrambles the message, then sends it.
The recipient of the message must then decode the message before
it can be read using a special key.
secure is encryption?
level of security of encryption is measured in terms of key length.
The longer the key, the longer it would take someone without the
correct "decoder" to unscramble the code. This key length
is measured in bits (e.g., 40-bit encryption, the level of encryption
used with many ordinary browsers, as opposed to 128-bit encryption,
the level of encryption required by eBusiness IDs). For a 40-bit
key there exists 240 possible different key combinations. Similarly,
for a 128-bit key (the level used by Comodo) there are 2128
possible different key combinations. According to Netscape, 128-bit
encryption is 309,485,009,821,345,068,724,781,056 times more powerful than 40-bit encryption.