[go: up one dir, main page]

WO2016038188A1 - A more private telecommunication method - Google Patents

A more private telecommunication method Download PDF

Info

Publication number
WO2016038188A1
WO2016038188A1 PCT/EP2015/070825 EP2015070825W WO2016038188A1 WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1 EP 2015070825 W EP2015070825 W EP 2015070825W WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
processing engine
deformed
processing
location
Prior art date
Application number
PCT/EP2015/070825
Other languages
French (fr)
Inventor
Johannes SCHÖNING
Patrick Olivier
Paul Dunphy
Original Assignee
Iminds Vzw
Universiteit Hasselt
Newcastle University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iminds Vzw, Universiteit Hasselt, Newcastle University filed Critical Iminds Vzw
Publication of WO2016038188A1 publication Critical patent/WO2016038188A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/066Format adaptation, e.g. format conversion or compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content

Definitions

  • the invention relate to the field of telecommunication methods, related computer program products, non-transitory machine readable storage medium storing the computer program products, related graphical user interfaces, particular usage of those methods and related (hand-held or mobile) devices.
  • a method for communicating a message from a first location to a second location wherein one first visually deforms the message before transmitting said deformed message to said second location and receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a human user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message exist, in particular for re-inputting the original message as recognized by the human user in the second processing engine, thereby confirming that he or she is not a third processing engines but a human.
  • Exemplary text deforming methods are CAPTCHA (completely automated public Turing test to tell computers and humans apart), which is a technology that most users of the Internet have encountered, whether they are buying concert tickets or signing up for a new email account.
  • CAPTCHA completely automated public Turing test to tell computers and humans apart
  • the purpose of a CAPTCHA is to deter the composition of online programs that are able to make transactions (e.g. send email, buy concert tickets), must faster and more efficiently than humans, as this creates a significant drain on the resources of an service provider and can be unfair to genuine consumers of the service. This means it is beneficial to separate the activities of a real human from those of a human authored computer program.
  • FIG. 4 illustrates a ReCAPTCHA, a popular instantiation of CAPTCHA.
  • ReCAPTCHA a popular instantiation of CAPTCHA.
  • all users of a web page are asked to view an image containing distorted text and mentally segment the characters present, identify those characters, and enter them using the keyboard. The intention is that this process is much easier for a human than a computer.
  • Embodiments of usable and secure CAPTCHAs are found in [Yan, J., Salah El Ahmad, A. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS ⁇ 8]. ACM, New York, NY, USA, 44-52].
  • SOUPS Usable privacy and security
  • SnapChat This service allows users to send pictures or videos, along with the requirement that users choose a time limit for the content to exist (from 1-10 seconds), after which time the content is deleted from the phones of users and the server itself.
  • the aim of the invention is to overcome the problem of capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and hence contribute to providing a more secure or at least more private communication, while ensuring a sort of permanent character of the exchanged data (hence no forced deletion).
  • the invention provides for inputting by a first human user on a first processing engine on said first location the message.
  • the invention may further provide for displaying the deformed message to the first user.
  • the invention may further provide for inputting (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
  • the invention may further provide for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
  • the invention add another or extra layer of protection, via the visual deforming of the message; and thereby tackles the problem of unwanted capturing by a particular class of third parties, especially automated engines.
  • the invention provides for a technically easy solution.
  • the invention can be provided as stand-alone application or can be integrated with other message generating applications or message generating applications can be adapted such that the invented method is used therein.
  • the invention applies text deformation for message exchange, hence for an entirely different application context, more over the invention exploits the notion of a message (useful information between users) to overcome usability issues, known for text deformation used as such on non-information text exchanges.
  • the invention relates to computer implemented methods suitable in the context of instant messaging involving an instant message recipient and an instant message sender having an instant messaging communication session, using respectively a user interface adapted therefore, wherein the message is presented deformed at all times in the particular way described above to enhance the privacy.
  • Figures 1-3 provides examples of messages users might send.
  • Figure 1 shows a simple message with basic distortion
  • Figure 2 shows a simple message with mixed fonts, distortion and a background pattern.
  • Figure 3 shows a more garish design with mixed fonts, and a color clashing background
  • Figure 4 shows one instantiation of a prior-art text deformation system used for an entirely different context, in particular access to information upon recognition of a text not carrying any useful information itself, hence it is not a message between users. It is an example usage of the ReCAPTCHA system, one instantiation of CAPTCHA.
  • Figure 5 provides a schematic representation of the invented method.
  • Figure 6 provides the step (and optional steps) as to be executed in the first processing unit.
  • Figure 7 shows a schematic representation of the graphical user interfaces. Detailed description
  • the invention relates to a method for communicating a human sensible message (a word, a plurality of words, up to entire sentences) from a first location to a second location, the method comprising the steps of: (i) inputting (by a first user) on a first processing engine on said first location the (textual) message; (ii) visually deforming the message by embedding the (textual) message in an image file ; (iii) transmitting said deformed message (said image file) to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message. See the examples of Figure 1 to 3.
  • a user messaging service where textual messages are embedded and distributed in the content of image files.
  • the invention exploits the fact that reliably extracting text from image files where distortion or camouflaging has been applied to the text is difficult.
  • the contribution of the invention is that it re- appropriates the underlying principles of CAPTCHA (see Figure 4, and see related work) for message creation and distribution.
  • the users are able to type a message, choose to add color and/or distortion to particular features of the text, and send the message to their friends embedded in a digital image.
  • the invention places a twist upon a traditional visual CAPTCHA which is an everyday source of frustration for users of the Internet.
  • users do not need to precisely understand and decode every character in the message presented but can use knowledge of friends, slang, or context, to understand the content of the message. This means we can bypass the most problematic usability constraint of CAPTCHA and inherit the most valuable benefit, that it is difficult to algorithmically decipher the text from the image.
  • the invented method and supporting tools are for use by those disillusioned with the scale of privacy infringement on the modern day Internet, but also people who want to send visually creative messages to friends. Due to widespread frustration and amusement users have at the expense of CAPTCHAs in everyday life, users are able to experiment with the text distortion levels to amuse or frustrate their friends.
  • This invention does not provide (or promise) any perfect security. But the security it does provide is based upon the knowledge (even held by novice users) that it is a significant hindrance to any organization to perform large-scale indexing on text embedded into image content.
  • the messages themselves would be encoded into images on the mobile device owned by the user, which means that as the service provider and distributor of the messages, we also do not have access to the textual version of the messages.
  • the invention relates to a method for (wirelessly and/or wired ) communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) (by a first user) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (and optionally displaying (500) the deformed message to the first user) ; (iii) (wirelessly and/or wired) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
  • the method further comprises the step of: inputting (400) (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
  • the invention further relates to a graphical user interface, operable on a first processing engine, suited for the use of the methods described above in particular comprising a means or parameter input module (e.g. a slider) for setting the selected degree of deforming to be performed by the first processing engine; and/or a first display module or means for displaying the deformed message; and/or a second display module or means for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
  • a means or parameter input module e.g. a slider
  • the invention relates to a (hand-held or mobile) device, comprising a processing unit, being adapted for executing the methods described above and/or supporting the graphical user interface described above.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to telecommunication methods, computer program products, non-transitory machine readable storage medium, graphical user interfaces, usage of those methods and devices, in particular for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting on a first processing engine on said first location the message; (ii) visually deforming the message; (iii) transmitting said deformed message to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.

Description

A MORE PRIVATE TELECOMMUNICATION METHOD
Field of invention
The invention relate to the field of telecommunication methods, related computer program products, non-transitory machine readable storage medium storing the computer program products, related graphical user interfaces, particular usage of those methods and related (hand-held or mobile) devices.
Background of the invention
A method for communicating a message from a first location to a second location, wherein one first visually deforms the message before transmitting said deformed message to said second location and receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a human user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message exist, in particular for re-inputting the original message as recognized by the human user in the second processing engine, thereby confirming that he or she is not a third processing engines but a human. Typically this is done as a step to automatically initiate a further action such as further communication e.g. of documents can be performed. Note however in that context the generating of the message on the first location is generated automatically, there is no (human) user on the first location inputting or creating a sensible message for real communication to a second human user nor is there any need on the first location side to display to anyone.
Exemplary text deforming methods (used in entirely different context than the invention) are CAPTCHA (completely automated public Turing test to tell computers and humans apart), which is a technology that most users of the Internet have encountered, whether they are buying concert tickets or signing up for a new email account. The purpose of a CAPTCHA is to deter the composition of online programs that are able to make transactions (e.g. send email, buy concert tickets), must faster and more efficiently than humans, as this creates a significant drain on the resources of an service provider and can be unfair to genuine consumers of the service. This means it is beneficial to separate the activities of a real human from those of a human authored computer program. The basis of most of the CAPTCHAs seen on the World Wide Web today is based upon the difficulty to write a computer program that reliably extracts text from images. Figure 4 illustrates a ReCAPTCHA, a popular instantiation of CAPTCHA. Where it is deployed, all users of a web page are asked to view an image containing distorted text and mentally segment the characters present, identify those characters, and enter them using the keyboard. The intention is that this process is much easier for a human than a computer. Embodiments of usable and secure CAPTCHAs are found in [Yan, J., Salah El Ahmad, A. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS Ό8]. ACM, New York, NY, USA, 44-52]. In summary the process is a significant deterrent for those who seek to author computer programs to emulate human interactions with a website but is known in such context only.
One relevant messaging app that has claimed privacy benefits is SnapChat. This service allows users to send pictures or videos, along with the requirement that users choose a time limit for the content to exist (from 1-10 seconds), after which time the content is deleted from the phones of users and the server itself.
Note that in US2006/0041629 in the context of instant messaging use of event triggered magnifying of a message is disclosed with embodiments providing artistic elaborations thereof. The issue of privacy is not discussed nor do the suggested techniques contribute to a solution for the privacy problem.
Aim of the invention
Contrary to the application of deformed messages as described above, the aim of the invention is to overcome the problem of capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and hence contribute to providing a more secure or at least more private communication, while ensuring a sort of permanent character of the exchanged data (hence no forced deletion).
Summary of the invention
It is the contribution of the invention to recognize the problem posed by capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and propose a solution thereto by substantially adapting the state-of-the art method, devices and the required technical means or modules and also provide suitable graphical user interfaces therefore. More in particular the invention provides for inputting by a first human user on a first processing engine on said first location the message.
The invention may further provide for displaying the deformed message to the first user.
The invention may further provide for inputting (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The invention may further provide for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
While the problem of unwanted capturing by third parties of exchanged messages is typically tackled by encryption (which can be combined with the invention though), the invention add another or extra layer of protection, via the visual deforming of the message; and thereby tackles the problem of unwanted capturing by a particular class of third parties, especially automated engines. Especially in cases where the message is not important enough for use of complicated encryption-decryption techniques while still the communication users prefer some privacy, the invention provides for a technically easy solution. The invention can be provided as stand-alone application or can be integrated with other message generating applications or message generating applications can be adapted such that the invented method is used therein.
In short by appropriately embedding textual messages into image content the aim of the invention is achieved. The invention applies text deformation for message exchange, hence for an entirely different application context, more over the invention exploits the notion of a message (useful information between users) to overcome usability issues, known for text deformation used as such on non-information text exchanges.
Moreover in an embodiment of the invention in parallel with the transmission of the deformed message, information on the identity of the sender is provided, enabling the user at the receiving end to combine that knowledge for recognition of the deformed message.
In summary the invention relates to computer implemented methods suitable in the context of instant messaging involving an instant message recipient and an instant message sender having an instant messaging communication session, using respectively a user interface adapted therefore, wherein the message is presented deformed at all times in the particular way described above to enhance the privacy.
Brief description
Figures 1-3 provides examples of messages users might send.
Figure 1 shows a simple message with basic distortion
Figure 2 shows a simple message with mixed fonts, distortion and a background pattern.
Figure 3 shows a more garish design with mixed fonts, and a color clashing background
Figure 4 shows one instantiation of a prior-art text deformation system used for an entirely different context, in particular access to information upon recognition of a text not carrying any useful information itself, hence it is not a message between users. It is an example usage of the ReCAPTCHA system, one instantiation of CAPTCHA.
Figure 5 provides a schematic representation of the invented method.
Figure 6 provides the step (and optional steps) as to be executed in the first processing unit.
Figure 7 shows a schematic representation of the graphical user interfaces. Detailed description
The invention relates to a method for communicating a human sensible message (a word, a plurality of words, up to entire sentences) from a first location to a second location, the method comprising the steps of: (i) inputting (by a first user) on a first processing engine on said first location the (textual) message; (ii) visually deforming the message by embedding the (textual) message in an image file ; (iii) transmitting said deformed message (said image file) to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message. See the examples of Figure 1 to 3.
In an embodiment of the invention a user messaging service is provided where textual messages are embedded and distributed in the content of image files. The invention exploits the fact that reliably extracting text from image files where distortion or camouflaging has been applied to the text is difficult. The contribution of the invention is that it re- appropriates the underlying principles of CAPTCHA (see Figure 4, and see related work) for message creation and distribution. In an embodiment of the invention the users are able to type a message, choose to add color and/or distortion to particular features of the text, and send the message to their friends embedded in a digital image.
The invention places a twist upon a traditional visual CAPTCHA which is an everyday source of frustration for users of the Internet. In our case, users do not need to precisely understand and decode every character in the message presented but can use knowledge of friends, slang, or context, to understand the content of the message. This means we can bypass the most problematic usability constraint of CAPTCHA and inherit the most valuable benefit, that it is difficult to algorithmically decipher the text from the image.
The invented method and supporting tools are for use by those disillusioned with the scale of privacy infringement on the modern day Internet, but also people who want to send visually creative messages to friends. Due to widespread frustration and amusement users have at the expense of CAPTCHAs in everyday life, users are able to experiment with the text distortion levels to amuse or frustrate their friends.
This invention does not provide (or promise) any perfect security. But the security it does provide is based upon the knowledge (even held by novice users) that it is a significant hindrance to any organization to perform large-scale indexing on text embedded into image content. The messages themselves would be encoded into images on the mobile device owned by the user, which means that as the service provider and distributor of the messages, we also do not have access to the textual version of the messages.
In general terms the invention relates to a method for (wirelessly and/or wired ) communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) (by a first user) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (and optionally displaying (500) the deformed message to the first user) ; (iii) (wirelessly and/or wired) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
In an embodiment of the invention the method further comprises the step of: inputting (400) (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The invention further relates to a graphical user interface, operable on a first processing engine, suited for the use of the methods described above in particular comprising a means or parameter input module (e.g. a slider) for setting the selected degree of deforming to be performed by the first processing engine; and/or a first display module or means for displaying the deformed message; and/or a second display module or means for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
Finally the invention relates to a (hand-held or mobile) device, comprising a processing unit, being adapted for executing the methods described above and/or supporting the graphical user interface described above.

Claims

A method for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (iii) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
The method of claim 1, further comprising the step of: inputting (400) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 1 or 2, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A method, executed on a first processing engine, for processing for and transmitting a processed message from a first location to a second location, the method comprising the steps of: (i) inputting on the first processing engine on said first location the message; (ii) processing the message by visually deforming the message; (iii) transmitting said deformed message to said second location; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on a display by a second user of a second processing engine, receiving the deformed message, while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
The method of claim 4, further comprising the step of: inputting in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 4 or 5, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A computer program product for executing of any methods of claim 4, 5 or 6.
A non-transitory machine readable storage medium storing the computer program products of claim 7.
9. A graphical user interface (1000), operable on a first processing engine, suited for the use of the method of claim 4, 5 or 6, in particular comprising a means for inputting said message (1100), a means (1300) for setting the selected degree of deforming to be performed by the first processing engine; and/or means (1200) for displaying the deformed message; and/or means (1400) for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
10. Use by one or more applications for generating a message, operable on the first processing engine, of any methods of claims 1 to 6 on their generated messages.
11. A device, comprising a processing unit, being adapted for executing the method of claim 4, 5 or 6 and/or supporting the graphical user interface of claim 9.
PCT/EP2015/070825 2014-09-12 2015-09-11 A more private telecommunication method WO2016038188A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP14184554.5 2014-09-12
EP14184554 2014-09-12

Publications (1)

Publication Number Publication Date
WO2016038188A1 true WO2016038188A1 (en) 2016-03-17

Family

ID=51542193

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/070825 WO2016038188A1 (en) 2014-09-12 2015-09-11 A more private telecommunication method

Country Status (1)

Country Link
WO (1) WO2016038188A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198580A1 (en) * 2004-03-05 2005-09-08 Morgan Hua System and method for preventing screen-scrapers from extracting user screen names
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198580A1 (en) * 2004-03-05 2005-09-08 Morgan Hua System and method for preventing screen-scrapers from extracting user screen names
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification

Similar Documents

Publication Publication Date Title
Alkaldi et al. Why do people adopt, or reject, smartphone password managers?
Abu-Salma et al. The security blanket of the chat world: An analytic evaluation and a user study of telegram
US9253131B2 (en) System and method for authentication of communications
CN108989269B (en) Method, device and system for acquiring verification code
US9703982B2 (en) Document distribution and interaction
CN104766001A (en) Detecting and breaking CAPTCHA automation scripts and preventing image scraping
CN103763104B (en) A kind of method and system of dynamic authentication
Hassan et al. Data hiding techniques in Windows OS: a practical approach to investigation and defense
Lerner et al. Analyzing the use of quick response codes in the wild
CN106060078A (en) User information encryption method, user registration method and user validation method applied to cloud platform
TW201131418A (en) CAPTCHA (completely automated public test to tell computers and humans apart) management methods and systems, and computer program products thereof
EP3273377B1 (en) System for dynamic image captcha
CN110445792A (en) Verification code generation method, verifying code verification method and identifying code login system
Hayashi et al. WebTicket: Account management using printable tokens
Cobb Cryptography for dummies
Hamilton et al. Safer digital intimacy for sex workers and beyond: A technical research agenda
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
CN103795547A (en) User data encryption method and device
CN104992087B (en) Mobile terminal innovation creative data information processing method and mobile terminal
US9391774B1 (en) Strauss greenmail system and method
TWI436232B (en) Data processing methods and systems for processing data in an operation having a predetermined flow based on captcha (completely automated public test to tell computers and humans apart) data, and computer program products thereof
WO2016038188A1 (en) A more private telecommunication method
WO2016188079A1 (en) Data storage method for terminal device and terminal device
Daher et al. Posh: A generalized captcha with security applications
Sharma et al. A more private & secure e-mail system using image steganography (EPS) and data mining

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15762989

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 20/06/2017 )

122 Ep: pct application non-entry in european phase

Ref document number: 15762989

Country of ref document: EP

Kind code of ref document: A1