WO2016038188A1 - A more private telecommunication method - Google Patents
A more private telecommunication method Download PDFInfo
- Publication number
- WO2016038188A1 WO2016038188A1 PCT/EP2015/070825 EP2015070825W WO2016038188A1 WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1 EP 2015070825 W EP2015070825 W EP 2015070825W WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- message
- processing engine
- deformed
- processing
- location
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/06—Message adaptation to terminal or network requirements
- H04L51/066—Format adaptation, e.g. format conversion or compression
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/565—Conversion or adaptation of application format or content
Definitions
- the invention relate to the field of telecommunication methods, related computer program products, non-transitory machine readable storage medium storing the computer program products, related graphical user interfaces, particular usage of those methods and related (hand-held or mobile) devices.
- a method for communicating a message from a first location to a second location wherein one first visually deforms the message before transmitting said deformed message to said second location and receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a human user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message exist, in particular for re-inputting the original message as recognized by the human user in the second processing engine, thereby confirming that he or she is not a third processing engines but a human.
- Exemplary text deforming methods are CAPTCHA (completely automated public Turing test to tell computers and humans apart), which is a technology that most users of the Internet have encountered, whether they are buying concert tickets or signing up for a new email account.
- CAPTCHA completely automated public Turing test to tell computers and humans apart
- the purpose of a CAPTCHA is to deter the composition of online programs that are able to make transactions (e.g. send email, buy concert tickets), must faster and more efficiently than humans, as this creates a significant drain on the resources of an service provider and can be unfair to genuine consumers of the service. This means it is beneficial to separate the activities of a real human from those of a human authored computer program.
- FIG. 4 illustrates a ReCAPTCHA, a popular instantiation of CAPTCHA.
- ReCAPTCHA a popular instantiation of CAPTCHA.
- all users of a web page are asked to view an image containing distorted text and mentally segment the characters present, identify those characters, and enter them using the keyboard. The intention is that this process is much easier for a human than a computer.
- Embodiments of usable and secure CAPTCHAs are found in [Yan, J., Salah El Ahmad, A. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS ⁇ 8]. ACM, New York, NY, USA, 44-52].
- SOUPS Usable privacy and security
- SnapChat This service allows users to send pictures or videos, along with the requirement that users choose a time limit for the content to exist (from 1-10 seconds), after which time the content is deleted from the phones of users and the server itself.
- the aim of the invention is to overcome the problem of capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and hence contribute to providing a more secure or at least more private communication, while ensuring a sort of permanent character of the exchanged data (hence no forced deletion).
- the invention provides for inputting by a first human user on a first processing engine on said first location the message.
- the invention may further provide for displaying the deformed message to the first user.
- the invention may further provide for inputting (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
- the invention may further provide for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
- the invention add another or extra layer of protection, via the visual deforming of the message; and thereby tackles the problem of unwanted capturing by a particular class of third parties, especially automated engines.
- the invention provides for a technically easy solution.
- the invention can be provided as stand-alone application or can be integrated with other message generating applications or message generating applications can be adapted such that the invented method is used therein.
- the invention applies text deformation for message exchange, hence for an entirely different application context, more over the invention exploits the notion of a message (useful information between users) to overcome usability issues, known for text deformation used as such on non-information text exchanges.
- the invention relates to computer implemented methods suitable in the context of instant messaging involving an instant message recipient and an instant message sender having an instant messaging communication session, using respectively a user interface adapted therefore, wherein the message is presented deformed at all times in the particular way described above to enhance the privacy.
- Figures 1-3 provides examples of messages users might send.
- Figure 1 shows a simple message with basic distortion
- Figure 2 shows a simple message with mixed fonts, distortion and a background pattern.
- Figure 3 shows a more garish design with mixed fonts, and a color clashing background
- Figure 4 shows one instantiation of a prior-art text deformation system used for an entirely different context, in particular access to information upon recognition of a text not carrying any useful information itself, hence it is not a message between users. It is an example usage of the ReCAPTCHA system, one instantiation of CAPTCHA.
- Figure 5 provides a schematic representation of the invented method.
- Figure 6 provides the step (and optional steps) as to be executed in the first processing unit.
- Figure 7 shows a schematic representation of the graphical user interfaces. Detailed description
- the invention relates to a method for communicating a human sensible message (a word, a plurality of words, up to entire sentences) from a first location to a second location, the method comprising the steps of: (i) inputting (by a first user) on a first processing engine on said first location the (textual) message; (ii) visually deforming the message by embedding the (textual) message in an image file ; (iii) transmitting said deformed message (said image file) to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message. See the examples of Figure 1 to 3.
- a user messaging service where textual messages are embedded and distributed in the content of image files.
- the invention exploits the fact that reliably extracting text from image files where distortion or camouflaging has been applied to the text is difficult.
- the contribution of the invention is that it re- appropriates the underlying principles of CAPTCHA (see Figure 4, and see related work) for message creation and distribution.
- the users are able to type a message, choose to add color and/or distortion to particular features of the text, and send the message to their friends embedded in a digital image.
- the invention places a twist upon a traditional visual CAPTCHA which is an everyday source of frustration for users of the Internet.
- users do not need to precisely understand and decode every character in the message presented but can use knowledge of friends, slang, or context, to understand the content of the message. This means we can bypass the most problematic usability constraint of CAPTCHA and inherit the most valuable benefit, that it is difficult to algorithmically decipher the text from the image.
- the invented method and supporting tools are for use by those disillusioned with the scale of privacy infringement on the modern day Internet, but also people who want to send visually creative messages to friends. Due to widespread frustration and amusement users have at the expense of CAPTCHAs in everyday life, users are able to experiment with the text distortion levels to amuse or frustrate their friends.
- This invention does not provide (or promise) any perfect security. But the security it does provide is based upon the knowledge (even held by novice users) that it is a significant hindrance to any organization to perform large-scale indexing on text embedded into image content.
- the messages themselves would be encoded into images on the mobile device owned by the user, which means that as the service provider and distributor of the messages, we also do not have access to the textual version of the messages.
- the invention relates to a method for (wirelessly and/or wired ) communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) (by a first user) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (and optionally displaying (500) the deformed message to the first user) ; (iii) (wirelessly and/or wired) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
- the method further comprises the step of: inputting (400) (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
- the invention further relates to a graphical user interface, operable on a first processing engine, suited for the use of the methods described above in particular comprising a means or parameter input module (e.g. a slider) for setting the selected degree of deforming to be performed by the first processing engine; and/or a first display module or means for displaying the deformed message; and/or a second display module or means for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
- a means or parameter input module e.g. a slider
- the invention relates to a (hand-held or mobile) device, comprising a processing unit, being adapted for executing the methods described above and/or supporting the graphical user interface described above.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention relates to telecommunication methods, computer program products, non-transitory machine readable storage medium, graphical user interfaces, usage of those methods and devices, in particular for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting on a first processing engine on said first location the message; (ii) visually deforming the message; (iii) transmitting said deformed message to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
Description
A MORE PRIVATE TELECOMMUNICATION METHOD
Field of invention
The invention relate to the field of telecommunication methods, related computer program products, non-transitory machine readable storage medium storing the computer program products, related graphical user interfaces, particular usage of those methods and related (hand-held or mobile) devices.
Background of the invention
A method for communicating a message from a first location to a second location, wherein one first visually deforms the message before transmitting said deformed message to said second location and receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a human user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message exist, in particular for re-inputting the original message as recognized by the human user in the second processing engine, thereby confirming that he or she is not a third processing engines but a human. Typically this is done as a step to automatically initiate a further action such as further communication e.g. of documents can be performed. Note however in that context the generating of the message on the first location is generated automatically, there is no (human) user on the first location inputting or creating a sensible message for real communication to a second human user nor is there any need on the first location side to display to anyone.
Exemplary text deforming methods (used in entirely different context than the invention) are CAPTCHA (completely automated public Turing test to tell computers and humans apart), which is a technology that most users of the Internet have encountered, whether they are buying concert tickets or signing up for a new email account. The purpose of a CAPTCHA is to deter the composition of online programs that are able to make transactions (e.g. send email, buy concert tickets), must faster and more efficiently than humans, as this creates a significant drain on the resources of an service provider and can be unfair to genuine consumers of the service. This means it is beneficial to separate the activities of a real human from those of a human authored computer program. The basis of most of the CAPTCHAs seen on the World Wide Web today is based upon the difficulty to write a computer program that reliably extracts text from images. Figure 4 illustrates a ReCAPTCHA, a popular instantiation of CAPTCHA. Where it is
deployed, all users of a web page are asked to view an image containing distorted text and mentally segment the characters present, identify those characters, and enter them using the keyboard. The intention is that this process is much easier for a human than a computer. Embodiments of usable and secure CAPTCHAs are found in [Yan, J., Salah El Ahmad, A. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS Ό8]. ACM, New York, NY, USA, 44-52]. In summary the process is a significant deterrent for those who seek to author computer programs to emulate human interactions with a website but is known in such context only.
One relevant messaging app that has claimed privacy benefits is SnapChat. This service allows users to send pictures or videos, along with the requirement that users choose a time limit for the content to exist (from 1-10 seconds), after which time the content is deleted from the phones of users and the server itself.
Note that in US2006/0041629 in the context of instant messaging use of event triggered magnifying of a message is disclosed with embodiments providing artistic elaborations thereof. The issue of privacy is not discussed nor do the suggested techniques contribute to a solution for the privacy problem.
Aim of the invention
Contrary to the application of deformed messages as described above, the aim of the invention is to overcome the problem of capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and hence contribute to providing a more secure or at least more private communication, while ensuring a sort of permanent character of the exchanged data (hence no forced deletion).
Summary of the invention
It is the contribution of the invention to recognize the problem posed by capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and propose a solution thereto by substantially adapting the state-of-the art method, devices and the required technical means or modules and also provide suitable graphical user interfaces therefore.
More in particular the invention provides for inputting by a first human user on a first processing engine on said first location the message.
The invention may further provide for displaying the deformed message to the first user.
The invention may further provide for inputting (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The invention may further provide for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
While the problem of unwanted capturing by third parties of exchanged messages is typically tackled by encryption (which can be combined with the invention though), the invention add another or extra layer of protection, via the visual deforming of the message; and thereby tackles the problem of unwanted capturing by a particular class of third parties, especially automated engines. Especially in cases where the message is not important enough for use of complicated encryption-decryption techniques while still the communication users prefer some privacy, the invention provides for a technically easy solution. The invention can be provided as stand-alone application or can be integrated with other message generating applications or message generating applications can be adapted such that the invented method is used therein.
In short by appropriately embedding textual messages into image content the aim of the invention is achieved. The invention applies text deformation for message exchange, hence for an entirely different application context, more over the invention exploits the notion of a message (useful information between users) to overcome usability issues, known for text deformation used as such on non-information text exchanges.
Moreover in an embodiment of the invention in parallel with the transmission of the deformed message, information on the identity of the sender is provided, enabling the user at the receiving end to combine that knowledge for recognition of the deformed message.
In summary the invention relates to computer implemented methods suitable in the context of instant messaging involving an instant message recipient and an instant message sender having an instant messaging communication session, using respectively a user interface adapted therefore, wherein the
message is presented deformed at all times in the particular way described above to enhance the privacy.
Brief description
Figures 1-3 provides examples of messages users might send.
Figure 1 shows a simple message with basic distortion
Figure 2 shows a simple message with mixed fonts, distortion and a background pattern.
Figure 3 shows a more garish design with mixed fonts, and a color clashing background
Figure 4 shows one instantiation of a prior-art text deformation system used for an entirely different context, in particular access to information upon recognition of a text not carrying any useful information itself, hence it is not a message between users. It is an example usage of the ReCAPTCHA system, one instantiation of CAPTCHA.
Figure 5 provides a schematic representation of the invented method.
Figure 6 provides the step (and optional steps) as to be executed in the first processing unit.
Figure 7 shows a schematic representation of the graphical user interfaces. Detailed description
The invention relates to a method for communicating a human sensible message (a word, a plurality of words, up to entire sentences) from a first location to a second location, the method comprising the steps of: (i) inputting (by a first user) on a first processing engine on said first location the (textual) message; (ii) visually deforming the message by embedding the (textual) message in an image file ; (iii) transmitting said deformed message (said image file) to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message. See the examples of Figure 1 to 3.
In an embodiment of the invention a user messaging service is provided where textual messages are embedded and distributed in the content of image files.
The invention exploits the fact that reliably extracting text from image files where distortion or camouflaging has been applied to the text is difficult. The contribution of the invention is that it re- appropriates the underlying principles of CAPTCHA (see Figure 4, and see related work) for message creation and distribution. In an embodiment of the invention the users are able to type a message, choose to add color and/or distortion to particular features of the text, and send the message to their friends embedded in a digital image.
The invention places a twist upon a traditional visual CAPTCHA which is an everyday source of frustration for users of the Internet. In our case, users do not need to precisely understand and decode every character in the message presented but can use knowledge of friends, slang, or context, to understand the content of the message. This means we can bypass the most problematic usability constraint of CAPTCHA and inherit the most valuable benefit, that it is difficult to algorithmically decipher the text from the image.
The invented method and supporting tools are for use by those disillusioned with the scale of privacy infringement on the modern day Internet, but also people who want to send visually creative messages to friends. Due to widespread frustration and amusement users have at the expense of CAPTCHAs in everyday life, users are able to experiment with the text distortion levels to amuse or frustrate their friends.
This invention does not provide (or promise) any perfect security. But the security it does provide is based upon the knowledge (even held by novice users) that it is a significant hindrance to any organization to perform large-scale indexing on text embedded into image content. The messages themselves would be encoded into images on the mobile device owned by the user, which means that as the service provider and distributor of the messages, we also do not have access to the textual version of the messages.
In general terms the invention relates to a method for (wirelessly and/or wired ) communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) (by a first user) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (and optionally displaying (500) the deformed message to the first user) ; (iii) (wirelessly and/or wired) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree
of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
In an embodiment of the invention the method further comprises the step of: inputting (400) (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The invention further relates to a graphical user interface, operable on a first processing engine, suited for the use of the methods described above in particular comprising a means or parameter input module (e.g. a slider) for setting the selected degree of deforming to be performed by the first processing engine; and/or a first display module or means for displaying the deformed message; and/or a second display module or means for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
Finally the invention relates to a (hand-held or mobile) device, comprising a processing unit, being adapted for executing the methods described above and/or supporting the graphical user interface described above.
Claims
A method for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (iii) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
The method of claim 1, further comprising the step of: inputting (400) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 1 or 2, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A method, executed on a first processing engine, for processing for and transmitting a processed message from a first location to a second location, the method comprising the steps of: (i) inputting on the first processing engine on said first location the message; (ii) processing the message by visually deforming the message; (iii) transmitting said deformed message to said second location; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on a display by a second user of a second processing engine, receiving the deformed message, while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
The method of claim 4, further comprising the step of: inputting in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 4 or 5, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A computer program product for executing of any methods of claim 4, 5 or 6.
A non-transitory machine readable storage medium storing the computer program products of claim 7.
9. A graphical user interface (1000), operable on a first processing engine, suited for the use of the method of claim 4, 5 or 6, in particular comprising a means for inputting said message (1100), a means (1300) for setting the selected degree of deforming to be performed by the first processing engine; and/or means (1200) for displaying the deformed message; and/or means (1400) for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
10. Use by one or more applications for generating a message, operable on the first processing engine, of any methods of claims 1 to 6 on their generated messages.
11. A device, comprising a processing unit, being adapted for executing the method of claim 4, 5 or 6 and/or supporting the graphical user interface of claim 9.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP14184554.5 | 2014-09-12 | ||
| EP14184554 | 2014-09-12 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016038188A1 true WO2016038188A1 (en) | 2016-03-17 |
Family
ID=51542193
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2015/070825 WO2016038188A1 (en) | 2014-09-12 | 2015-09-11 | A more private telecommunication method |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2016038188A1 (en) |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050198580A1 (en) * | 2004-03-05 | 2005-09-08 | Morgan Hua | System and method for preventing screen-scrapers from extracting user screen names |
| US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
-
2015
- 2015-09-11 WO PCT/EP2015/070825 patent/WO2016038188A1/en active Application Filing
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050198580A1 (en) * | 2004-03-05 | 2005-09-08 | Morgan Hua | System and method for preventing screen-scrapers from extracting user screen names |
| US20070143624A1 (en) * | 2005-12-15 | 2007-06-21 | Microsoft Corporation | Client-side captcha ceremony for user verification |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Alkaldi et al. | Why do people adopt, or reject, smartphone password managers? | |
| Abu-Salma et al. | The security blanket of the chat world: An analytic evaluation and a user study of telegram | |
| US9253131B2 (en) | System and method for authentication of communications | |
| CN108989269B (en) | Method, device and system for acquiring verification code | |
| US9703982B2 (en) | Document distribution and interaction | |
| CN104766001A (en) | Detecting and breaking CAPTCHA automation scripts and preventing image scraping | |
| CN103763104B (en) | A kind of method and system of dynamic authentication | |
| Hassan et al. | Data hiding techniques in Windows OS: a practical approach to investigation and defense | |
| Lerner et al. | Analyzing the use of quick response codes in the wild | |
| CN106060078A (en) | User information encryption method, user registration method and user validation method applied to cloud platform | |
| TW201131418A (en) | CAPTCHA (completely automated public test to tell computers and humans apart) management methods and systems, and computer program products thereof | |
| EP3273377B1 (en) | System for dynamic image captcha | |
| CN110445792A (en) | Verification code generation method, verifying code verification method and identifying code login system | |
| Hayashi et al. | WebTicket: Account management using printable tokens | |
| Cobb | Cryptography for dummies | |
| Hamilton et al. | Safer digital intimacy for sex workers and beyond: A technical research agenda | |
| CN114598671B (en) | Session message processing method, device, storage medium and electronic equipment | |
| CN103795547A (en) | User data encryption method and device | |
| CN104992087B (en) | Mobile terminal innovation creative data information processing method and mobile terminal | |
| US9391774B1 (en) | Strauss greenmail system and method | |
| TWI436232B (en) | Data processing methods and systems for processing data in an operation having a predetermined flow based on captcha (completely automated public test to tell computers and humans apart) data, and computer program products thereof | |
| WO2016038188A1 (en) | A more private telecommunication method | |
| WO2016188079A1 (en) | Data storage method for terminal device and terminal device | |
| Daher et al. | Posh: A generalized captcha with security applications | |
| Sharma et al. | A more private & secure e-mail system using image steganography (EPS) and data mining |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15762989 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 20/06/2017 ) |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 15762989 Country of ref document: EP Kind code of ref document: A1 |