WO2013174869A1 - Method and system for making electronic messages anonymous - Google Patents

Method and system for making electronic messages anonymous Download PDF

Info

Publication number
WO2013174869A1
WO2013174869A1 PCT/EP2013/060516 EP2013060516W WO2013174869A1 WO 2013174869 A1 WO2013174869 A1 WO 2013174869A1 EP 2013060516 W EP2013060516 W EP 2013060516W WO 2013174869 A1 WO2013174869 A1 WO 2013174869A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
sending
messages
node
network
Prior art date
Application number
PCT/EP2013/060516
Other languages
French (fr)
Inventor
Leif Harald AUKE
Thor Henning HETLAND
Original Assignee
Norsk Tillitsmann Asa
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Norsk Tillitsmann Asa filed Critical Norsk Tillitsmann Asa
Publication of WO2013174869A1 publication Critical patent/WO2013174869A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/06Message adaptation to terminal or network requirements
    • H04L51/066Format adaptation, e.g. format conversion or compression
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Definitions

  • the present invention concerns communication over a network.
  • the invention concerns a method and system for communication over a public or private network for sending a message on the network without revealing specific sender activity and hindering backtracking of the sender.
  • Alerting may make the management of a company aware of incidents and activities that need to be corrected or improved.
  • an incident or activity to be alerted may comprise economic crime, corruption, bribes, illegal purchases, fraud, theft, embezzlement, insider dealing breach of duty of confidentiality, discrimination, Vietnamese,
  • Known methods for alerting such incidents or activities comprise using the old fashioned post box, using e-mail, inform a superior, using a lawyer etc.
  • One aspect of the present invention is to provide an efficient and easy to use method and system for hiding a sender from a receiver when the sender sends a message or data to a known receiver.
  • Another aspect of the present invention is to hide the fact that a sender is sending any message to a receiver, i.e. hide or obfuscate any change in sending activity from a sending node, thus making backtracking of the sender is very hard.
  • the reputation of a company is expected to be improved when an anonymous alerting service according to the present invention is provided for the employees.
  • the invention is not limited to be performed by a specific operating system or on a specific hardware platform.
  • Fig. 1 shows the overall concept for hiding a sender from recipient
  • Fig. 2 shows an example of possible routes for a message from a sender to a receiver
  • Fig. 3 shows the sending process with no backtracking
  • Fig. 4 shows and encrypting content of an end user message
  • Fig. 5 shows raid sending of real messages
  • Fig. 6 shows a 4 level model for securing message delivery.
  • the present invention comprises a method for obfuscating sending of a specific real message on a network.
  • the method comprises the following steps:
  • the invention further comprises a system and a computer program product for obfuscating sending of a specific real message on a network.
  • the present invention concerns a method, a system and computer program product that enables obfuscation of the sending of a specific real message to a recipient without revealing any change in network activity of the node sending the message.
  • a real message means an alerting message with information of unwanted incidents or activities.
  • the invention makes backtracking to the sender of such messages very hard.
  • Fig. 1 shows the overall concept for hiding a sender from a network system.
  • a message or data is sent from a sender node via one or more cooperating nodes comprised in a network, where each node only knows the identity of the previous sending node and the next receiving node in the node trace jumping until the destination node of one or more recipients of messages.
  • the destination is typically a trusted third party recipient of alert messages.
  • the communication can for instance be over a public or private network using TCP/IP or UDP/IP.
  • Fig. 2 shows an example of possible routes for a message sent from a sender to a receiver.
  • a sender sends an end user message to an end user receiver via nodes on a network.
  • the nodes comprise other computers through which the message is routed to the recipient.
  • the message is sent into a mesh of nodes, jumping from node to node, until it reaches a destination receiver.
  • the figure shows part 1 to part x of messages sent via a sending process on a network of nodes.
  • the sending process and the different parts that are different copies of the message sent will be explained below.
  • Data traffic between nodes is peer to peer. This means that the communication is based on lookup in a table of possible routes in a central server used for indexing functions and to bootstrap the entire system of nodes between the sender and receiver. Communication is performed directly between each node that is acting as sender and receiver. Nodes might communicate via some proxy or act as proxy nodes on a package level if needed, but message level communication is peer to peer.
  • a data message When a data message is sent it will jump from a starting node, which is typically a computer where the data message is created by an end user. From here it will be forwarded via other nodes. Each node only knows where a message is sent from, i.e. the sender node, and which node a message is to be sent to.
  • Fig. 3 shows an embodiment of an implementation of the present invention for providing a method for obfuscating sending of a specific message on a network. The obfuscation will make it very hard to backtrack the sender of the message.
  • a real message comprises the content of an alert message intended for a dedicated recipient of such messages.
  • a real message When a real message is sent it will be merged in a merging process with fake messages which are generated from a fake message generator.
  • the purpose of sending fake messages is to generate a constant sending activity with an ongoing stream of data from the computer node of the end user that might send a real alert message. By doing this the network will not detect any change in sending activity when a real message is merged into the stream of fake messages that are sent on the network.
  • the real message will get priority in the ongoing stream, so that the real message is sent first without any delaying peaks.
  • fake and real data will look the same. All messages contain message id, data and metadata whether they are real or fake messages. By examining the content of each mail, fake messages can be ignored at the node of the recipient since fake messages are marked with an internal flag.
  • the purpose of sending fake traffic is to hide the footprint of a real message sent.
  • the stream of fake data can be a constant data stream, or a random variable stream regardless of the presence of real message data mixed into the stream.
  • the fake messages are messages filled with a specific or arbitrary content and that have the same recipient id to the receiving node of the recipient of the real messages. Such fake messages are called real fake messages, and they will be filtered and rejected based on inspection of the presence of said internal flag.
  • Real fake messages are generated by source 2 in fig. 3.
  • the fake messages are messages filled with a specific or arbitrary content but have another recipient id than the receiving node of the recipient of the real messages.
  • the recipient id for such messages can be to a node having the purpose of receiving and rejecting such fake messages.
  • Fake messages are generated by source 3 in fig. 3.
  • the fake messages comprise a mix of said fake messages and real fake messages.
  • the real message travels through the network in a random order. In another embodiment of the invention the real message travel through the network in a semi random order guided by a set of possible routes, defined in said indexed lookup table for the network, for keeping the number of jumps between nodes less than a fixed number.
  • Fig. 4 shows an example of encrypted content of end user messages.
  • An end user message is encrypted at sender node with the public key of the receiver.
  • the real message is decrypted with a private key.
  • FIG. 5 illustrates the concept of raid sending of messages.
  • Several copies of a real message can be sent as sub messages which are set up as raid sending.
  • the receiver of the messages will pick up sub messages as they arrive and rebuild the end user message. Duplicate arrived messages will be discarded.
  • fake messages are generated and sent on the network connected to the sending node.
  • the method of sending fake messages can be set up to automatically start when a computer is turned on. In this way, sending a particular real message will not be seen as a sudden sending activity from that node comprised in a network.
  • Fig. 6 shows an overview of a 4 level model for securing message delivery.
  • Level 0 illustrates peer to peer communication between nodes.
  • Level 1 illustrates the sending of sub messages of an end user message via jumps in a mesh of nodes comprised in the network.
  • Level 2 illustrates the raid level where the same message is sent more than once.
  • Level 3 illustrates the use of public keys for sending an encrypted message. The data flow in each level is independent of each other.
  • the 4 level model ensures that a message will be securely delivered to the intended recipient.
  • the present invention is further defined by a system for obfuscating sending of a specific real message on a network, where the system comprises a sending computer node and a receiving computer node connected to a mesh of network nodes carrying the real message, and where the sending computer node comprises a computer program product for:
  • the messages When the stream of messages arrives at the receiver node, the messages will be interpreted as they arrive. Fake messages will be filtered and discarded and real messages will be rebuilt from one or more sub messages.
  • the receiver node will comprise a list of user public keys used in the communication between the sender and receiver.
  • the keys are read from a local storage and based on the key identity inside the message the end user message will be distributed to the recipients listed on the key specification.
  • the message sent might contain a list of recipient ids to be excluded for delivery in order to avoid if user decide to reduce the default recipient list specified in the key.
  • the present invention is also defined by a computer program product comprising a computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to obfuscate sending of a specific real message on a network, where the computer program product comprises instructions for:
  • the computer running the program can be set up such that the program will start running when the computer is turned on, or when manually started by the end user.

Abstract

Method, system and computer program product for obfuscating sending of a specific real message on a network. The method comprises the steps of generating and sending fake messages from a sender node on the network, and merging and sending the real message with the fake messages, where the real message includes information of the node of a recipient of the message.

Description

Method and system for making electronic messages anonymous
Introduction
The present invention concerns communication over a network. In particular the invention concerns a method and system for communication over a public or private network for sending a message on the network without revealing specific sender activity and hindering backtracking of the sender.
Background
In different companies and under different working conditions there might be a need for anonymous alerting of unwanted incidents or activities. Alerting may make the management of a company aware of incidents and activities that need to be corrected or improved.
Depending on the type of industry an incident or activity to be alerted may comprise economic crime, corruption, bribes, illegal purchases, fraud, theft, embezzlement, insider dealing breach of duty of confidentiality, discrimination, racism,
harassment, unworthy working conditions etc.
Known methods for alerting such incidents or activities comprise using the old fashioned post box, using e-mail, inform a superior, using a lawyer etc.
These solutions are more focused on keeping the content of a message anonymous and not the anonymity of the person alerting. When alerting it is the content of the message that is important, and not the identity of the sender.
It is well known that persons refrain from reporting or alerting an incident if they know that their identity will be known.
One aspect of the present invention is to provide an efficient and easy to use method and system for hiding a sender from a receiver when the sender sends a message or data to a known receiver.
Another aspect of the present invention is to hide the fact that a sender is sending any message to a receiver, i.e. hide or obfuscate any change in sending activity from a sending node, thus making backtracking of the sender is very hard.
When an employee knows that alerting of unwanted incidents is kept anonymous, he or she will be most likely be motivated to send a message describing a specific incident.
The reputation of a company is expected to be improved when an anonymous alerting service according to the present invention is provided for the employees. The invention is not limited to be performed by a specific operating system or on a specific hardware platform.
List of drawings
Further aspects and embodiments of the present invention will become apparent in the light of the following description with reference to the accompanying drawings, in which:
Fig. 1 shows the overall concept for hiding a sender from recipient;
Fig. 2 shows an example of possible routes for a message from a sender to a receiver;
Fig. 3 shows the sending process with no backtracking;
Fig. 4 shows and encrypting content of an end user message;
Fig. 5 shows raid sending of real messages, and
Fig. 6 shows a 4 level model for securing message delivery.
Short description of the invention
The present invention comprises a method for obfuscating sending of a specific real message on a network. The method comprises the following steps:
- generating and sending fake messages from a sender node on the network;
- merging and sending the real message with the fake messages, where the real message include information of the node of the recipient of the message.
The invention further comprises a system and a computer program product for obfuscating sending of a specific real message on a network.
The present invention is defined by the features in the main claims and with additional features defined in the dependent claims.
Detailed description of the invention
The present invention concerns a method, a system and computer program product that enables obfuscation of the sending of a specific real message to a recipient without revealing any change in network activity of the node sending the message. In the setting of this disclosure, a real message means an alerting message with information of unwanted incidents or activities. The invention makes backtracking to the sender of such messages very hard. Fig. 1 shows the overall concept for hiding a sender from a network system. A message or data is sent from a sender node via one or more cooperating nodes comprised in a network, where each node only knows the identity of the previous sending node and the next receiving node in the node trace jumping until the destination node of one or more recipients of messages. The destination is typically a trusted third party recipient of alert messages.
The communication can for instance be over a public or private network using TCP/IP or UDP/IP.
Fig. 2 shows an example of possible routes for a message sent from a sender to a receiver. A sender sends an end user message to an end user receiver via nodes on a network. The nodes comprise other computers through which the message is routed to the recipient. The message is sent into a mesh of nodes, jumping from node to node, until it reaches a destination receiver.
The figure shows part 1 to part x of messages sent via a sending process on a network of nodes. The sending process and the different parts that are different copies of the message sent will be explained below.
Data traffic between nodes is peer to peer. This means that the communication is based on lookup in a table of possible routes in a central server used for indexing functions and to bootstrap the entire system of nodes between the sender and receiver. Communication is performed directly between each node that is acting as sender and receiver. Nodes might communicate via some proxy or act as proxy nodes on a package level if needed, but message level communication is peer to peer.
When a data message is sent it will jump from a starting node, which is typically a computer where the data message is created by an end user. From here it will be forwarded via other nodes. Each node only knows where a message is sent from, i.e. the sender node, and which node a message is to be sent to.
Fig. 3 shows an embodiment of an implementation of the present invention for providing a method for obfuscating sending of a specific message on a network. The obfuscation will make it very hard to backtrack the sender of the message.
The figure shows an end user process where an end user sends a real message (source 1). In the setting of the present invention a real message comprises the content of an alert message intended for a dedicated recipient of such messages.
When a real message is sent it will be merged in a merging process with fake messages which are generated from a fake message generator. The purpose of sending fake messages is to generate a constant sending activity with an ongoing stream of data from the computer node of the end user that might send a real alert message. By doing this the network will not detect any change in sending activity when a real message is merged into the stream of fake messages that are sent on the network. The real message will get priority in the ongoing stream, so that the real message is sent first without any delaying peaks.
At network level, fake and real data will look the same. All messages contain message id, data and metadata whether they are real or fake messages. By examining the content of each mail, fake messages can be ignored at the node of the recipient since fake messages are marked with an internal flag.
The purpose of sending fake traffic is to hide the footprint of a real message sent. The stream of fake data can be a constant data stream, or a random variable stream regardless of the presence of real message data mixed into the stream.
In one embodiment of the invention the fake messages are messages filled with a specific or arbitrary content and that have the same recipient id to the receiving node of the recipient of the real messages. Such fake messages are called real fake messages, and they will be filtered and rejected based on inspection of the presence of said internal flag. Real fake messages are generated by source 2 in fig. 3.
In another embodiment of the invention the fake messages are messages filled with a specific or arbitrary content but have another recipient id than the receiving node of the recipient of the real messages. The recipient id for such messages can be to a node having the purpose of receiving and rejecting such fake messages. Fake messages are generated by source 3 in fig. 3.
In yet another embodiment the fake messages comprise a mix of said fake messages and real fake messages.
In one embodiment of the invention the real message travels through the network in a random order. In another embodiment of the invention the real message travel through the network in a semi random order guided by a set of possible routes, defined in said indexed lookup table for the network, for keeping the number of jumps between nodes less than a fixed number.
For the purpose of securing the content of the real message, the message is encrypted. Fig. 4 shows an example of encrypted content of end user messages. An end user message is encrypted at sender node with the public key of the receiver. When arriving at the node of the recipient the real message is decrypted with a private key.
For securing safe delivery of a real message, it can be sent several times. Fig. 5 illustrates the concept of raid sending of messages. Several copies of a real message can be sent as sub messages which are set up as raid sending. The receiver of the messages will pick up sub messages as they arrive and rebuild the end user message. Duplicate arrived messages will be discarded. Before starting sending of an alert message from a sender node in a network, fake messages are generated and sent on the network connected to the sending node.
The method of sending fake messages can be set up to automatically start when a computer is turned on. In this way, sending a particular real message will not be seen as a sudden sending activity from that node comprised in a network.
Fig. 6 shows an overview of a 4 level model for securing message delivery. Level 0 illustrates peer to peer communication between nodes. Level 1 illustrates the sending of sub messages of an end user message via jumps in a mesh of nodes comprised in the network. Level 2 illustrates the raid level where the same message is sent more than once. Level 3 illustrates the use of public keys for sending an encrypted message. The data flow in each level is independent of each other.
The 4 level model ensures that a message will be securely delivered to the intended recipient.
The present invention is further defined by a system for obfuscating sending of a specific real message on a network, where the system comprises a sending computer node and a receiving computer node connected to a mesh of network nodes carrying the real message, and where the sending computer node comprises a computer program product for:
- generating and sending fake messages from a sender node on the network, and - merging and sending the real message with the fake messages, where the real message include information of the node of a recipient of the message.
When the stream of messages arrives at the receiver node, the messages will be interpreted as they arrive. Fake messages will be filtered and discarded and real messages will be rebuilt from one or more sub messages.
In one embodiment of the invention, the receiver node will comprise a list of user public keys used in the communication between the sender and receiver. The keys are read from a local storage and based on the key identity inside the message the end user message will be distributed to the recipients listed on the key specification.
In one embodiment of the invention, the message sent might contain a list of recipient ids to be excluded for delivery in order to avoid if user decide to reduce the default recipient list specified in the key.
The present invention is also defined by a computer program product comprising a computer useable medium including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to obfuscate sending of a specific real message on a network, where the computer program product comprises instructions for:
- generating and sending fake messages from a sender node on the network, and - merging and sending the real message with the fake messages, where the real message include information of the node of the recipient of the message.
The computer running the program can be set up such that the program will start running when the computer is turned on, or when manually started by the end user.

Claims

1. A computer implemented method for obfuscating sending of a specific real message on a network, where the method comprises the following steps:
- generating and sending configurable fake messages from a sender node on the network, and
- merging and sending the real message with the fake messages, where the real message include information of the node of a recipient of the message.
2. A method according to claim 1 , where the fake messages are empty or filled with an arbitrary content or a mix of these.
3. A method according to claim 1 , where the stream of fake messages is configured to be constant stream.
4. A method according to claim 1 , where the stream of fake messages is configured to be random variable stream.
5. A method according to claim 1 , where the real message travel through the network in a random order.
6. A method according to claim 1 , where the real message travel through the network in a semi random order guided by a set of possible routes for keeping the number of jumps between nodes less than a fixed number.
7. A method according to claim 1 , where the real message is encrypted.
8. A method according to claim 1 , where delivery of the real message is secured by raid sending several identical real messages.
9. A system for obfuscating sending of a specific real message on a network, where the system comprises a sending computer node and a receiving computer node connected to a mesh of network nodes carrying the real message, and where the sending computer node comprises a computer program product for: - generating and sending configurable fake messages from a sender node on the network, and
- merging and sending the real message with the fake messages, where the real message include information of the node of a recipient of the message.
10. A system according to claim 9, where the receiving computer node
comprises a computer program product for filtering and discarding fake messages and rebuilding real messages from one or more sub messages.
1 1. A computer program product comprising a computer useable medium
including a computer readable program, wherein the computer readable program when executed on a computer causes the computer to obfuscate sending of a specific real message on a network, where the computer program product comprises instructions for:
- generating and sending configurable fake messages from a sender node on the network, and
- merging and sending the real message with the fake messages, where the real message include information of the node of the recipient of the message.
PCT/EP2013/060516 2012-05-24 2013-05-22 Method and system for making electronic messages anonymous WO2013174869A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
NO20120611 2012-05-24
NO20120611A NO333683B1 (en) 2012-05-24 2012-05-24 Method and system for making electronic messages anonymous

Publications (1)

Publication Number Publication Date
WO2013174869A1 true WO2013174869A1 (en) 2013-11-28

Family

ID=48536819

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2013/060516 WO2013174869A1 (en) 2012-05-24 2013-05-22 Method and system for making electronic messages anonymous

Country Status (2)

Country Link
NO (1) NO333683B1 (en)
WO (1) WO2013174869A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3844738A4 (en) * 2018-08-28 2022-05-11 BAE SYSTEMS Information and Electronic Systems Integration, Inc. Communication protocol

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090220081A1 (en) * 2008-02-29 2009-09-03 Red Hat, Inc. Mechanism for broadcast stenography of data communications

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090220081A1 (en) * 2008-02-29 2009-09-03 Red Hat, Inc. Mechanism for broadcast stenography of data communications

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
BASEL ALOMAIR ET AL: "Statistical Framework for Source Anonymity in Sensor Networks", GLOBECOM 2010, 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, IEEE, PISCATAWAY, NJ, USA, 6 December 2010 (2010-12-06), pages 1 - 6, XP031846755, ISBN: 978-1-4244-5636-9 *
BIDI YING ET AL: "Concealing of the Sink Location in WSNs by artificially homogenizing traffic intensity", COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2011 IEEE CONFERENCE ON, IEEE, 10 April 2011 (2011-04-10), pages 988 - 993, XP031950058, ISBN: 978-1-4577-0249-5, DOI: 10.1109/INFCOMW.2011.5928957 *
KAMAT P ET AL: "Enhancing Source-Location Privacy in Sensor Network Routing", DISTRIBUTED COMPUTING SYSTEMS, 2005. ICDCS 2005. PROCEEDINGS. 25TH IEEE INTERNATIONAL CONFERENCE ON, COLUMBUS, OH, USA 06-10 JUNE 2005, PISCATAWAY, NJ, USA,IEEE, 6 June 2005 (2005-06-06), pages 599 - 608, XP010808001, ISBN: 978-0-7695-2331-6, DOI: 10.1109/ICDCS.2005.31 *
YI YANG, MIN SHAO, SENCUN ZHU, BHUVAN URGAONKAR, GUOHONG CAO: "Towards Event Source Unobservability with Minimum Network Traffic in Sensor Networks", 2 April 2008 (2008-04-02), pages 1 - 12, XP002711847, Retrieved from the Internet <URL:http://freehaven.net/anonbib/cache/Yang-wisec08.pdf> [retrieved on 20130827] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3844738A4 (en) * 2018-08-28 2022-05-11 BAE SYSTEMS Information and Electronic Systems Integration, Inc. Communication protocol
US11368436B2 (en) 2018-08-28 2022-06-21 Bae Systems Information And Electronic Systems Integration Inc. Communication protocol

Also Published As

Publication number Publication date
NO20120611A1 (en) 2013-08-12
NO333683B1 (en) 2013-08-12

Similar Documents

Publication Publication Date Title
US8751808B2 (en) Method and system for sharing trusted contact information
Greschbach et al. The devil is in the metadata—new privacy challenges in decentralised online social networks
US9215236B2 (en) Secure, policy-based communications security and file sharing across mixed media, mixed-communications modalities and extensible to cloud computing such as SOA
US7958227B2 (en) Attributes of captured objects in a capture system
Leberknight et al. A taxonomy of Internet censorship and anti-censorship
US20080250106A1 (en) Use of Acceptance Methods for Accepting Email and Messages
US20120311703A1 (en) Reputation-based threat protection
US20110276709A1 (en) Locational Tagging in a Capture System
CN103181124A (en) System and method for secure use of messaging systems
Mariconti et al. What's in a Name? Understanding Profile Name Reuse on Twitter
Van Wanrooij et al. Filtering spam from bad neighborhoods
US20090070866A1 (en) Methods and systems for secure email transmissions
CN110049063B (en) Block chain-based phishing data sharing method and system
CN105227570A (en) A kind of safe e-mail system of integrated campaign
Castiglione et al. E-mail-based covert channels for asynchronous message steganography
RU2018123013A (en) METHOD FOR CERTIFICATION OF AN ELECTRONIC MESSAGE CONTAINING A RECOGNIZED ELECTRONIC SIGNATURE BY A COMMUNICATION OPERATOR
CN103685473B (en) Client, proxy server, retrieval method and retrieval system
CN101272594A (en) Method for filtering enciphered contents, filter device and contents consuming device
Osho et al. Frameworks for mitigating identity theft and spamming through bulk messaging
WO2013174869A1 (en) Method and system for making electronic messages anonymous
Kijewski et al. Proactive detection and automated exchange of network security incidents
Khan et al. Introduction to email, web, and message forensics
Paul et al. Exploring decentralization dimensions of social networking services: adversaries and availability
Spear et al. Karmanet: Leveraging trusted social paths to create judicious forwarders
Boussada et al. Privacy preserving in the modern era: A review of the state of the art

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13725609

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13725609

Country of ref document: EP

Kind code of ref document: A1