WO2016038188A1 - A more private telecommunication method - Google Patents

A more private telecommunication method Download PDF

Info

Publication number
WO2016038188A1
WO2016038188A1 PCT/EP2015/070825 EP2015070825W WO2016038188A1 WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1 EP 2015070825 W EP2015070825 W EP 2015070825W WO 2016038188 A1 WO2016038188 A1 WO 2016038188A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
processing engine
processing
deformed
location
Prior art date
Application number
PCT/EP2015/070825
Other languages
French (fr)
Inventor
Johannes SCHÖNING
Patrick Olivier
Paul Dunphy
Original Assignee
Iminds Vzw
Universiteit Hasselt
Newcastle University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to EP14184554.5 priority Critical
Priority to EP14184554 priority
Application filed by Iminds Vzw, Universiteit Hasselt, Newcastle University filed Critical Iminds Vzw
Publication of WO2016038188A1 publication Critical patent/WO2016038188A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
    • H04L51/06Message adaptation based on network or terminal capabilities
    • H04L51/066Message adaptation based on network or terminal capabilities with adaptation of format
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2823Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for conversion or adaptation of application content or format

Abstract

The invention relates to telecommunication methods, computer program products, non-transitory machine readable storage medium, graphical user interfaces, usage of those methods and devices, in particular for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting on a first processing engine on said first location the message; (ii) visually deforming the message; (iii) transmitting said deformed message to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.

Description

A MORE PRIVATE TELECOMMUNICATION METHOD

Field of invention

The invention relate to the field of telecommunication methods, related computer program products, non-transitory machine readable storage medium storing the computer program products, related graphical user interfaces, particular usage of those methods and related (hand-held or mobile) devices.

Background of the invention

A method for communicating a message from a first location to a second location, wherein one first visually deforms the message before transmitting said deformed message to said second location and receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a human user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message exist, in particular for re-inputting the original message as recognized by the human user in the second processing engine, thereby confirming that he or she is not a third processing engines but a human. Typically this is done as a step to automatically initiate a further action such as further communication e.g. of documents can be performed. Note however in that context the generating of the message on the first location is generated automatically, there is no (human) user on the first location inputting or creating a sensible message for real communication to a second human user nor is there any need on the first location side to display to anyone.

Exemplary text deforming methods (used in entirely different context than the invention) are CAPTCHA (completely automated public Turing test to tell computers and humans apart), which is a technology that most users of the Internet have encountered, whether they are buying concert tickets or signing up for a new email account. The purpose of a CAPTCHA is to deter the composition of online programs that are able to make transactions (e.g. send email, buy concert tickets), must faster and more efficiently than humans, as this creates a significant drain on the resources of an service provider and can be unfair to genuine consumers of the service. This means it is beneficial to separate the activities of a real human from those of a human authored computer program. The basis of most of the CAPTCHAs seen on the World Wide Web today is based upon the difficulty to write a computer program that reliably extracts text from images. Figure 4 illustrates a ReCAPTCHA, a popular instantiation of CAPTCHA. Where it is deployed, all users of a web page are asked to view an image containing distorted text and mentally segment the characters present, identify those characters, and enter them using the keyboard. The intention is that this process is much easier for a human than a computer. Embodiments of usable and secure CAPTCHAs are found in [Yan, J., Salah El Ahmad, A. 2008. Usability of CAPTCHAs or usability issues in CAPTCHA design. In Proceedings of the 4th symposium on Usable privacy and security (SOUPS Ό8]. ACM, New York, NY, USA, 44-52]. In summary the process is a significant deterrent for those who seek to author computer programs to emulate human interactions with a website but is known in such context only.

One relevant messaging app that has claimed privacy benefits is SnapChat. This service allows users to send pictures or videos, along with the requirement that users choose a time limit for the content to exist (from 1-10 seconds), after which time the content is deleted from the phones of users and the server itself.

Note that in US2006/0041629 in the context of instant messaging use of event triggered magnifying of a message is disclosed with embodiments providing artistic elaborations thereof. The issue of privacy is not discussed nor do the suggested techniques contribute to a solution for the privacy problem.

Aim of the invention

Contrary to the application of deformed messages as described above, the aim of the invention is to overcome the problem of capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and hence contribute to providing a more secure or at least more private communication, while ensuring a sort of permanent character of the exchanged data (hence no forced deletion).

Summary of the invention

It is the contribution of the invention to recognize the problem posed by capturing of for humans sensible messages for real communication via automated recognition of the message by third processing engines, and propose a solution thereto by substantially adapting the state-of-the art method, devices and the required technical means or modules and also provide suitable graphical user interfaces therefore. More in particular the invention provides for inputting by a first human user on a first processing engine on said first location the message.

The invention may further provide for displaying the deformed message to the first user.

The invention may further provide for inputting (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.

The invention may further provide for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.

While the problem of unwanted capturing by third parties of exchanged messages is typically tackled by encryption (which can be combined with the invention though), the invention add another or extra layer of protection, via the visual deforming of the message; and thereby tackles the problem of unwanted capturing by a particular class of third parties, especially automated engines. Especially in cases where the message is not important enough for use of complicated encryption-decryption techniques while still the communication users prefer some privacy, the invention provides for a technically easy solution. The invention can be provided as stand-alone application or can be integrated with other message generating applications or message generating applications can be adapted such that the invented method is used therein.

In short by appropriately embedding textual messages into image content the aim of the invention is achieved. The invention applies text deformation for message exchange, hence for an entirely different application context, more over the invention exploits the notion of a message (useful information between users) to overcome usability issues, known for text deformation used as such on non-information text exchanges.

Moreover in an embodiment of the invention in parallel with the transmission of the deformed message, information on the identity of the sender is provided, enabling the user at the receiving end to combine that knowledge for recognition of the deformed message.

In summary the invention relates to computer implemented methods suitable in the context of instant messaging involving an instant message recipient and an instant message sender having an instant messaging communication session, using respectively a user interface adapted therefore, wherein the message is presented deformed at all times in the particular way described above to enhance the privacy.

Brief description

Figures 1-3 provides examples of messages users might send.

Figure 1 shows a simple message with basic distortion

Figure 2 shows a simple message with mixed fonts, distortion and a background pattern.

Figure 3 shows a more garish design with mixed fonts, and a color clashing background

Figure 4 shows one instantiation of a prior-art text deformation system used for an entirely different context, in particular access to information upon recognition of a text not carrying any useful information itself, hence it is not a message between users. It is an example usage of the ReCAPTCHA system, one instantiation of CAPTCHA.

Figure 5 provides a schematic representation of the invented method.

Figure 6 provides the step (and optional steps) as to be executed in the first processing unit.

Figure 7 shows a schematic representation of the graphical user interfaces. Detailed description

The invention relates to a method for communicating a human sensible message (a word, a plurality of words, up to entire sentences) from a first location to a second location, the method comprising the steps of: (i) inputting (by a first user) on a first processing engine on said first location the (textual) message; (ii) visually deforming the message by embedding the (textual) message in an image file ; (iii) transmitting said deformed message (said image file) to said second location; (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message. See the examples of Figure 1 to 3.

In an embodiment of the invention a user messaging service is provided where textual messages are embedded and distributed in the content of image files. The invention exploits the fact that reliably extracting text from image files where distortion or camouflaging has been applied to the text is difficult. The contribution of the invention is that it re- appropriates the underlying principles of CAPTCHA (see Figure 4, and see related work) for message creation and distribution. In an embodiment of the invention the users are able to type a message, choose to add color and/or distortion to particular features of the text, and send the message to their friends embedded in a digital image.

The invention places a twist upon a traditional visual CAPTCHA which is an everyday source of frustration for users of the Internet. In our case, users do not need to precisely understand and decode every character in the message presented but can use knowledge of friends, slang, or context, to understand the content of the message. This means we can bypass the most problematic usability constraint of CAPTCHA and inherit the most valuable benefit, that it is difficult to algorithmically decipher the text from the image.

The invented method and supporting tools are for use by those disillusioned with the scale of privacy infringement on the modern day Internet, but also people who want to send visually creative messages to friends. Due to widespread frustration and amusement users have at the expense of CAPTCHAs in everyday life, users are able to experiment with the text distortion levels to amuse or frustrate their friends.

This invention does not provide (or promise) any perfect security. But the security it does provide is based upon the knowledge (even held by novice users) that it is a significant hindrance to any organization to perform large-scale indexing on text embedded into image content. The messages themselves would be encoded into images on the mobile device owned by the user, which means that as the service provider and distributor of the messages, we also do not have access to the textual version of the messages.

In general terms the invention relates to a method for (wirelessly and/or wired ) communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) (by a first user) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (and optionally displaying (500) the deformed message to the first user) ; (iii) (wirelessly and/or wired) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.

In an embodiment of the invention the method further comprises the step of: inputting (400) (by the first user) in the first processing engine the selected degree of deforming to be performed by the first processing engine.

The invention further relates to a graphical user interface, operable on a first processing engine, suited for the use of the methods described above in particular comprising a means or parameter input module (e.g. a slider) for setting the selected degree of deforming to be performed by the first processing engine; and/or a first display module or means for displaying the deformed message; and/or a second display module or means for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.

Finally the invention relates to a (hand-held or mobile) device, comprising a processing unit, being adapted for executing the methods described above and/or supporting the graphical user interface described above.

Claims

A method for communicating a message from a first location to a second location, the method comprising the steps of: (i) inputting (100) on a first processing engine (10) on said first location the message; (ii) visually deforming (200) the message (iii) transmitting (300) said deformed message to said second location (20); (iv) receiving on a second processing engine said deformed message and displaying it; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on the display by a second user of the second processing engine while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines (30) when they would also come in the possession of the deformed message.
The method of claim 1, further comprising the step of: inputting (400) in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 1 or 2, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A method, executed on a first processing engine, for processing for and transmitting a processed message from a first location to a second location, the method comprising the steps of: (i) inputting on the first processing engine on said first location the message; (ii) processing the message by visually deforming the message; (iii) transmitting said deformed message to said second location; whereby the degree of deforming in the first processing engine is selected to still allow recognition of the message on a display by a second user of a second processing engine, receiving the deformed message, while substantially increasing the processing effort to be used for automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
The method of claim 4, further comprising the step of: inputting in the first processing engine the selected degree of deforming to be performed by the first processing engine.
The method of claim 4 or 5, further comprising the step of: displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
A computer program product for executing of any methods of claim 4, 5 or 6.
A non-transitory machine readable storage medium storing the computer program products of claim 7.
9. A graphical user interface (1000), operable on a first processing engine, suited for the use of the method of claim 4, 5 or 6, in particular comprising a means for inputting said message (1100), a means (1300) for setting the selected degree of deforming to be performed by the first processing engine; and/or means (1200) for displaying the deformed message; and/or means (1400) for displaying to the first user a number indicative for the difficulty of automated recognition of the message by third processing engines when they would also come in the possession of the deformed message.
10. Use by one or more applications for generating a message, operable on the first processing engine, of any methods of claims 1 to 6 on their generated messages.
11. A device, comprising a processing unit, being adapted for executing the method of claim 4, 5 or 6 and/or supporting the graphical user interface of claim 9.
PCT/EP2015/070825 2014-09-12 2015-09-11 A more private telecommunication method WO2016038188A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP14184554.5 2014-09-12
EP14184554 2014-09-12

Publications (1)

Publication Number Publication Date
WO2016038188A1 true WO2016038188A1 (en) 2016-03-17

Family

ID=51542193

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2015/070825 WO2016038188A1 (en) 2014-09-12 2015-09-11 A more private telecommunication method

Country Status (1)

Country Link
WO (1) WO2016038188A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198580A1 (en) * 2004-03-05 2005-09-08 Morgan Hua System and method for preventing screen-scrapers from extracting user screen names
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050198580A1 (en) * 2004-03-05 2005-09-08 Morgan Hua System and method for preventing screen-scrapers from extracting user screen names
US20070143624A1 (en) * 2005-12-15 2007-06-21 Microsoft Corporation Client-side captcha ceremony for user verification

Similar Documents

Publication Publication Date Title
Chin et al. Measuring user confidence in smartphone security and privacy
Feng et al. Private key generation from on-line handwritten signatures
Macnamara The 21st century media (r) evolution: Emergent communication practices
Parsons et al. Fundamentos de administración financiera
JP6100773B2 (en) Identification and verification of online signature in the community
US20120323700A1 (en) Image-based captcha system
US20080047017A1 (en) System and method for dynamically assessing security risks attributed to a computer user's behavior
US20110055585A1 (en) Methods and Systems to Create Big Memorizable Secrets and Their Applications in Information Engineering
CA2757290A1 (en) Systems and methods for implementing and tracking identification tests
CN103297413A (en) Sharable online file secure safe
CN101663672A (en) Methods and systems for graphical image authentication
US20130145441A1 (en) Captcha authentication processes and systems using visual object identification
Ur et al. Do Users' Perceptions of Password Security Match Reality?
JP2010067096A (en) Authentication device, authentication method, information processing program, and recording medium
US9781580B2 (en) Method of sending messages to devices not configured to receive them
Bertocci et al. Understanding windows cardspace: an introduction to the concepts and challenges of digital identities
Sreelatha et al. Authentication schemes for session passwords using color and images
Fahl et al. Helping Johnny 2.0 to encrypt his Facebook conversations
US20120260108A1 (en) Font encryption and decryption system and method
CN101534195A (en) Authentication method, authentication device, and recording medium
Eljetlawi et al. Graphical password: Comprehensive study of the usability features of the recognition base graphical password methods
US20080168546A1 (en) Randomized images collection method enabling a user means for entering data from an insecure client-computing device to a server-computing device
US8666065B2 (en) Real-time data encryption
US20110225638A1 (en) Secure randomized input
CN102257466A (en) Image-based human interactive proofs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15762989

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC ( EPO FORM 1205A DATED 20/06/2017 )

122 Ep: pct application non-entry in european phase

Ref document number: 15762989

Country of ref document: EP

Kind code of ref document: A1