WO2010135263A2 - System and method for creating and unlocking coded messages - Google Patents

System and method for creating and unlocking coded messages Download PDF

Info

Publication number
WO2010135263A2
WO2010135263A2 PCT/US2010/035160 US2010035160W WO2010135263A2 WO 2010135263 A2 WO2010135263 A2 WO 2010135263A2 US 2010035160 W US2010035160 W US 2010035160W WO 2010135263 A2 WO2010135263 A2 WO 2010135263A2
Authority
WO
WIPO (PCT)
Prior art keywords
message
themed
file
coded
trigger
Prior art date
Application number
PCT/US2010/035160
Other languages
French (fr)
Other versions
WO2010135263A3 (en
Inventor
Daniel E. Cohen
John Barry Mcmahon
Original Assignee
Deeper Arts, Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Deeper Arts, Inc. filed Critical Deeper Arts, Inc.
Publication of WO2010135263A2 publication Critical patent/WO2010135263A2/en
Publication of WO2010135263A3 publication Critical patent/WO2010135263A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box

Definitions

  • Photo editors allow users to create a variety of digital images. For example, users may add photo effects, custom text or speech bubbles, and pictures to existing digital images to create new digital images.
  • Photo editors may also include tools that allow users to share digital images. For example, users may utilize photo editors to send e-cards which include digital images. Users may also utilize photo editors to embed a digital image in a website, or to share a link that allows others to access a digital image.
  • photo editing tools do not allow users to send or receive coded messages in a manner that constitutes a secondary means of communication.
  • the present invention is directed to a method of creating a file complex including a coded message.
  • a "coded message,” as used herein, is an embedded or encrypted message.
  • An embedded or encrypted message may include text, images, audio content, video content, or a combination thereof.
  • the method involves selecting an image file and adding a message to the image file. The message is then either encrypted or embedded in the image file, and a themed trigger which the recipient may use to decode the message is selected.
  • a “trigger,” as used herein, is a visual representation of a key used for decoding a message.
  • a "themed trigger” is a trigger having a theme which may correspond with the theme of the message, or with the theme of the image file to which the message was added.
  • a method of creating a file complex including a coded message may include adding a message to an image file to create a modified image file, and encoding the message of the modified image file to create a coded modified image file containing the coded message.
  • the encoding of the message may involve encrypting the message, if the coded message is to be an encrypted message, or embedding the message, if the coded message is to be an embedded message.
  • the method further includes receiving a request from a user to allow the selection of a themed trigger to decode the coded message, creating an information file including information regarding the themed trigger, and associating the information file with the coded modified image file to create the file complex.
  • the present invention is also directed to a method of unlocking a coded message. If the coded message is encrypted, the message is unlocked, or decoded, by decrypting the coded message. If the coded message is embedded, the message is unlocked, or decoded, by rendering the message perceptible to the user. An embedded message in text, graphical, or video form is rendered perceptible to the user by causing the message to be visible, while an embedded message in audio form is rendered perceptible to the user by causing the message to be audible. An embedded video message including audio content is rendered perceptible to the user by causing the embedded message to be both visible and audible. In a method of the present invention, the coded message is unlocked by selecting a themed trigger.
  • the themed trigger is a themed decryption trigger.
  • the themed trigger will unlock the message if it is the same themed trigger that was selected when the file including the coded message was created.
  • the theme of the themed trigger may correspond with the theme of the coded message.
  • the theme of the themed trigger may also correspond which the theme of an image file to which the coded message was added.
  • a method of creating a decoded message, or unlocking a coded message may include displaying a modified image including a coded message, and displaying a plurality of themed triggers.
  • a "modified image,” as used herein, is the image of an image file to which a coded message was added.
  • the method further includes decoding the coded message, upon selection of at least one of the plurality of themed triggers by a user, to create the decoded message. If the coded message is encrypted, decoding the message involves decrypting the coded message. If the coded message is embedded, decoding the message involves revealing the coded message such that it is perceptible to a user.
  • the methods of the present invention may be performed by execution of computer readable program code by at least one processor of at least one computer system.
  • the present invention is also directed to a computer-readable medium whose contents include instructions that, when executed, enable a computer system to perform a method of the present invention.
  • the present invention is further directed to a system including computer readable program code, which may be executed by at least one processor of at least one computer system, to carry out the steps of a method of the present invention.
  • the system may also include a user interface.
  • the present invention is also directed to a system for creating a file complex including a coded message.
  • This system includes a plurality of themed triggers.
  • the system also includes a file complex creation component that is configured, when executed by a processor, to add a message to an image file, to encode the message to create a coded modified image file including the coded message, to receive a request from a user to allow the selection of at least one themed trigger of the plurality of themed triggers to decode the coded message, and to create a file complex by associating an information file with the coded modified image file.
  • the information file is a file including information regarding the themed trigger or triggers which are able to decode the coded message.
  • the file complex creation component may include computer readable program code, which may be executed by at least one processor of at least one computer system.
  • a purpose of this invention is to incorporate text and/or audio messaging, in coded or un-coded formats, into picture and photo editing to create a more diverse, interesting, and interesting medium of communication.
  • Use of this form of communication is intended for fun, playful interaction, and for personal development.
  • This form of communication can also be used by psychologists, therapists, and counselors to understand a client's communication style and to uncover underlying thoughts and feelings.
  • text and/or audio messaging is incorporated in a coded format, this form of communication can also be used to enhance the security of transmitted messages.
  • FIG. 1 is a flowchart of a method of creating a message in accordance with the present invention.
  • FIG. 2 is a flowchart of a method of receiving a message in accordance with the present invention.
  • the present invention is directed to a method of creating a file, such as an image file, including a coded message.
  • the present invention is also directed to a method of unlocking a coded message.
  • the present invention is further directed to a system for creating and/or unlocking a coded message using a website.
  • the present invention is also directed to software that may be used to create and/or unlock a coded message.
  • the process of the present invention can be accomplished by a user on a computing device, such as a personal computer or a portable device.
  • a computing device such as a personal computer or a portable device.
  • Phones, smartphones, and personal digital assistants (PDA's) are examples of portable devices that may be used.
  • Users may perform the steps of the process on a computing device while accessing a website in accordance with the present invention. Users may also perform the steps of the process on a computing device without accessing a website, using an application packaged as a stand-alone software executable file.
  • the user selects an image file (typically a jpeg) from a bank of images stored on a server or some other storage medium. Users can also upload their own images that they have created, including photographs, drawings, or other artwork.
  • the image files which store the images are typically jpeg files, but can be other file types such as, but not limited to, tiff, gif, and pdf files.
  • the image files may be associated, linked, or bundled with other file types, including audio and/or video files.
  • a message on the image, or above or below the image, and/or attach a selected or user- created audio or video message to accompany the image.
  • a message in accordance with the present invention may include text, graphics, audio content, and/or video content.
  • a user sending the message may send the message accompanying the image as a coded message.
  • a coded message may be either an encrypted message or an embedded message. Therefore, a user may choose whether to encrypt or embed the message accompanying the image. Or, instead of encrypting or embedding the entire message, a user may choose to encrypt or embed only a portion of the message.
  • An encrypted message is a message that is not readily understood until it is unlocked, or decrypted. In some embodiments, users who choose to encrypt a message may select an encryption method from a variety of encryption methods.
  • An "embedded message,” as used herein, is a message that is not perceptible until it is unlocked.
  • the message is a text or graphic message
  • the message, or evidence of its existence is not visible when it is embedded.
  • the message is an audio message, it is inaudible when it is embedded.
  • the message is a video message, it may be both invisible and inaudible when embedded.
  • a message may be both encrypted and embedded.
  • An image file including a message (which may be encrypted and/or embedded) is referred to herein as a "file complex.”
  • Users (senders) who decide to lock (encrypt and/or embed) a message may select one or more keys that will unlock (decrypt and/or reveal) the coded message. If the coded message is encrypted, the key is a decryption key. The key is encoded into the file complex, saved on a website server, saved on the user's computing device, or saved on a storage medium and accessed by the user's computing device. One or more keys are used to trigger the unlocking, or decoding, process. The user who creates the file complex does not need to select a key to trigger the decoding process. In some embodiments, if no key is selected then no key will be assigned and no key will be able to trigger the decoding process.
  • Triggers may include, but are not limited to, an image (such as an image of a frame for a picture included in the file complex), and/or a special photographic effect or Add-on to apply to the image of the file complex.
  • the selection (by the recipient/receiver of the file complex) of the correct frame for the picture and/or the right special photographic effect or Add-On to apply to the image reveals the coded message in its decoded form.
  • Triggers used to unlock coded messages may be themed; in other words, triggers may have themes such as, for example, honesty or dishonesty, thereby providing a secondary means of communication.
  • themed triggers are unlike typical decoding triggers that are usually passwords or more sophisticated biologic measurements (fingerprints or retinal scans, etc.), which do not provide any added communication.
  • the unlocking process is intended to be facilitated by using themed triggers that also convey additional meaning.
  • Senders may provide clues to recipients or allow a computer program to successively limit the choice of triggers, in order to assist recipients in determining which trigger or triggers are required to initiate the decoding process.
  • the theme of a themed trigger may correspond to the theme of the coded message.
  • the sender may select an image of a frame decorated with hearts to act as an unlocking trigger.
  • a sender could select an image with a romantic theme to be the unlocking trigger of a coded message with a romantic theme.
  • the receiver of the message would then need to select the frame decorated with hearts in order to unlock the coded message (i.e. decrypt the coded message or render it visible or audible).
  • the receiver could select the frame decorated with hearts by, for example, clicking on an image of the frame with a mouse, or touching an image of the frame on a touch screen.
  • the receiver could also select the frame by using a mouse to drag an image of the frame onto the picture of the file complex. Selecting the trigger that was preselected by the sender (in this example, a frame decorated with hearts) would allow the receiver to view or listen to the coded message in its unencrypted form. However, if the incorrect trigger (such as, for example, a frame decorated with arrows) was selected by the receiver, the coded message would remain locked.
  • the sender could include a clue in the file complex that would indicate to the receiver that a frame decorated with hearts was the correct unlocking trigger. For example, the sender could include an un-coded message containing a clue, or the image in the file complex could serve as a clue.
  • the unencrypted, un-embedded portion of the message could provide an indication of the themed trigger that should be selected.
  • the theme of the unencrypted, un-embedded portion of the message could have a theme corresponding to the theme of the themed trigger that should be selected.
  • the sender could also choose to allow the program used by the receiver to limit the choice of unlocking triggers, or to successively limit the choice of unlocking triggers as incorrect triggers were chosen by the receiver.
  • Add-ons or special photographic effects may also be used as themed triggers.
  • a possible unlocking trigger would be an Add-on of a long nose or a forked tongue, which could be applied to the image in the file complex to unlock the message.
  • a possible special photographic effect that could serve as an unlocking trigger would be a pixelating effect.
  • the message could be unlocked by pixelating the image of a person in the file complex, to suggest that that the person in the image had rough edges or was rude or crude.
  • unlocking triggers include, but are not limited to: effects that change the color, tint, hue, or saturation of an image; effects that sharpen or blur an image; an effect that alters an image so that it looks like a photograph taken with a fisheye lens; and a "twirl” effect that distorts an image by rotating portions of the image.
  • a twirl effect can be created through the use of the Adobe® Photoshop® twirl filter, for example. If a theme of the coded message was inherited personality traits, a possible special photographic effect that could serve as an unlocking trigger would be a "twirl" effect applied to an image of a person in the file complex.
  • a message could be unlocked by applying a twirl effect to the left side of the image, to suggest that the person in the image was misshapen/poorly formed or badly influenced by maternal influences (since the left side is commonly associated with feminine traits).
  • a message could be unlocked by applying a twirl effect to the right side of the image, to suggest that the person in the image was misshapen/poorly formed or badly influenced by paternal influences (since the right side is commonly associated with masculine traits).
  • Examples are divided into two categories: emotions and personality traits.
  • Other possible categories of trigger themes include, for example, vocational themes, hobbies, and affiliations.
  • Each of the below examples consists of two different or opposite emotions or personality traits, such as "Sad vs. Happy.”
  • Each of the listed examples could be used as one theme of a themed trigger; for instance, "Sad vs. Happy” could be the theme of one themed trigger.
  • each emotion or trait could be used as separate themes of themed triggers; for instance, "Sad” could be the theme of one themed trigger, while "Happy” could be the theme of a different themed trigger.
  • a trigger with a sad theme could then be used to unlock a message with a sad theme, while a trigger with a happy theme could be used to unlock a message with a happy theme.
  • the opposing emotions or traits could also be used together as themes; for example, a user creating a file complex could select an unlocking trigger with a sad theme to unlock a message with a happy theme.
  • the originator (sender) of the message can decide to denote to the recipient whether or not there is an embedded message accompanying the image of the file complex. Therefore, the recipient may or may not know that there is an embedded message.
  • an embedded text message is not visible until it is unlocked, and an embedded audio message is not audible until it is unlocked.
  • Various encryption methods may be used to encrypt text messages in accordance with the present invention.
  • Examples of encryption methods that may be used include, but are not limited to, transposition ciphers in which units (such as letters) of the original text are rearranged, and substitution ciphers in which units (such as letters) of the original text are replaced with different units of text.
  • the recipient of a file complex including an encrypted text message may be able to decipher the encrypted message on his or her own, without the use of a themed decryption trigger.
  • a sender of a file complex including an encrypted message could choose not to select a decryption trigger that would decrypt the message, if the sender wanted the recipient to decipher the encrypted message "by hand.”
  • a sender could also create encrypted messages that could be deciphered in more than one manner, thereby creating messages with more than one possible meaning.
  • a user may also choose to embed or encrypt a plurality of different messages into a file complex.
  • each of the different messages could be associated with a different themed trigger. The message viewed by the recipient would then depend on the themed trigger selected by the recipient.
  • the resultant image communication file(s) (i.e. the file complex after the message has been unlocked or decoded) can be saved, exported to the user, sent to a recipient in an email, or sent to a vendor to be printed on goods (t-shirts, mugs, etc.) or used in goods that convey both a visual and audio representation of the image and message.
  • a user can also select a frame to place around the image that becomes part of the image. This frame need not be a trigger used in the decryption process. Therefore, users may place a frame around an image, whether or not they have included an encrypted or embedded message and selected a frame to trigger the decryption process.
  • the resultant image (with visible readable text or encrypted text, or with an embedded text and/or audio message) can be used as wallpaper or a Screensaver for a computer screen, or as wallpaper for a phone.
  • Activating the image (for example, by a mouse click or by a touch on a touch screen) can also reproduce the accompanying audio message.
  • the resultant image/message file can act as a reminder.
  • users can print (and/or embed or encrypt) a mantra on an image creating a more potent reminder or for greater reinforcement.
  • This form of self-communication can be used as a self- improvement aid to help modify a user's behavior or shift his or her attitude.
  • the resultant image/message file(s) can act as a form of communication between individuals or groups, sent by originator(s) to recipient(s). If the sender does not wish the communication to be easily understood, read, or heard by others it can be encrypted or embedded, facilitating more private or personal communication.
  • the content of the message and the manner in which the sender encodes the message can provide insight into the psychological state of the sender. This can potentially be helpful for psychologists and therapists in better understanding some of their clients. For example, if a client embedded or encrypted a message intended for another person, and did not select a themed trigger that would unlock the message, this behavior could be a possible indication that the client was secretive, paranoid, passive-aggressive, or fearful of the outcome if the message was comprehended. If a client selected a themed trigger for which it was difficult to understand the correspondence between the theme of the trigger and the theme of the message, then a psychologist may question why the client was not more forthright and honest about his or her feelings.
  • the themed triggers chosen may reveal the level of honesty of the sender versus the degree to which the sender wishes to portray him or herself in a certain light (i.e. truth vs. mask).
  • the emotional themes of the messages and the selected themed triggers may provide insight into a sender's current emotional state.
  • the use of the methods of the present invention may assist a psychologist in diagnosing a client's psychological issues.
  • the creation of file complexes in accordance with the present invention may be used as a form of art therapy.
  • FIG. 1 is a flowchart of a method of creating a message in accordance with the present invention.
  • a user may select an image file from a gallery of image files in a database.
  • a user may upload his or her own image file or photograph to a website of the present invention.
  • the user may choose to work with the image file using software of the present invention on a computing device.
  • modified image file A After selecting or uploading an image file, the user may manipulate the image file using photo editing processes, including, for example, cropping, painting, framing, adding special effects, and adding add-on images.
  • modified image file A The resulting modified image file is referred to as "modified image file A" in FIG. 1.
  • modified image file B The resulting image file with superimposed text is referred to as "modified image file B" in FIG. 1.
  • the user decides whether or not to encrypt text, whether or not to embed text, and whether or not to attach a file with audio content.
  • the resulting image file including a coded message is a coded modified image file. If the user encrypts the text, the user also selects a themed decryption trigger that will decrypt the text. If the user embeds the text, the user also selects a themed trigger that will make the text visible. If the user attaches a file with audio content, and chooses to embed the audio content, the user also selects a themed trigger that will allow the recipient to listen to the audio content.
  • FIG. 2 is a flowchart of a method of receiving a message in accordance with the present invention.
  • a user/receiver may receive an email message including a file complex.
  • a user/receiver may already have a file complex.
  • the receiver may either upload the file complex to a website of the present invention, or work with the file complex using software of the present invention on a computing device.
  • the receiver then utilizes the website or software to select one or more themed triggers.
  • the themed triggers may be available on the website.
  • the themed triggers may also be included in stand-alone software used by the receiver.
  • the sender may transmit various themed triggers to the receiver as, for example, attachments to an email message.
  • the receiver selects a themed trigger to make the text visible.
  • text is encrypted in the file complex
  • the receiver selects a themed decryption trigger to decrypt the text.
  • the file complex includes embedded audio content
  • the receiver selects a themed trigger that allows the receiver to listen to the audio content.
  • the resulting modified image file which includes a decoded message, is referred to as "modified image file C" in FIG. 2.
  • Modified image file C may be either saved or exported.
  • a user may use software of the present invention to upload a picture or select a picture. Icons would then appear on the computer screen. The user could select the icon corresponding to the action he or she would like to take with regard to the uploaded or selected picture.
  • Examples of actions that could be represented by the icons include, but are not limited to, the following: Add text; Add special effects; Add a frame; Apply Add Ons; Paint; Encrypt the message (visible but encoded); Embed the message (not visible on the picture); Select decryption trigger(s) (frame and/or special effect); Provide clues (text clue that accompanies the message, and/or a command that allows the software program or website of the present invention to successively limit the available trigger options after each incorrect selection).
  • the user could also attach an audio file and/or a video file to the image file of the uploaded or selected picture.
  • the user/sender could send the completed message (the file complex) to another (a receiver).
  • the file complex could, for example, be sent to a receiver as an attachment to an email message.
  • the receiver could also access the file complex using a computer network, such as the internet.
  • the sender could upload the file complex to a website.
  • the receiver could then download the file complex to his or her own computer from the website, or work with the file complex (i.e. view images or video content, listen to audio content, and/or unlock messages of the file complex) through the website.
  • the user could also send the file complex to him or herself.
  • Table 1 File Format for the Accompanying Binary “Information File”

Abstract

A method of creating an image file including a coded message is described. A coded message, which may be either an embedded or an encrypted message, may include text, images, audio content, video content, or a combination thereof. The method involves selecting an image file and adding a message to the image file. The message is then either encrypted or embedded in the image file. A themed trigger, which is a visual representation of the key which may be used to decode the message, is associated with the coded message. If the correct themed trigger is selected by the recipient of the coded message, the coded message will be decoded. The theme of the themed trigger may correspond with the theme of the coded message.

Description

SYSTEM AND METHOD FOR CREATING AND UNLOCKING CODED MESSAGES
Related Applications
[00001] This application claims the benefit of priority of U.S. Provisional Patent
Application No. 61/178,998, filed on May 17, 2009, which is hereby incorporated by reference in its entirety.
Background of the Invention
[00002] Photo editors, or photo editing software tools, allow users to create a variety of digital images. For example, users may add photo effects, custom text or speech bubbles, and pictures to existing digital images to create new digital images. Photo editors may also include tools that allow users to share digital images. For example, users may utilize photo editors to send e-cards which include digital images. Users may also utilize photo editors to embed a digital image in a website, or to share a link that allows others to access a digital image. However, photo editing tools do not allow users to send or receive coded messages in a manner that constitutes a secondary means of communication.
Brief Summary of the Invention
[00003] The present invention is directed to a method of creating a file complex including a coded message. A "coded message," as used herein, is an embedded or encrypted message. An embedded or encrypted message may include text, images, audio content, video content, or a combination thereof. The method involves selecting an image file and adding a message to the image file. The message is then either encrypted or embedded in the image file, and a themed trigger which the recipient may use to decode the message is selected. A "trigger," as used herein, is a visual representation of a key used for decoding a message. A "themed trigger" is a trigger having a theme which may correspond with the theme of the message, or with the theme of the image file to which the message was added. If the message is encrypted, the themed trigger is a themed decryption trigger which is adapted to decrypt the message. If the message is embedded, the themed trigger is adapted to render the message visible or audible. [00004] A method of creating a file complex including a coded message, in accordance with the present invention, may include adding a message to an image file to create a modified image file, and encoding the message of the modified image file to create a coded modified image file containing the coded message. The encoding of the message may involve encrypting the message, if the coded message is to be an encrypted message, or embedding the message, if the coded message is to be an embedded message. The method further includes receiving a request from a user to allow the selection of a themed trigger to decode the coded message, creating an information file including information regarding the themed trigger, and associating the information file with the coded modified image file to create the file complex.
[00005] The present invention is also directed to a method of unlocking a coded message. If the coded message is encrypted, the message is unlocked, or decoded, by decrypting the coded message. If the coded message is embedded, the message is unlocked, or decoded, by rendering the message perceptible to the user. An embedded message in text, graphical, or video form is rendered perceptible to the user by causing the message to be visible, while an embedded message in audio form is rendered perceptible to the user by causing the message to be audible. An embedded video message including audio content is rendered perceptible to the user by causing the embedded message to be both visible and audible. In a method of the present invention, the coded message is unlocked by selecting a themed trigger. If the coded message is an encrypted message, the themed trigger is a themed decryption trigger. The themed trigger will unlock the message if it is the same themed trigger that was selected when the file including the coded message was created. The theme of the themed trigger may correspond with the theme of the coded message. The theme of the themed trigger may also correspond which the theme of an image file to which the coded message was added.
[00006] A method of creating a decoded message, or unlocking a coded message, in accordance with the present invention, may include displaying a modified image including a coded message, and displaying a plurality of themed triggers. A "modified image," as used herein, is the image of an image file to which a coded message was added. The method further includes decoding the coded message, upon selection of at least one of the plurality of themed triggers by a user, to create the decoded message. If the coded message is encrypted, decoding the message involves decrypting the coded message. If the coded message is embedded, decoding the message involves revealing the coded message such that it is perceptible to a user.
[00007] The methods of the present invention may be performed by execution of computer readable program code by at least one processor of at least one computer system. The present invention is also directed to a computer-readable medium whose contents include instructions that, when executed, enable a computer system to perform a method of the present invention. The present invention is further directed to a system including computer readable program code, which may be executed by at least one processor of at least one computer system, to carry out the steps of a method of the present invention. The system may also include a user interface.
[00008] The present invention is also directed to a system for creating a file complex including a coded message. This system includes a plurality of themed triggers. The system also includes a file complex creation component that is configured, when executed by a processor, to add a message to an image file, to encode the message to create a coded modified image file including the coded message, to receive a request from a user to allow the selection of at least one themed trigger of the plurality of themed triggers to decode the coded message, and to create a file complex by associating an information file with the coded modified image file. The information file is a file including information regarding the themed trigger or triggers which are able to decode the coded message. The file complex creation component may include computer readable program code, which may be executed by at least one processor of at least one computer system.
[00009] A purpose of this invention is to incorporate text and/or audio messaging, in coded or un-coded formats, into picture and photo editing to create a more diverse, interesting, and intriguing medium of communication. Use of this form of communication is intended for fun, playful interaction, and for personal development. This form of communication can also be used by psychologists, therapists, and counselors to understand a client's communication style and to uncover underlying thoughts and feelings. When text and/or audio messaging is incorporated in a coded format, this form of communication can also be used to enhance the security of transmitted messages. [00010] The foregoing has outlined rather broadly the features and technical advantages of the present invention in order that the detailed description of the invention that follows may be better understood. Additional features of the invention which form the subject of the claims of the invention will be described hereinafter. It should be appreciated by those skilled in the art that the specific embodiments disclosed may be readily utilized as a basis for modifying or designing other methods or structures for carrying out the same purposes of the present invention. It should also be realized by those skilled in the art that such equivalent constructions do not depart from the spirit and scope of the invention as set forth in the appended claims. The novel features which are believed to be characteristic of the invention, both as to its organization and method of operation, together with further objects and advantages will be better understood from the following description when considered in connection with the accompanying figures. It is to be expressly understood, however, that each of the figures is provided for the purpose of illustration and description only and is not intended as a definition of the limits of the present invention.
Brief Description of the Drawings
[00011] FIG. 1 is a flowchart of a method of creating a message in accordance with the present invention.
[00012] FIG. 2 is a flowchart of a method of receiving a message in accordance with the present invention.
Detailed Description
[00013] The present invention is directed to a method of creating a file, such as an image file, including a coded message. The present invention is also directed to a method of unlocking a coded message. The present invention is further directed to a system for creating and/or unlocking a coded message using a website. The present invention is also directed to software that may be used to create and/or unlock a coded message.
[00014] The process of the present invention can be accomplished by a user on a computing device, such as a personal computer or a portable device. Phones, smartphones, and personal digital assistants (PDA's) are examples of portable devices that may be used. Users may perform the steps of the process on a computing device while accessing a website in accordance with the present invention. Users may also perform the steps of the process on a computing device without accessing a website, using an application packaged as a stand-alone software executable file.
[00015] To create a message in accordance with the present invention, the user selects an image file (typically a jpeg) from a bank of images stored on a server or some other storage medium. Users can also upload their own images that they have created, including photographs, drawings, or other artwork. The image files which store the images are typically jpeg files, but can be other file types such as, but not limited to, tiff, gif, and pdf files. The image files may be associated, linked, or bundled with other file types, including audio and/or video files.
[00016] Once users have selected or uploaded an image, they can superimpose text
(a text message) on the image, or above or below the image, and/or attach a selected or user- created audio or video message to accompany the image. A message in accordance with the present invention may include text, graphics, audio content, and/or video content.
[00017] A user sending the message may send the message accompanying the image as a coded message. A coded message may be either an encrypted message or an embedded message. Therefore, a user may choose whether to encrypt or embed the message accompanying the image. Or, instead of encrypting or embedding the entire message, a user may choose to encrypt or embed only a portion of the message. An encrypted message is a message that is not readily understood until it is unlocked, or decrypted. In some embodiments, users who choose to encrypt a message may select an encryption method from a variety of encryption methods. An "embedded message," as used herein, is a message that is not perceptible until it is unlocked. Specifically, if the message is a text or graphic message, the message, or evidence of its existence, is not visible when it is embedded. If the message is an audio message, it is inaudible when it is embedded. If the message is a video message, it may be both invisible and inaudible when embedded. In some embodiments, a message may be both encrypted and embedded. An image file including a message (which may be encrypted and/or embedded) is referred to herein as a "file complex."
[00018] Users (senders) who decide to lock (encrypt and/or embed) a message may select one or more keys that will unlock (decrypt and/or reveal) the coded message. If the coded message is encrypted, the key is a decryption key. The key is encoded into the file complex, saved on a website server, saved on the user's computing device, or saved on a storage medium and accessed by the user's computing device. One or more keys are used to trigger the unlocking, or decoding, process. The user who creates the file complex does not need to select a key to trigger the decoding process. In some embodiments, if no key is selected then no key will be assigned and no key will be able to trigger the decoding process.
[00019] As used herein, the visual representation of a key used for decoding a message is a "trigger." Triggers may include, but are not limited to, an image (such as an image of a frame for a picture included in the file complex), and/or a special photographic effect or Add-on to apply to the image of the file complex. The selection (by the recipient/receiver of the file complex) of the correct frame for the picture and/or the right special photographic effect or Add-On to apply to the image reveals the coded message in its decoded form. Triggers used to unlock coded messages may be themed; in other words, triggers may have themes such as, for example, honesty or dishonesty, thereby providing a secondary means of communication. These themed triggers are unlike typical decoding triggers that are usually passwords or more sophisticated biologic measurements (fingerprints or retinal scans, etc.), which do not provide any added communication. In a method of the present invention, the unlocking process is intended to be facilitated by using themed triggers that also convey additional meaning. Senders may provide clues to recipients or allow a computer program to successively limit the choice of triggers, in order to assist recipients in determining which trigger or triggers are required to initiate the decoding process.
[00020] The theme of a themed trigger may correspond to the theme of the coded message. For example, if the coded message of the file complex is romantic in nature, then the sender may select an image of a frame decorated with hearts to act as an unlocking trigger. In other words, a sender could select an image with a romantic theme to be the unlocking trigger of a coded message with a romantic theme. The receiver of the message would then need to select the frame decorated with hearts in order to unlock the coded message (i.e. decrypt the coded message or render it visible or audible). The receiver could select the frame decorated with hearts by, for example, clicking on an image of the frame with a mouse, or touching an image of the frame on a touch screen. The receiver could also select the frame by using a mouse to drag an image of the frame onto the picture of the file complex. Selecting the trigger that was preselected by the sender (in this example, a frame decorated with hearts) would allow the receiver to view or listen to the coded message in its unencrypted form. However, if the incorrect trigger (such as, for example, a frame decorated with arrows) was selected by the receiver, the coded message would remain locked. The sender could include a clue in the file complex that would indicate to the receiver that a frame decorated with hearts was the correct unlocking trigger. For example, the sender could include an un-coded message containing a clue, or the image in the file complex could serve as a clue. Or, if only a portion of the message in the file complex is encrypted or embedded, the unencrypted, un-embedded portion of the message could provide an indication of the themed trigger that should be selected. For example, the theme of the unencrypted, un-embedded portion of the message could have a theme corresponding to the theme of the themed trigger that should be selected. The sender could also choose to allow the program used by the receiver to limit the choice of unlocking triggers, or to successively limit the choice of unlocking triggers as incorrect triggers were chosen by the receiver.
[00021] As stated above, Add-ons or special photographic effects may also be used as themed triggers. For example, if a theme of a coded message was dishonesty, a possible unlocking trigger would be an Add-on of a long nose or a forked tongue, which could be applied to the image in the file complex to unlock the message. If a theme of the coded message was the personality trait of crudeness or rudeness, a possible special photographic effect that could serve as an unlocking trigger would be a pixelating effect. In other words, the message could be unlocked by pixelating the image of a person in the file complex, to suggest that that the person in the image had rough edges or was rude or crude.
[00022] Other special photographic effects that could be used as unlocking triggers include, but are not limited to: effects that change the color, tint, hue, or saturation of an image; effects that sharpen or blur an image; an effect that alters an image so that it looks like a photograph taken with a fisheye lens; and a "twirl" effect that distorts an image by rotating portions of the image. A twirl effect can be created through the use of the Adobe® Photoshop® twirl filter, for example. If a theme of the coded message was inherited personality traits, a possible special photographic effect that could serve as an unlocking trigger would be a "twirl" effect applied to an image of a person in the file complex. Specifically, a message could be unlocked by applying a twirl effect to the left side of the image, to suggest that the person in the image was misshapen/poorly formed or badly influenced by maternal influences (since the left side is commonly associated with feminine traits). Alternatively, a message could be unlocked by applying a twirl effect to the right side of the image, to suggest that the person in the image was misshapen/poorly formed or badly influenced by paternal influences (since the right side is commonly associated with masculine traits).
[00023] Examples of additional trigger themes that may be used are listed below.
These examples are divided into two categories: emotions and personality traits. Other possible categories of trigger themes include, for example, vocational themes, hobbies, and affiliations. Each of the below examples consists of two different or opposite emotions or personality traits, such as "Sad vs. Happy." Each of the listed examples could be used as one theme of a themed trigger; for instance, "Sad vs. Happy" could be the theme of one themed trigger. Alternatively, each emotion or trait could be used as separate themes of themed triggers; for instance, "Sad" could be the theme of one themed trigger, while "Happy" could be the theme of a different themed trigger. A trigger with a sad theme could then be used to unlock a message with a sad theme, while a trigger with a happy theme could be used to unlock a message with a happy theme. The opposing emotions or traits could also be used together as themes; for example, a user creating a file complex could select an unlocking trigger with a sad theme to unlock a message with a happy theme.
[00024] Emotions:
Love vs. Hate
Anger vs. Peace
Sad vs. Happy Grief vs. Joy Shame vs. Pride Guilt vs. Righteousness Envy vs. Satisfaction
Personality Traits:
Honest vs. Dishonest
Courteous vs. Rude
Responsible vs. Irresponsible
Compatible vs. Incompatible
Loyal vs. Disloyal
Enthusiastic vs. Apathetic
Open-minded vs. Close-minded
Exhibit Self-Control vs. Lack of self-control
Encouraging vs. Discouraging
Adaptable/Flexible vs. Inflexible
Optimistic vs. Pessimistic
Industrious vs. Lethargic
Careful vs. Reckless
Self-Reliant/Independent vs. Dependent Compassionate vs. Uncaring
Competitive vs. Non-competitive
Patient vs. Impatient
Perfectionist vs. Care-free
Courageous vs. Cowardly
Decisive vs. Indecisive
Perseverance vs. Giving up
Calm vs. Restless
Stable vs. Fickle
Selfish vs. Selfless
Extroverted vs. Introverted
Social vs. Loner
Smart vs. Dumb
Good vs. Evil
Kind vs. Hurtful
Creative vs. Rigid
Beauty vs. Beast
Winner vs. Loser
Accomplished vs. Unaccomplished
Motivated by Self Gain vs. Motivated by Social Good [00026] In the case of an embedded message, the originator (sender) of the message can decide to denote to the recipient whether or not there is an embedded message accompanying the image of the file complex. Therefore, the recipient may or may not know that there is an embedded message. As stated above, an embedded text message is not visible until it is unlocked, and an embedded audio message is not audible until it is unlocked.
[00027] In contrast, if a text message in a file complex is encrypted, and not embedded, the encrypted message is visible to the recipient even before it is unlocked. In other words, before an encrypted text message is unlocked, it is visible but encrypted.
[00028] Various encryption methods may be used to encrypt text messages in accordance with the present invention. Examples of encryption methods that may be used include, but are not limited to, transposition ciphers in which units (such as letters) of the original text are rearranged, and substitution ciphers in which units (such as letters) of the original text are replaced with different units of text. In some embodiments of the present invention, the recipient of a file complex including an encrypted text message may be able to decipher the encrypted message on his or her own, without the use of a themed decryption trigger. Therefore, a sender of a file complex including an encrypted message could choose not to select a decryption trigger that would decrypt the message, if the sender wanted the recipient to decipher the encrypted message "by hand." A sender could also create encrypted messages that could be deciphered in more than one manner, thereby creating messages with more than one possible meaning.
[00029] A user may also choose to embed or encrypt a plurality of different messages into a file complex. In one embodiment, each of the different messages could be associated with a different themed trigger. The message viewed by the recipient would then depend on the themed trigger selected by the recipient.
[00030] The resultant image communication file(s) (i.e. the file complex after the message has been unlocked or decoded) can be saved, exported to the user, sent to a recipient in an email, or sent to a vendor to be printed on goods (t-shirts, mugs, etc.) or used in goods that convey both a visual and audio representation of the image and message. [00031] A user can also select a frame to place around the image that becomes part of the image. This frame need not be a trigger used in the decryption process. Therefore, users may place a frame around an image, whether or not they have included an encrypted or embedded message and selected a frame to trigger the decryption process.
[00032] The resultant image (with visible readable text or encrypted text, or with an embedded text and/or audio message) can be used as wallpaper or a Screensaver for a computer screen, or as wallpaper for a phone. Activating the image (for example, by a mouse click or by a touch on a touch screen) can also reproduce the accompanying audio message.
[00033] The resultant image/message file can act as a reminder. For example, users can print (and/or embed or encrypt) a mantra on an image creating a more potent reminder or for greater reinforcement. This form of self-communication can be used as a self- improvement aid to help modify a user's behavior or shift his or her attitude.
[00034] The resultant image/message file(s) can act as a form of communication between individuals or groups, sent by originator(s) to recipient(s). If the sender does not wish the communication to be easily understood, read, or heard by others it can be encrypted or embedded, facilitating more private or personal communication.
[00035] The content of the message and the manner in which the sender encodes the message can provide insight into the psychological state of the sender. This can potentially be helpful for psychologists and therapists in better understanding some of their clients. For example, if a client embedded or encrypted a message intended for another person, and did not select a themed trigger that would unlock the message, this behavior could be a possible indication that the client was secretive, paranoid, passive-aggressive, or fearful of the outcome if the message was comprehended. If a client selected a themed trigger for which it was difficult to understand the correspondence between the theme of the trigger and the theme of the message, then a psychologist may question why the client was not more forthright and honest about his or her feelings. In general, the themed triggers chosen may reveal the level of honesty of the sender versus the degree to which the sender wishes to portray him or herself in a certain light (i.e. truth vs. mask). In addition, the emotional themes of the messages and the selected themed triggers may provide insight into a sender's current emotional state.
[00036] Therefore, the use of the methods of the present invention may assist a psychologist in diagnosing a client's psychological issues. Moreover, the creation of file complexes in accordance with the present invention may be used as a form of art therapy.
[00037] FIG. 1 is a flowchart of a method of creating a message in accordance with the present invention. As shown in the flowchart, a user may select an image file from a gallery of image files in a database. Alternatively, a user may upload his or her own image file or photograph to a website of the present invention. Instead of uploading the image file to a website, the user may choose to work with the image file using software of the present invention on a computing device.
[00038] After selecting or uploading an image file, the user may manipulate the image file using photo editing processes, including, for example, cropping, painting, framing, adding special effects, and adding add-on images. The resulting modified image file is referred to as "modified image file A" in FIG. 1.
[00039] The user adds text to modified image file A. The resulting image file with superimposed text is referred to as "modified image file B" in FIG. 1.
[00040] The user then decides whether or not to encrypt text, whether or not to embed text, and whether or not to attach a file with audio content. The resulting image file including a coded message is a coded modified image file. If the user encrypts the text, the user also selects a themed decryption trigger that will decrypt the text. If the user embeds the text, the user also selects a themed trigger that will make the text visible. If the user attaches a file with audio content, and chooses to embed the audio content, the user also selects a themed trigger that will allow the recipient to listen to the audio content. The resulting modified image file, which may also include an information file and/or an audio file, is referred to as the "file complex." The file complex is either saved or exported. The file complex may be sent to a receiver. [00041] FIG. 2 is a flowchart of a method of receiving a message in accordance with the present invention. As shown in the flowchart, a user/receiver may receive an email message including a file complex. Alternatively, a user/receiver may already have a file complex. The receiver may either upload the file complex to a website of the present invention, or work with the file complex using software of the present invention on a computing device.
[00042] The receiver then utilizes the website or software to select one or more themed triggers. Specifically, the themed triggers may be available on the website. The themed triggers may also be included in stand-alone software used by the receiver. Alternatively, the sender may transmit various themed triggers to the receiver as, for example, attachments to an email message. If text is embedded in the file complex, the receiver selects a themed trigger to make the text visible. If text is encrypted in the file complex, the receiver selects a themed decryption trigger to decrypt the text. If the file complex includes embedded audio content, the receiver selects a themed trigger that allows the receiver to listen to the audio content. The resulting modified image file, which includes a decoded message, is referred to as "modified image file C" in FIG. 2. Modified image file C may be either saved or exported.
[00043] In one embodiment of the present invention, a user may use software of the present invention to upload a picture or select a picture. Icons would then appear on the computer screen. The user could select the icon corresponding to the action he or she would like to take with regard to the uploaded or selected picture. Examples of actions that could be represented by the icons include, but are not limited to, the following: Add text; Add special effects; Add a frame; Apply Add Ons; Paint; Encrypt the message (visible but encoded); Embed the message (not visible on the picture); Select decryption trigger(s) (frame and/or special effect); Provide clues (text clue that accompanies the message, and/or a command that allows the software program or website of the present invention to successively limit the available trigger options after each incorrect selection). The user could also attach an audio file and/or a video file to the image file of the uploaded or selected picture. After one or more icons were selected and the corresponding action(s) were taken, and/or after an audio file was attached, the user/sender could send the completed message (the file complex) to another (a receiver). The file complex could, for example, be sent to a receiver as an attachment to an email message. The receiver could also access the file complex using a computer network, such as the internet. For example, the sender could upload the file complex to a website. The receiver could then download the file complex to his or her own computer from the website, or work with the file complex (i.e. view images or video content, listen to audio content, and/or unlock messages of the file complex) through the website. Instead of, or in addition to, sending the file complex to another, the user could also send the file complex to him or herself.
[00044] An example of a possible file format of a binary "information file" that accompanies the coded message in a file complex is set forth below, in Table 1.
Table 1 : File Format for the Accompanying Binary "Information File"
Figure imgf000017_0001
[00045] Although the present invention and its advantages have been described in detail, it should be understood that various changes, substitutions and alterations can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Moreover, the scope of the present application is not intended to be limited to the particular embodiments of the invention described in the specification. As one of ordinary skill in the art will readily appreciate from the disclosure of the present invention, the compositions, processes, methods, and steps, presently existing or later to be developed that perform substantially the same function or achieve substantially the same result as the corresponding embodiments described herein may be utilized according to the present invention.

Claims

ClaimsWhat is claimed is:
1. A method of creating a file complex including a coded message comprising:
adding a message to an image file to create a modified image file;
encoding the message of the modified image file to create a coded modified image file comprising the coded message;
receiving a request from a user to allow a selection of a themed trigger to decode the coded message;
creating an information file including information regarding the themed trigger; and,
associating the information file with the coded modified image file to create the file complex.
2. The method of claim 1 , wherein encoding the message of the modified image file comprises encrypting the message, and wherein the coded message comprises an encrypted message.
3. The method of claim 1, wherein encoding the message of the modified image file comprises embedding the message, and wherein the coded message comprises a message that is not perceptible to the user.
4. The method of claim 1, wherein the message comprises text.
5. The method of claim 1, wherein the message comprises audio content.
6. The method of claim 1, wherein the themed trigger has a theme corresponding to a theme of the coded message.
7. The method of claim 1 , wherein the themed trigger is an image.
8. The method of claim 1 , wherein the themed trigger is a photographic effect.
9. A method of creating a decoded message comprising:
displaying a modified image comprising a coded message;
displaying a plurality of themed triggers; and
decoding the coded message, upon selection of at least one of the plurality of themed triggers by a user, to create the decoded message.
10. The method of claim 9, wherein the coded message comprises an encrypted message, and wherein decoding the coded message comprises decrypting the coded message.
11. The method of claim 9, wherein the coded message comprises embedded text, and wherein decoding the coded message comprises causing the embedded text to be visible.
12. The method of claim 9, wherein the coded message comprises embedded audio content, and wherein decoding the coded message comprises causing the embedded audio content to be audible.
13. The method of claim 9, wherein the at least one of the plurality of themed triggers has a theme corresponding to a theme of the coded message.
14. The method of claim 9, wherein the at least one of the plurality of themed triggers is an image.
15. The method of claim 9, wherein the at least one of the plurality of themed triggers is a photographic effect.
16. A system for creating a file complex including a coded message, comprising:
a plurality of themed triggers; and
a file complex creation component that is configured, when executed by a processor, to add a message to an image file, to encode said message to create a coded modified image file comprising the coded message, to receive a request from a user to allow a selection of at least one themed trigger of the plurality of themed triggers to decode the coded message, and to create a file complex by associating an information file with the coded modified image file, said information file including information regarding the at least one themed trigger.
17. The system of claim 16, wherein the message comprises text.
18. The system of claim 16, wherein the message comprises audio content.
19. The system of claim 16, wherein the at least one of the plurality of themed triggers is an image.
20. The system of claim 16, wherein the at least one of the plurality of themed triggers is a photographic effect.
PCT/US2010/035160 2009-05-17 2010-05-17 System and method for creating and unlocking coded messages WO2010135263A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17899809P 2009-05-17 2009-05-17
US61/178,998 2009-05-17

Publications (2)

Publication Number Publication Date
WO2010135263A2 true WO2010135263A2 (en) 2010-11-25
WO2010135263A3 WO2010135263A3 (en) 2011-02-03

Family

ID=43126720

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2010/035160 WO2010135263A2 (en) 2009-05-17 2010-05-17 System and method for creating and unlocking coded messages

Country Status (1)

Country Link
WO (1) WO2010135263A2 (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530163A (en) * 2014-10-22 2016-04-27 阿里巴巴集团控股有限公司 Method for sending information and system thereof
WO2016064911A1 (en) 2014-10-22 2016-04-28 Alibaba Group Holding Limited Method and apparatus for generating and sending a two-dimensional code in a message
US10157180B2 (en) 2015-01-13 2018-12-18 Alibaba Group Holding Limited Displaying information in multiple languages based on optical code reading
US10438263B2 (en) 2014-09-29 2019-10-08 Alibaba Group Holding Limited Method and system for information recording
US11282064B2 (en) 2018-02-12 2022-03-22 Advanced New Technologies Co., Ltd. Method and apparatus for displaying identification code of application
US11538004B2 (en) 2018-11-23 2022-12-27 Advanced New Technologies Co., Ltd. System and method for facilitating enhanced offline payment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761686A (en) * 1996-06-27 1998-06-02 Xerox Corporation Embedding encoded information in an iconic version of a text image
US20010017932A1 (en) * 1998-08-22 2001-08-30 Chang Kenneth H.P. Encoding and recording a message within an image
US20040264735A1 (en) * 1995-05-08 2004-12-30 Rhoads Geoffrey B. Digital watermark embedding and decoding using encryption keys
US20050160271A9 (en) * 1998-11-19 2005-07-21 Brundage Trent J. Identification document and related methods

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040264735A1 (en) * 1995-05-08 2004-12-30 Rhoads Geoffrey B. Digital watermark embedding and decoding using encryption keys
US5761686A (en) * 1996-06-27 1998-06-02 Xerox Corporation Embedding encoded information in an iconic version of a text image
US20010017932A1 (en) * 1998-08-22 2001-08-30 Chang Kenneth H.P. Encoding and recording a message within an image
US20050160271A9 (en) * 1998-11-19 2005-07-21 Brundage Trent J. Identification document and related methods

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10438263B2 (en) 2014-09-29 2019-10-08 Alibaba Group Holding Limited Method and system for information recording
CN105530163A (en) * 2014-10-22 2016-04-27 阿里巴巴集团控股有限公司 Method for sending information and system thereof
WO2016064911A1 (en) 2014-10-22 2016-04-28 Alibaba Group Holding Limited Method and apparatus for generating and sending a two-dimensional code in a message
KR20170063751A (en) * 2014-10-22 2017-06-08 알리바바 그룹 홀딩 리미티드 Method and apparatus for generating and sending a two-dimensional code in a message
EP3210363A4 (en) * 2014-10-22 2018-04-04 Alibaba Group Holding Limited Method and apparatus for generating and sending a two-dimensional code in a message
US10601763B2 (en) 2014-10-22 2020-03-24 Alibaba Group Holding Limited Method and apparatus for generating and sending a two-dimensional code in a message
US10157180B2 (en) 2015-01-13 2018-12-18 Alibaba Group Holding Limited Displaying information in multiple languages based on optical code reading
US11062096B2 (en) 2015-01-13 2021-07-13 Advanced New Technologies Co., Ltd. Displaying information in multiple languages based on optical code reading
US11282064B2 (en) 2018-02-12 2022-03-22 Advanced New Technologies Co., Ltd. Method and apparatus for displaying identification code of application
US11790344B2 (en) 2018-02-12 2023-10-17 Advanced New Technologies Co., Ltd. Method and apparatus for displaying identification code of application
US11538004B2 (en) 2018-11-23 2022-12-27 Advanced New Technologies Co., Ltd. System and method for facilitating enhanced offline payment

Also Published As

Publication number Publication date
WO2010135263A3 (en) 2011-02-03

Similar Documents

Publication Publication Date Title
US11640498B2 (en) Method and system for selective document redaction
WO2010135263A2 (en) System and method for creating and unlocking coded messages
US9177174B1 (en) Systems and methods for protecting sensitive data in communications
US9160719B2 (en) Hiding ciphertext using a linguistics algorithm with dictionaries
US20010056468A1 (en) Method of information display and communication system using the method
CN107078942A (en) The method and system that the messaging and content controlled by sender is shared
JP2009508240A (en) System and method for controlling the distribution of electronic information
CN102959934B (en) Method and apparatus for sharing images
US20130117861A1 (en) System allowing the display of a private computer file on a screen of a telecommunications terminal and corresponding method
WO2006120688A2 (en) Messaging system and method
CN116745795A (en) License-based media composition
CN115600164A (en) Method and device for adding customized watermark, intelligent terminal and storage medium
JP2022530850A (en) Improved messaging system
WO2021147727A1 (en) Instant messaging sending method, apparatus and device
CN103517224B (en) A kind of method and system of control short message forwarding
US20150347365A1 (en) System and method for distributing censored and encrypted versions of a document
Ibrahim et al. Mobisis: An android-based application for sending stego image through mms
CN117882360A (en) End-to-end encryption metadata for each participant
US20220318874A1 (en) Generating and using tokens to request services and access to a product collaboration platform
JP5780194B2 (en) Image management system and e-mail address update method
JP5108916B2 (en) Content transmission system, content transmission method and program
FR3095874A1 (en) PROCESS FOR GENERATING AN ARCHIVING CODE TO CREATE A FOOTPRINT OF MULTIMEDIA CONTENT
US11799654B2 (en) Secure communication tool for use alongside non-secure communications
AU2014282922A1 (en) System and method for providing personalized and confidential data management and sharing services
US20220092153A1 (en) System and method for securing stored and merged images using blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10778220

Country of ref document: EP

Kind code of ref document: A2

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10778220

Country of ref document: EP

Kind code of ref document: A2