Sign In to Follow Application
View All Documents & Correspondence

System And Method For Tamper Proof Secure Text Message Communications

Abstract: Systems and methods for providing tamper-proof secure text message communications are disclosed. For example, a computer-implemented method for providing tamper-proof secured text-based communications may include an automatic two-layer encryption of the text message that has been initiated from the primary device/ participating node with the tamper-proof application. When the encrypted text message passes through a plurality of intermediary nodes during its course of transmission to the intended recipient, only first level of decryption takes place to provide certain relevant information, in particular, the content of the text message.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
18 June 2021
Publication Number
08/2023
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
sakthiya.dakshi@outlook.com
Parent Application

Applicants

TRACETEXT TECHNOLOGY PRIVATE LIMITED
R-792, Basement, New Rajinder Nagar, New Delhi

Inventors

1. DHARMVEER SINGH
Tracetext Technology Private Limited, R-792, Basement, New Rajinder Nagar, New Delhi - 110060
2. YATHARTH MISHRA
Tracetext Technology Private Limited, R-792, Basement, New Rajinder Nagar, New Delhi - 110060

Specification

The present invention relates to a secure electronic communication channel, and more particularly to methods and systems for providing tamper-proof secured text-based communication.
BACKGROUND OF THE INVENTION
Electronic communications are currently dominating, and has completely replaced the other communication forms. While open and easy electronic communication between a wide range of users provides tremendous advantages, it also presents some challenges, in particular, relating to privacy of communications.
Short Message Service (SMS) is a communication protocol that allows that interchange of text messages between mobile devices. SMS text messaging is still one of the preferred mode and widely used tool of communications in many business and personal situations even in today's WhatsApp era. More particularly, SMS is the predominantly used mode of communication for sending One Time Passwords, account information and other financial transaction details by many financial institutions. However, this mode of communication still posts certain security problem as they are not encrypted.
To get around such insecure text messaging, few entities/ institutions are using an Interactive Voice Response (IVR) call back system. However, IVR is often criticized as not being user friendly due to its poor design. In view of the risks posed in potentially having sensitive information detected by third party intermediaries, many services are being offered for use against the SMS prying. These services include encryption of every text message during transfer, which remain encrypted until a correct password is entered. However, these services offered are inconvenient due to its lack of integration, lack of hardware support, etc.
While the users intend to have text-message containing One Time Password (OTP) being sent from a bank for authentication of an electronic financial transaction more secure and private,

OTP delivery has always been unreliable, and often customers must request an OTP resend. A bigger issue is that SMS-based OTPs, which, by design, cannot be encrypted, are not secure. This issue is impacting services across the industry, be it OTPs for financial transaction authentication or two-factor authentication for logging into accounts. It is being reported that this issue is caused by new SMS regulations that aim to tackle SMS fraud.
Mobile Service Operators have begum the implementation of the new Distributed Ledger Technology (DLT) process, which has ended up impacting push notifications. DLT is a registration system based on blockchain and the Telecom Regulatory Authority of India (TRAI) requires telemarketers to be registered on the DLT platform, which aims to protect people from SMS spams from telemarketers.
Accordingly, to overcome the drawbacks as mentioned in the existing prior arts including above, further described herein in relation to one or more embodiments, methods and systems are provided for a secure text-message based communication channel within a trusted environment using Blockchain technology.
OBJECTS OF THE INVENTION
One of the primary objectives of the present invention is to achieve more secure text-message/SMS delivery to the target using encryption and Blockchain technology.
The other objective of the present invention is to secure the SMS/ text messages sent by enterprises keeping data integrity & traceability in mind.
Another objective of the present invention is to initiate delivery of text message (SMS) to the intended recipient with two-layer encryption viz. packet and message encryption, before it reaches the target device/ device of the intended recipient.
Still another objective of the present invention is to provide a tamper-proof secure text-based communication system with seamless integration, configuration and operation in any devices of the users.

Yet another objective of the present invention is to provide a secure system wherein only relevant details of the SMS will be decoded at plurality of participating node. In other words, the content of the SMS/ text message will remain encrypted.
Still another objective of the present invention is to provide a system which generates an alert/ alarm in case of any attempt to tamper the SMS.
Still another objective of the present invention is to provide a system that provides the primary participating node/ user that initiated the delivery of SMS with such authority to block IP addresses of the other plurality of participating nodes who attempt to tamper the SMS.
Yet another objective of the present invention is to provide route tracking of IP addresses of the plurality of participating nodes through which the SMS passes through.
Another objective of the present invention is to provide a data repository of the whole transaction in Blockchain to enable the primary participating node to view the complete journey of the SMS whose delivery has been initiated.
Still another objective of the present invention is to provide a conduit system for tamper-proof SMS delivery through a plurality of users without adversely impacting their Transaction per Section (TPS).
SUMMARY OF THE INVENTION
As will be further described herein in relation to one or more embodiments, methods and systems are provided for a tamper-proof secure Short Message Service (SMS), in particular, for enterprise application, to aid secure exchange/ transmission of communications comprising sensitive information over regular SMS interfaces without the need of expensive protocol channels. The present invention helps in meeting the users' need for convenient, friendly and confidential SMS communication exchanges within a trusted environment.
In accordance with an embodiment of the present invention, a method for providing tamper-proof secured text-based communications comprises automatic two-layer encryption of the SMS that has been initiated from the primary device/ participating node wherein the tamper-

proof application has been installed and integrated either in the primary participating node's device or its enterprise server. The method also comprises encrypting the text message/ SMS initiated seamlessly on two layers viz. Complete Packet Encryption (SMPP/HTTP Packets) and Message Content Encryption. The encrypted SMS will be completely decrypted on both levels only upon delivery at the intended recipient's device. When the encrypted SMS passes through a plurality of intermediary nodes during its course of transmission to the intended recipient, only first level of decryption takes place to provide certain relevant information including Header, MSISDN (Mobile Number of the intended recipient), Source, etc., in particular, the content of the text message and the intended recipient's mobile number remains encrypted.
In accordance with another embodiment of the present invention, a client device comprises: one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the client device to: encrypt the SMS/ text message that it is pushing to an intended recipient with two-layer encryption via a regular channel of communication wherein such encrypted SMS be decrypted only upon delivery of the same at the intended recipient's device. A plurality of intermediate nodes in such communication channel will not be given access to the content of the text message and the intended recipient's mobile number.
In accordance with another embodiment of the present invention, the present system comprises a client integrated with the tamper-proof SMS communication application, wherein it further includes one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the client device to: encrypt the SMS/ text message that it is pushing to an intended recipient with two-layer encryption via a regular channel of communication wherein such encrypted SMS be decrypted only upon delivery of the same at the intended recipient's device, and the intermediary nodes in such communication channel will not be given access to the content of the text message and the intended recipient's mobile number.
In accordance with yet another embodiment of the present invention, a client device and a plurality of intermediary nodes comprises: one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the client device to: encrypt the SMS/ text message

that it is pushing to an intended recipient with two-layer encryption via a regular channel of communication wherein such encrypted SMS be partially decrypted while reaching the plurality of intermediary nodes in the channel, and be completely decrypted only upon delivery of the same at the intended recipient's device. Herein, the plurality of intermediary nodes in the communication channel will not be given access to the content of the text message.
In accordance with yet another embodiment of the present invention, the present system comprises a client and a plurality of intermediary nodes in the channel of communication, integrated with the tamper-proof SMS communication application, wherein it further includes one or more processors; and one or more memories adapted to store a plurality of machine-readable instructions which when executed by the one or more processors are adapted to cause the client device to: encrypt the SMS/ text message that it is pushing to an intended recipient with two-layer encryption via a regular channel of communication wherein such encrypted SMS be decrypted only upon delivery of the same at the intended recipient's device, and the intermediary nodes in such communication channel will not be given access to the content of the text message and the intended recipient's mobile number.
According to still another embodiment, the present tamer-proof text-based communication system ensures seamless and secure collaboration between all the stake holders and participating nodes while maintaining records of the entire SMS flow on Blockchain. In other words, the present system records the complete message flow through the channel into Blockchain database associated with it, which will be readily available to the client to enable traceability. This data of the message flow will be stored in Blockchain to ensure security and protection. The client will be able to view the entire journey and transaction of the text message from its initiation till it reach the intended recipient's device, and accordingly take appropriate actions.
These and other features and advantages of the embodiments of the present invention will be more readily apparent from the detailed description of the embodiments set forth below taken in conjunction with the accompanying drawings.
BRIEF DESCRIPTION OF THE FIGURES

The invention is further described in the detailed description that follows, by reference to the noted drawings by way of illustrative embodiments of the invention, in which like reference numerals represent similar parts throughout the drawings. The invention is not limited to the precise arrangements and illustrative examples shown in the drawings:
Figure 1 shows a block diagram illustrating system architecture of the present application.
Figure 2 illustrates operation of the present system when only the client device is integrated with the present tamper-proof application.
Figure 3 illustrates operation of the present system when all the participating nodes are integrated with the present tamper-proof application.
Figure 4 illustrates the unique feature of IP tracing of the participating nodes by the present tamper-proof application.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Detailed embodiments of the present invention are disclosed herein with reference to the drawings. However, it is to be understood that the disclosed embodiments are merely exemplary of the invention, which can be embodied in various forms. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present invention in virtually any appropriately detailed structure. Further, the terms and phrases used herein are not intended to be limiting but rather to provide an understandable description of the invention.
In accordance with one or more embodiments described herein, methods and systems are provided for tamper-proof secured text-based communication wherein components such as a tamper-proof text message application is integrated with the client device, which may encrypt/ decrypt text message to ensure a secure tamper-proof and private communication exchange. The exchange of such secure text-message/ SMS communication involves encryption and/or encryption of SMS message with two-layer protection. Such secure communication enables users, in particular, enterprises to send sensitive information over text message as well as for

performing other financial transactions. For illustrative purposes, the present systems and methods are explained in detail for its application in financial transactions, preferably, communication between a bank and its customers for authentication of a financial transaction initiated by the customer. In other words, the present system and methods are greatly required to keep the text message containing One Time Password (OTP) being sent from the bank to its customer for authentication of an electronic financial transaction more secure and private.
Referring now to Figure 1 is a block diagram (100) illustrating the system architecture of a tamper-proof secure text-message communication for issuing OTPs to its customer (110) by a bank (101). The tamper-proof communication application as disclosed herein is required to be integrated with the enterprise server or bank's premises (101) for generating encrypted text messages. The present application's flexible adaptability also allows it to integrate with any web panel/portal which in turn will generate encrypted text messages for intermediaries including telemarketers, aggregators, resellers, etc.
The present system works as a sniffing application which captures all the packets coming towards and from a Message Controller viz. the bank in the present case, and informs the central application about the event in the Protocol Data Unit (PDU) including submitsm, submitsmresp, deliversm, submitmulti, datasm, etc.
The central application gets all the packets received and store it to the central database. All the participating nodes including the Message Controller will be registered and belong to the registered enterprises and have the unique allocated ID.
In order to run the present application, the client/ bank (101) has to authenticate with the central application using the credentials and on successful authentication, then the application will be able to send encrypted text message containing the OTP (102) within the tamper proof ecosystem. Content of the text message and details like Sender ID and intended recipient's mobile number is encrypted on two layers viz. Complete Packet Encryption (SMPP/HTTP Packets) and Message Content Encryption. This ensures complete SMS data security, prevents tampering and leakage of text message data.
The features of the present invention enables enterprises sending SMS to encrypt the sensitive data including without limitation SMS Content, MSISDN (Mobile Number), Header (SMS

Sender ID)/ Calling Line Identity (CLI), optional parameters related to Telecom DLT (Telecom, Distributed Ledger Technology implemented in India in compliance with TCCCPR 2018 regulation), compliance (including Entity ID, Content ID, Message Payload, Telemarketer ID, etc.), and even complete Protocol Data Unit (PDU) for the different protocol formats like SMPP, HTTP, JSON APIs etc.
Symmetric and/or asymmetric encryption is implemented for securing the text message content, MSISDNs, Header/CLI, optional parameters, PDU, and such keys generated for encryption and decryption will keep on changing at regular interval of time. More particularly, the present tamper-proof secure text message communication application will interact with system kernel space and use standard TCP/IP protocol which will enable application to scan the configured ports and encrypts/decrypts or cipher/decipher the data dynamically.
While pushing the encrypted text message (102) to a plurality of intermediate nodes, content of the said text message (102) and route information (107a) will be sent to the BlockCube server (103) associated with the application. Further, the application will feed in transit information including communication node information, DLR status w.r.t to MSISDN, Header & timestamp to the central database associated with the server (103).
The text message will pass through the plurality of intermediaries viz. telemarketers/ aggregators (104) and (105) in this case, before it is delivered to the intended recipient (110). While passing through each such plurality of intermediary nodes (104,105), route information of each such node (107 b, 107c) will be sent to the BlockCube server (103). When the text message reaches the terminating Short Message Service Center (SMSC) of the intended operator (106) for the delivery to the intended recipient (110), the route information and delivery status (107d) will be sent to the server (103). At the time of delivery of the text message to the SMSC (106), the application decrypts the encrypted text message for the intended recipient (110).
The application as disclosed in the present invention provides a web panel to each of the plurality of on boarded enterprise including the client device, intermediaries such as tele-marketers, tele-aggregators, and mobile service provider/operator with many outstanding features. Such features include providing (a) Node Tracing for each & every text message depicting daily, weekly, monthly, yearly & customized statistics; (b) information showing pool

of trusted, fully untrusted and partially untrusted text messages/ SMSs depending on the route of the SMS; (c) dynamically or manually defined SMS route IDs; and (d) graphical representation of the statistics and analytics on enterprise-wise, tele-marketer/ aggregator -wise, header-wise, mobile operator-wise, route-wise and DLR status-wise.
For the purpose of the above paragraph, 'Trusted SMS' is the one wherein all participating nodes from end to end are identified starting from the enterprise (viz. bank) till the mobile service provider/ operator. 'Fully Untrusted SMS' is one wherein initiation node of the SMS is identified but termination node of the SMS and intermediate nodes are not identified. 'Partially Untrusted' is the one wherein initiation node and termination node are identified but one or more intermediate nodes are unknown/unidentified.
According to another embodiment of the present invention, upon the primary entity/ bank generates the text message containing the time-synchronized OTP towards its intended customer, two-layer encryption will be initiated by the application. When the encrypted text message reaches plurality of participating intermediary nodes, telemarketer/aggregator's node in this case, first level of decryption takes place to provide only such relevant information including Header, MSISDN, Source, etc., to such telemarketer/aggregator, and content of the text message remains encrypted and unreadable. Upon passing through the plurality of intermediaries/ tele-marketers and finally when the text message reaches Short Message Service Centre (SMSC), the application will process both layers of decryption and sends the decrypted message to the target customer. The application further records the complete message flow into BlockChain database associated with it, which will be readily available to the bank to enable traceability. This data will be stored in BlockChain to ensure security and protection. The bank will be able to view the entire journey of the text message from its initiation will it reach the target customer's device, and accordingly take appropriate actions.
Let us see the system (200) as illustrated in Figure 2 wherein the primary participating node/ enterprise/ client (201) and the mobile operator have enrolled for tamper-proof SMS communication application but not intermediate participating nodes/ telemarketer (203). The enterprise/ client (201) has enrolled and installed the present application in its device/ server and sends a text message/ SMS (202) via the regular pipe to a telemarketer (203). The application encrypts the text message/ SMS's prominent fields including Header, MSISDN (a number uniquely identifying a subscription in a Global System for Mobile communications)

and the content before pushing it to the tele-marketer's pipe (203), and share the tracing information (204) to central panel (205) associated with the application comprising BlockChain server and database. Once the text message (202) reaches the tele-marketer (203), the tele-marketer (203) may not be able to view the said encrypted fields of the text message (202). However, the telemarketer can forward the said encrypted text message (202) to a plurality of tele-marketers in the chain wherein actual fields of the text message are not visible to any of the said plurality of tele marketers. After passing through such plurality of telemarketers and when the text message (202) terminates at a mobile operator node, the text message will be decrypted to its original form (206) and the Short Message Service Centre (SMSC) (207) will deliver the same to handset of the intended recipient/ target's handset (208).
In this above illustration, the complete route of the text-message will be considered as 'Partial Trusted', and the intermediaries (including the plurality of tele-marketers) will be termed as Unknown.
The second illustrative embodiment as shown in Figure 3 explains how the present system (300) encrypts the text message in the same environment wherein a plurality of telemarketer intermediaries (303) is enrolled for the tamperproof text message communication application. The text message/ SMS (302) originates from the primary participating node/ enterprise (301), who has enrolled and installed the present application in its device and flows through the regular pipe to a telemarketer/ a plurality of telemarketer. The application encrypts the text message/ SMS's prominent fields including Header, MSISDN (a number uniquely identifying a subscription in a Global System for Mobile communications) and the content before pushing it to the tele-marketer's pipe, and share the tracing information (304) to central panel (305) associated with the application comprising BlockChain server and database. Once the text message (302) reaches the tele-marketer (303), the text message will be accessed by the system and only customized fields will be decrypted for such plurality of tele-marketers chosen by the primary participating node, and all other fields will remain encrypted. Such partially decrypted text message (306) can be forwarded to a plurality of tele-marketers in the chain wherein actual fields of the text message are not visible to any of the said plurality of tele marketer intermediaries. After passing through all the intermediaries, when the text message (306) terminates at a mobile operator node, the text message will be decrypted to its original form (307) and the Short Message Service Centre (SMSC) (308) will deliver the same to handset of the intended recipient/ target's handset (309).

Accordingly, if all the intermediate Tele-Marketers are enrolled for the present tamper-proof text message, then the entire route will be considered as 'Fully Trusted', and the intermediaries will be termed as Trusted Nodes.
According to yet another embodiment of the present invention, the application facilitates a unique feature of IP Tracing wherein a plurality of participating nodes with unique ID will be tracked through its IP addresses. In Figure 4, for any participating node including the primary entity (401) and the intermediaries (402) to register with the tamper-proof text message communication application, it is required to provide list of IP addresses along with Entity ID & Template ID to be used while transmitting SMS to such plurality of nodes.
Once all such IP addresses are listed, the application is capable of fetching original IP addresses for mapping in the central server (404). Accordingly, the application will block the text message being transmitted at very next node in case of wrong IP address mapping. This unique feature of the present application ensures a seamless transmission of the text message and allowing it to identify untrusted/fake entities (403) to avoid frauds/ duplication of the text message. Further, any misuse of the Entity ID/ Template ID will also be tracked and notified to respective participating node and to the mobile operator through the respective GUI panel (405) of the participating node.

1/ WE CLAIM:

1. A computer-implemented system, comprising: a blockchain central panel including an authentication server and a database, and at least one client computer with unique ID and IP address that includes an application and a data storage device, and one or more hardware processors configured to read instructions from the application to cause the system to perform operations including:
i. Receiving, by the application, a request to authenticate the client with the unique ID to send a text message to an intended recipient through a plurality of intermediate nodes; ii. Encrypting, by the application, all relevant and sensitive information of the text-message including SMS Content, MSISDN (Mobile Number), SMS Sender ID, Calling Line Identity (CLI), and other optional parameters related to Telecom DLT, Entity ID, Content ID, Message Payload, Telemarketer ID and complete Protocol Data Unit; iii. Determining, by the application, if the plurality of intermediate nodes is verified
and authenticated with unique ID and IP address; iv. decrypting, by the authentication server, only the optional parameters of the text
message, if the plurality of intermediate nodes is authenticated; v. Passing on, by the authentication server, the partially decrypted text message to
the plurality of authenticated intermediate nodes; vi. Passing on, by the authentication server, the decrypted text message to the plurality of intermediate nodes, if the plurality of intermediate nodes is not authenticated; vii. Tracing and storing, by the authentication server, route information of each such
transmission of the text message to the plurality of intermediate nodes; viii. decrypting, by the authentication server, the text message completely to deliver it to the intended recipient; ix. tracking, by the authentication server, flow of the text message and sending a report to the client device upon successful transmission to each of the plurality of intermediate nodes and the intended recipient; and x. tracing and mapping, by the authentication server, of IP address of the client device and each of the plurality of participating nodes for identifying fake entities in the environment.

2. The system as claimed in Claim 1, further operable to include blocking transmittal of the text message to the plurality of intermediate nodes if their respective IP addresses are not mapped.
3. The system as claimed in Claim 1, further operable to include providing a list of said plurality of fake entities to client and/or to the plurality of authorized intermediate nodes including mobile operator of the intended recipient.
4. The system as claimed in Claim 1, further operable to include generating such keys for symmetric and asymmetric encryption and decryption, the said keys keep changing at such regular interval of time.
5. The system as claimed in Claim 1, further operable to include enabling the client to view the entire flow of transmittal of the text message on the application web panel.
6. A computer-implemented method, comprising:
xi. Receiving, by a block chain application, a request to authenticate a client with its unique ID to send a text message to an intended recipient through a plurality of intermediate nodes;
xii. Encrypting, by the application, all relevant and sensitive information of the text-message including SMS Content, MSISDN (Mobile Number), SMS Sender ID, Calling Line Identity (CLI), and other optional parameters related to Telecom DLT, Entity ID, Content ID, Message Payload, Telemarketer ID and complete Protocol Data Unit;
xiii. Determining, by the application, if the plurality of intermediate nodes is verified and authenticated with unique ID and its IP address;
xiv. decrypting, by an authentication server, only such optional parameters of the text message, if the plurality of intermediate nodes is authenticated;
xv. Passing on, by the authentication server, such partially decrypted text message to the plurality of authenticated intermediate nodes;
xvi. Passing on, by the authentication server, completely decrypted text message to the plurality of intermediate nodes, if the plurality of intermediate nodes is not authenticated;

xvii. Tracing and storing, by the authentication server, route information of each such
transmission of the text message to the plurality of intermediate nodes; xviii. decrypting, by the authentication server, the text message completely to deliver it to the intended recipient; xix. tracking, by the authentication server, flow of the text message and sending a report to the client device upon successful transmission to each of the plurality of intermediate nodes and the intended recipient; and xx. tracing and mapping, by the authentication server, of IP address of the client device and each of the plurality of participating nodes for identifying fake entities in the environment.
7. The method as claimed in Claim 1, further comprising blocking transmittal of the text message to the plurality of intermediate nodes if their respective IP addresses are not mapped.
8. The method as claimed in Claim 1, further comprising providing a list of said plurality of fake entities to client and/or to the plurality of authorized intermediate nodes including mobile operator of the intended recipient.
9. The method as claimed in Claim 1, further comprising generating such keys for symmetric and asymmetric encryption and decryption, the said keys keep changing at such regular interval of time.
10. The method as claimed in Claim 1, further comprising enabling the client to view the entire flow of transmittal of the text message on the application web panel.

Documents

Application Documents

# Name Date
1 202111027426-STATEMENT OF UNDERTAKING (FORM 3) [18-06-2021(online)].pdf 2021-06-18
2 202111027426-POWER OF AUTHORITY [18-06-2021(online)].pdf 2021-06-18
3 202111027426-FORM 1 [18-06-2021(online)].pdf 2021-06-18
4 202111027426-DRAWINGS [18-06-2021(online)].pdf 2021-06-18
5 202111027426-DECLARATION OF INVENTORSHIP (FORM 5) [18-06-2021(online)].pdf 2021-06-18
6 202111027426-COMPLETE SPECIFICATION [18-06-2021(online)].pdf 2021-06-18