Abstract: Systems and methods for managing (for example, creating, transmitting, delivering, encrypting, storing and the like) secure SMS (short message service), secure messaging over data and secure MMS (multimedia messaging service) communications, wherein a private texting platform on Mobile devices across various operating system (OS) platforms for sending messages (SMS - text content; Messaging over data - text content; MMS- images, videos; documents - all commonly used document formats, audio and media files) securely, privately with ability to track status of messages and thereby providing the user having sender controls, deletion capabilities, group messaging, message archival, secret tagging, user blocking, SPAM controls and condition acceptance before message viewing.
Title of the Invention
"SYSTEMS AND METHODS FOR SECURE MESSAGING SERVICE AND MULTIMEDIA MESSAGING SERVICE"
Technical Field of the Invention:
[001] The present invention relates to relates to systems and methods for a messaging service and multimedia messaging service (MMS) messages in an encrypted and secure manner, privately ultrabliity to track status of messages.
Background of the invention:
[002] Creation, transmission, and delivery of SMS and MMS messages have greatly increased, as supporting mobile devices and networks have proliferated. However, messages are typically unencrypted during at least a portion of transmission and delivery (i.e., messages are not typically encrypted end-to-end), and are thus vulnerable to interception or other undesired access. Additionally, a mobile device may be lost or misplaced and messages and/or other information stored thereon may be accessed or otherwise revealed.
[003] Moreover, existing technologies typically solve parts of the privacy and texting problems. In general, the approaches followed by existing technologies are (i) reactive deletion of all information from a users' mobile device wherein many of the existing solutions possess remote wipe capabilities. But it suffers from two major drawbacks namely -The remote wipe is done AFTER the violation is done / suspected / detected; remote wipe deletes ALL the information from a user's mobile device including important ones. Subset of actions mentioned above - Some existing solutions allow auto deletion of texts based on time. However without FULL control by senders for ALL texts exchanged, the privacy afforded by the product as a whole is incomplete.
[004] Currently, fully encrypted data transfer for complete security of texts exchanged - Data which is exchanged between all our clients and the server are fully encrypted using the best encryption. SMS texts typically have no encryption and there are many technologies which attempHo hack SMS texts and "sniff' information from traffic that is exchanged.
[005] Now a days, most existing technologies do not store and archive texts and hence there is a need to provide an improved private texting platform on mobile device across all operating system platforms for sending messages (SMS, MMS) which are securely, privately with ability to track status of the sent message..
Summary of the Invention:
[006] An object of the present invention is to provide techniques for improving the management of user information in Messaging systems.
[007] It is an object of the present invention to provide a private texting platform on Mobile devices across various operating system (OS) platforms for sending messages (text content; MMS- images, videos; documents - all commonly used document formats, audio and media files) securely, privately with ability to track status of messages.
[008] It is an object of the present invention, to provide the user having sender controls, deletion capabilities, group messaging, message archival, secret tagging, user blocking, SPAM controls and condition acceptance before message viewing.
[009] It is an object of the present invention, to provide a proactive sender controls for texts exchanged between two users, wherein remote deletion capabilities for every text sent by user; setting time based deletion for texts sent; setting conditions for viewing of messages by the recipient; setting footnotes for a particular conversation or for all conversations.
[0010] It is an object of the present invention, to provide a reactive sender controls for texts already exchanged between two users.
[0011] It is an object of the present invention, to provide secure and encrypted communications between server and client and server and website, wherein communication between all mobile clients with the server and between the website and the server secured with -des3 2048 bit encryption.
[0012] It is an object of the present invention, to provide an enhanced text organization capability, wherein tagging of texts automatically to segregate automatic texts like SMS; tagging of texts automatically to segregate texts according to users or importance; tagging of texts to hide the texts from normal inbox view; PIN based showing of texts hidden by the mechanism above.
[0013] It is an object of the present invention, to provide privacy protection capabilities, wherein the mechanism prevents inadvertent sending of texts at inappropriate times of the day; inappropriate access to texting inbox - protection by password; disallowing download of images / attachments associated with an image to prevent misuse; identification of users by phone numbers from their address book for sending texts; creating auto-generated numbers for users which they can share instead of their real phone numbers for text communication (number masking) and selective blocking of texts from a user; marking texts and text types as spam.
[0014] It is an object of the present invention, to provide archival of texts on server, wherein all users' texts are archived on the server for future retrieval; client deleted texts (+Delete) are also archived for retrieval for specific requests; and users can view, edit and delete all texts stored on the server on the client and on the browser.
[0015] It is an object of the present invention, to provide a control of internal texting communications by enterprises, wherein internal monitoring of texts that flow through the system to identify corporate policy violations; browser based management of users (adding, deletion, payments); dashboard based escalation of company policy violations; and remote deletion of all exchanged texts from employees mobile devices.
[0016] It is an object of the present invention, to provide parental controls on texting there by provides advantages of monitoring inappropriate usage of texts for minors; escalation of possible misuse to parents; browser based management of family members (adding, deletion, payments).
[0017] It is an object of the present invention, to provide an encrypted messaging communication between server and client for enabling secure messaging delivery even for non-data enabled phones, wherein use a secure Plustxt API for sending the message content + user number over encrypted http:// channel to our server, where the server receives the data, decrypts it and applies SMS encryption logic, and further the server then sends the encrypted SMS to the phone number and the phone receives the SMS -Plustxt application intercepts it and the API decrypts the data and shows it as a normal message in the Inbox (with controls)
[0018] It is an object of the present invention, to provide a multi lingual messaging using transliteration, wherein the user choses the language in language settings and the user starts typing a word and the application automatically suggests the closest phonetic matches from the chosen language and suggests the options, further the user may choose the suggested language option or an English or a cross lingual as well, further the same cross language messaging can be used as response to SMS as well.
[0019] Some of the objects of the invention having been stated hereinabove, other objects will be evident as the description proceeds, when taken in connection with the accompanying drawings as best described herein below.
Brief Description of the Drawings:
[0020] The advantages and features of the present invention will become better understood with reference to the following more detailed description and claims taken in conjunction with the accompanying drawings, in which like elements are identified with like symbols, and in which:
[0021] FIG. 1 is illustrating, among other things, an example of an environment in which various embodiments may operate and various examples of systems of managing information and/or messages for a number of users;
[0022] FIG. 2 shows a schematic view of the structure of the sender controls for texts exchanged between the users according to the present invention;
[0023] FIG. 3 shows a schematic view of the structure of enhanced text organization capabilities according to the present invention;
[0024] FIG. 4 shows a, schematic view of the structure of hidden tags associated with conversations according to the present invention;
[0025] FIG. 5 shows a schematic view of the structure of enterprise control over the text users according to the present invention;
Detailed Description of the Invention:
[0026] The present disclosure provides, among other things, a number of embodiments of systems and methods for managing short messaging service (SMS) messages, messages interchanged over data and multimedia messaging service (MMS) messages in a secure manner. While various embodiments are described in sufficient detail to enable those skilled in the art to practice the invention, it should be understood that other embodiments may be realized and that various changes may be made without departing from the spirit and scope of the invention. Thus, the detailed description herein is presented for purposes of illustration only and not of limitation. For example, the steps recited in any of the method or process descriptions may be executed in any order and are not limited to the order presented.
[0027] Moreover, for the sake of brevity, certain sub-components of the individual operating components, conventional data networking, application development and other functional aspects of the systems may not be described in detail herein. Furthermore, the connecting lines shown in the various figures contained herein are intended to represent exemplary functional relationships and/or physical and/or electronic couplings between the various elements. It should be noted that many alternative or additional functional relationships or physical connections may be present in a practical system.
[0028] As used herein, a "mobile device" may be any device configured for transmitting and receiving electronic communications, for example a cellular phone, a satellite phone, a Palm Pilot® device, personal digital assistant (PDA), BlackBerry® device, iPhone®, Android phone, smartphone, desktop computer, laptop computer, tablet computer, netbook, portable device for communication, or the like. Throughout various exemplary embodiments illustrated or discussed in this disclosure, a mobile device may be referred to herein as a "phone" or "mobile phone", but it should be understood that it may have other functionality or be any other type of mobile device.
[0029] Particular embpdiments include methods for authorizing actions using mobile phones. Embodiments may include acts such as receiving from a person having authority to authorize the action, an identification of a phone number for obtaining authorization for the action, and receiving from a person seeking the action a request for authorization of the aciion. Certain embodiments also include acts such as sending a first message through a mobile phone network to the mobile phone, including a description of the action for which authorization is requested, and receiving, from the first mobile phone, a second message, which authorizes the action. Actions that are authorized, in different embodiments, include computer, access, physical access, and financial transactions, as examples. In various embodiments, the phone number may be received through the mobile phone network, through the Internet, through a local signal, or directly from the user, as examples.
[0030] In some embodiments, a user may be able to enter information into a website, or may authorize entry of information into the website by others, which may be transmitted to the phone automatically for storage. In addition, in some embodiments, users may be able to enter information through their phone for transfer to the website server. In various embodiments, third parties, such as airlines, financial institutions such as banks, and the like, may provide information to the website, some or all of which may be transferred to the phone. Further, in some embodiments, certain such information may provide an alert or alarm to the user, for example, regarding important information such as notification of large deposits or withdrawals, changes in flight information, location of children, and the like. In various embodiments, a user may be able to view other information on the phone, on the website, or both, such as, for example, bank account balances, transaction histories, frequent flier miles, credit card bills, automatic deposits and withdrawals, insurance information, warranties, service contracts, and the like.
[0031] FIG.1 illustrates an example of an environment in which various embodiments may operate, and also illustrates various examples of systems, including systems of managing SMS messages in a secure manner. Various embodiments described herein are illustrated for use with a short messaging service (SMS) protocol and for text messaging over data. However, other protocols, for example, a multimedia messaging service (MMS) protocol, an Unstructured Supplementary Service Data (USSD) protocol,
or other messaging protocol, and/or the like may suitably be employed. System 100 is, among other things, an example of a network-based system configured for managing information that is transferred to, transferred from, and/or stored on a mobile device, which is accomplished in many embodiments while maintaining an acceptable level of data security. In the example of system, the client 1 may be a cellular phone, a satellite phone, personal digital assistant (PDA), BlackBerry® device, iPhone®, smartphone, wherein the client creates an offline store to sync and store messages through application server requests and retrieves new data periodically. Additionally, received push messages and refreshes the local/offline store on-demand, where the GUI interfaces with the offline data store as well as the application servers directly, a Load balancer 2 is used for load balancing of the application server; a SQL database or similar database 3 (Redundant data store and DATABASE) is used to stores messages and account information and database stores the attachments and processed preview items for each media, XMPP based clients are used for communicating to these services; an application server 4 is used which contains multiple instances of servers as the application server and is horizontally scalable, where instances can be added on need basis depending on the load and only load balancing is taken care of by ELB, hence to support fail over our application is stateless; a notification server 5, wherein it comprises multiple instances of servers running notification services and it communicates with the Queuing / Message service and notification services of different mobile platforms to deliver push notifications to clients and is horizontally scalable and more machines can be added on-demand basis; a media processing unit 6, wherein it comprises multiple instances of servers running media processing to extract previews from the media and it communicates with the Queuing / Message service and Database to process and store media and is horizontally scalable and more machines can be added on-demand basis; a data store 7 stores logs of all our application, web servers, application servers and other events related to our system in specific and the host system in general; an queuing service 8, wherein the application servers put push notification and media process requests in queuing service and the notification servers and Media Processor Servers receive the messages and perform their task; a Push API 9 where it is provided by different mobile vendors for push notification; a miscellaneous device 10, wherein SMS services are provided to deliver few important messages over SMS and SMTP services are provided to send important emails to the users.
[0032] FIG.2 shows a schematic view of the structure of the sender controls for texts exchanged between the users according to the present invention; wherein the user has control over check to prevent forwarding of texts; check to prevent downloading of texts; time based control for auto deletion of text; option to add custom footnotes to texts; option to add condition for viewing a text message.
[0033] FIG. 3 shows a schematic view of the structure of enhanced text organization capabilities according to the present invention; wherein the system generated tags applied to texts and the user generated tags applied to texts.
[0034] FIG. 4 shows a schematic view of the structure of hidden tags associated with conversations according to the present invention; wherein the viewing of hidden tags protected by a PIN / password and appropriate texts are shown only when PIN / password is given a public group communicating through Push to subscribers and option for user to send from masked Plustxt number to recipients (applicable for
individual senders, group senders and Public groups).
[0035] FIG. 5 shows a schematic view of the structure of enterprise control over the text users according to the present invention describes a enterprise dashboard for monitoring and adding/ deleting subscribers.
[0036] Benefits, other advantages, and solutions to problems have been described herein with regard to specific embodiments. However, the benefits, advantages, solutions to problems, and element(s) that may cause benefit, advantage, or solution to occur or become more pronounced are not to be construed as critical, required, or essential features or elements of the claims. Reference to an element in the singular is not intended to mean "one and only one" unless explicitly so stated, but rather "one or more." As used herein, the terms "comprises", "comprising", or a variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
[0037] Further, no element described herein is required for practice unless expressly described as "essential" or "critical". Moreover, those skilled in the art will recognize that changes and modifications may be made to the exemplary embodiments without departing from the scope of the present invention. Thus, different embodiments may include different combinations, arrangements and/or orders of elements or processing steps described herein, or as shown in the drawing figures. For example, the various components, elements or process steps may be configured in alternate ways depending upon the particular application or in consideration of cost. These and other changes or modifications are intended to be included within the scope of the present invention, as set forth in the following claims.
CLAIMS
1/We claim:
1. An arrangement provided for delivering communication messages in an encrypted and secure manner in a communication system the arrangement comprising:
- a graphical user interface (GUI) adapted to handle different types of messages, each messaging server being adapted for handling specific message type;
- a common application server along with a common data store adapted for storing all applications, web servers which acts as a host unit;
- a queuing server adapted to put push notifications and media process requests;
- a processing unit adapted to extract previews from the messages and communicates the same with the queuing server;
- a notification server adapted to communicate with queuing or message server to provide notifications.
- invoking the notification server to deliver the message.
2. The arrangement according to claim 1, wherein the messages are associated with hidden tags, wherein the viewing of the hidden tags protected by a PIN/ Password based on the priority set by sender.
3. The arrangement according to claim 1, wherein the message is Short Message Service (SMS), Multi-media Message Service (MMS) message or any other type of message transmitted over a mobile communications network.
4. The arrangement according to claim 1, wherein the message carries a control part comprises one or more of the following: a notification control command, a forwarding control command, an archiving control command, a reply to receiver control command.
5. The arrangement according to claim 1, wherein each command has at least one associated control parameter.
6. The arrangement of according to claim 1, wherein the message content is disregarded based on the pre-configuration of communication system.
7. The arrangement of according to claim 1, wherein the communication system can be a cellular phone, a satellite phone, a palm pilot device, a personal digital assistance PDA device, a smartphone; a mobile phone; a tablet ; an android phone ; a windows based phone or Mac based phone.
8. A method of delivering communication messages in an encrypted and secure manner in a communication system, wherein the communication system sends message from one to another communication device by using a graphical user interface (GUI) adapted to handle different types of messages, each messaging server being adapted for handling specific message type, the method comprising the steps of
- storing all applications, web servers which acts as a host unit in a common application server along with a common data store;
- queuing a put push notifications and media process requests by a queuing server;
- extracting previews from the messages and communicating the same with a processing unit and the queuing server;
- communicating with the queuing or message server to provide notifications from notification server;
- delivering the message by invoking the notification server to deliver the message.
9. The method of delivering communication messages according to claim 8, wherein the messages are associated with hidden tags, wherein the viewing of the hidden tags protected by a PIN/ Password based on the priority set by sender.
10. The method according to claim 8, wherein the message is Short Message Service (SMS), Multi-media Message Service (MMS) message or any other type of message transmitted over a mobile communications network.
11. The method according to claim 1, wherein the message carries a control part comprises one or more of the following: a notification control command, a forwarding control command, an archiving control command, a reply to receiver control command.
12. The method according to claim 1, wherein each command has at least one associated control parameter.
13. The method of according to claim 1, wherein the message content is disregarded based on the pre-configuration of communication system.
14. The method of according to claim 1, wherein the communication system can be a cellular phone, a satellite phone, a palm pilot device, a personal digital assistance PDA device, a smartphone; a mobile phone; a tablet ; an android phone ; a windows based phone or Mac based phone.
| # | Name | Date |
|---|---|---|
| 1 | 4257-CHE-2012 ABSTRACT 09-10-2013.pdf | 2013-10-09 |
| 1 | Power of Authority.pdf | 2012-10-16 |
| 2 | Form-5.pdf | 2012-10-16 |
| 2 | 4257-CHE-2012 CLAIMS 09-10-2013.pdf | 2013-10-09 |
| 3 | Form-3.pdf | 2012-10-16 |
| 3 | 4257-CHE-2012 CORRESPONDENCE OTHERS 09-10-2013.pdf | 2013-10-09 |
| 4 | Form-1.pdf | 2012-10-16 |
| 4 | 4257-CHE-2012 DESCRIPTION (COMPLETE) 09-10-2013.pdf | 2013-10-09 |
| 5 | Drawings.pdf | 2012-10-16 |
| 5 | 4257-CHE-2012 DRAWINGS 09-10-2013.pdf | 2013-10-09 |
| 6 | 4257-CHE-2012 POWER OF ATTORNEY 02-09-2013.pdf | 2013-09-02 |
| 6 | 4257-CHE-2012 FORM-2 09-10-2013.pdf | 2013-10-09 |
| 7 | 4257-CHE-2012 POWER OF ATTORNEY 09-10-2013.pdf | 2013-10-09 |
| 7 | 4257-CHE-2012 ASSIGNMENT 02-09-2013.pdf | 2013-09-02 |
| 8 | 4257-CHE-2012 FORM-6 02-09-2013.pdf | 2013-09-02 |
| 8 | 4257-CHE-2012 CORRESPONDENCE OTHERS 02-09-2013.pdf | 2013-09-02 |
| 9 | 4257-CHE-2012 FORM-6 02-09-2013.pdf | 2013-09-02 |
| 9 | 4257-CHE-2012 CORRESPONDENCE OTHERS 02-09-2013.pdf | 2013-09-02 |
| 10 | 4257-CHE-2012 ASSIGNMENT 02-09-2013.pdf | 2013-09-02 |
| 10 | 4257-CHE-2012 POWER OF ATTORNEY 09-10-2013.pdf | 2013-10-09 |
| 11 | 4257-CHE-2012 POWER OF ATTORNEY 02-09-2013.pdf | 2013-09-02 |
| 11 | 4257-CHE-2012 FORM-2 09-10-2013.pdf | 2013-10-09 |
| 12 | Drawings.pdf | 2012-10-16 |
| 12 | 4257-CHE-2012 DRAWINGS 09-10-2013.pdf | 2013-10-09 |
| 13 | Form-1.pdf | 2012-10-16 |
| 13 | 4257-CHE-2012 DESCRIPTION (COMPLETE) 09-10-2013.pdf | 2013-10-09 |
| 14 | Form-3.pdf | 2012-10-16 |
| 14 | 4257-CHE-2012 CORRESPONDENCE OTHERS 09-10-2013.pdf | 2013-10-09 |
| 15 | Form-5.pdf | 2012-10-16 |
| 15 | 4257-CHE-2012 CLAIMS 09-10-2013.pdf | 2013-10-09 |
| 16 | Power of Authority.pdf | 2012-10-16 |
| 16 | 4257-CHE-2012 ABSTRACT 09-10-2013.pdf | 2013-10-09 |