| United States Patent Application |
20210321261
|
| Kind Code
|
A1
|
|
BERNARDI; ROBERT
|
October 14, 2021
|
METHODS FOR A SECURE MOBILE TEXT MESSAGE AND OBJECT SHARING APPLICATION
AND SYSTEM
Abstract
The invention described herein is directed to a secure text messaging and
object sharing mobile application that provides encryption, digital
rights management (DRM) of the text and of the attachments, the
capability of sending SMS, RCS, MIMS, IM or blockchain communications,
the capability of attaching documents, photos and so forth, the
capability of interfacing with a user's contacts application, and that
operates in both Android and iOS environments. The secure text messaging
and object sharing mobile application connects to DRM cloud service, and
also connects to second secure text messaging and object sharing mobile
app thru a P2P network that provides SMS, RCS, MMS, IM, and/or Blockchain
communications. The invention also includes systems and methods related
to the same.
| Inventors: |
BERNARDI; ROBERT; (MCLEAN, VA)
|
| Applicant: | | Name | City | State | Country | Type | AVILA TECHNOLOGY, LLC | TYSONS | VA | US
| | |
| Family ID:
|
1000005407340
|
| Appl. No.:
|
17/131738
|
| Filed:
|
December 22, 2020 |
Related U.S. Patent Documents
| | | | |
|
| Application Number | Filing Date | Patent Number | |
|---|
| | 16845082 | Apr 10, 2020 | 10873852 | |
| | 17131738 | | | |
|
|
| Current U.S. Class: |
1/1 |
| Current CPC Class: |
G06F 21/10 20130101; H04L 51/046 20130101; H04L 2463/101 20130101; H04L 69/163 20130101; H04W 12/35 20210101; H04W 12/033 20210101; H04L 51/18 20130101; H04L 9/0637 20130101; H04L 51/22 20130101; H04W 12/02 20130101; H04W 4/14 20130101; H04L 67/1074 20130101 |
| International Class: |
H04W 12/30 20210101 H04W012/30; H04W 12/033 20210101 H04W012/033; H04L 12/58 20060101 H04L012/58; H04L 9/06 20060101 H04L009/06; H04W 4/14 20090101 H04W004/14; H04L 29/08 20060101 H04L029/08; H04W 12/02 20090101 H04W012/02; H04L 29/06 20060101 H04L029/06 |
Claims
1. (canceled)
2. (canceled)
3. (canceled)
4. (canceled)
5. (canceled)
6. (canceled)
7. (canceled)
8. (canceled)
9. (canceled)
10. (canceled)
11. (canceled)
12. (canceled)
13. A method, comprising the steps: STEP 1: generating in a DRM Mobile
Text App on a first device a message selected from a text message entry
and a text message file attachment; STEP 2: transmitting the message,
encrypted in transit, to a DRM Cloud Server; STEP 3: rendering, in a DRM
rendering module of said DRM Cloud Server, a DRM restriction on the
message sent to the DRM Cloud Server; STEP 4: saving the DRM restricted
message as a linkable file in storage on the DRM Cloud Server; STEP 5:
generating, by a TCP-IP link module, a TCP-IP link to the linkable file;
STEP 6: forwarding the TCP-IP link, encrypted in transit, to a second
device, having the DRM Mobile Text App installed thereon.
14. A method, comprising the steps: STEP 1: processing, by a DRM
Enforcement module, a DRM permission on a received message containing a
received TCP-IP link to a received DRM restricted message selected from a
text message entry and a text message file attachment; STEP 2: sending an
Alert, by the DRM Enforcement module of a DRM Mobile Text App, encrypted
in transit, to a DRM Cloud Server when a DRM permissions violation is
detected; STEP 3: forwarding the Alert, by a TCP-IP communication module
of said DRM Cloud Server, encrypted in transit, to a DRM Mobile Text App
that assigned the DRM permission; STEP 4: sending an enforcement command
by the DRM Enforcement module of said DRM Mobile Text App, encrypted in
transit, to the DRM Cloud Server; STEP 5: enforcing the DRM permission,
by a Warn or Revoke module of the DRM Cloud Server receiving an
enforcement command, wherein the Warn or Revoke module is configured to
send, by the TCP-IP communication module of the DRM Cloud Server, a
Warning message or a command disabling the TCP-IP link to the linkable
file or both.
15. The method of claim 13, wherein the linkable file is a specific file
and has a specific DRM permission selected from the group consisting of:
a marketing file and a (TCPA) compliant DRM used to restrict SMS
Marketing, a commercial message and a CAN-SPAM Act compliant DRM used to
restrict spam, a financial record and a (GLBA) compliant DRM used to
restrict access and abuse of personal financial information, a credit
record and a (FCRA) compliant DRM used to protect credit reports, credit
card information, (PCI-DSS), a health record and a (HIPAA) compliant DRM
used to protect health status, information, payment information, a
student record and a (FERPA) compliant DRM used to protect student
records, a DMV record and a (DPPA) compliant DRM used to protect DMV
information, a child's information and a (COPPA) compliant DRM used to
protect against collection of a child's personal information, an online
transaction file and a (VPPA) compliant DRM used to protect against
online theft, a subscriber record and a (CCPA) compliant DRM used to
protect subscriber privacy, a personal information file and a (CCPA)
compliant DRM used to protect personal information, a file stored on a
computer and a (CFAA) compliant DRM used to prohibit unauthorized
computer use, a communication file and an (ECPA) compliant DRM used to
prohibit intercepted communications, an identification file and a SOX
compliant DRM used to enforce protection of cybersecurity credentials,
and a DoD or DFAR related file and a DFAR compliant DRM used to protect
unauthorized dissemination of DoD information.
16. The method of claim 13, wherein the linkable file is a Block Chain
transaction.
17. (canceled)
18. (canceled)
19. The method of claim 13, wherein the encryption is standard 256-bit
AES encryption or is quantum computer ready split-key encryption for a
private key located at the DRM Cloud Server and a public key located in
the DRM Mobile Text App on a device.
20. The method of claim 13, wherein the DRM Mobile Text App is configured
to interface with a Contacts App on a device.
21. The method of claim 13, wherein the device is a mobile communication
device having an Android operating system or an iOS operating system.
22. The method of claim 13, wherein the DRM Mobile Text App is configured
to send the message over an encrypted network using a protocol selected
from SMS, RCS, MMS, IM, or Blockchain.
Description
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a continuation of Ser. No. 16/845,082 filed
Apr. 10, 2020 now U.S. Pat. No. 10,873,852, the contents of which are
incorporated herein in their entirety.
BACKGROUND
[0002] The embodiments described herein relate generally to mobile
telephone applications, and in particular mobile applications and methods
for sending and receiving text messages.
[0003] Mobile telephone applications use messaging applications for
sending SMS text messages across a peer to peer cellular telephone
network. A well known problem with such messages is the lack of security
and the lack of sender control over what happens to a text message or a
text message attachment after it has been sent. Most SMS apps do not
allow attachments to be integrated into the body of the text message as a
link (Word, PDF, pics), and do not provide integration with document
storage services, such as Dropbox and OneDrive.
[0004] Some 3.sup.rd party mobile telephone applications, such as WhatsApp
and Signal, have attempted to provide a more secure messaging environment
by offering an encrypted messaging service which encrypts the text
message in transit. The text messages and attachments are not encrypted
at rest or protected in use with encryption and Rights (controls) on the
use of the content by the recipient such as forwarding, copying,
expirations, revocation and printing.
[0005] Accordingly, a need exists for a secure mobile text message and
object sharing application.
SUMMARY
[0006] The embodiments described herein are directed to a secure text
messaging and object sharing mobile application, that provides
encryption, digital rights management (DRM) of the text and of the
attachments, the capability of sending SMS, RCS, MIMS, IM or blockchain
communications, the capability of attaching links to documents including
MS-Word, PDF, and photos, the capability of interfacing with a user's
contacts application, and that operates in both Android and iOS
environments. The secure text messaging and object sharing mobile
application connects to DRM cloud service to locate an attachment, assign
DRM permissions to either the text message, the attachment, or both,
store the DRM-modified attachment, and provide a TCP-IP link to the
mobile app. The mobile app also connects to other SMS-DRM mobile app thru
a P2P network that provides SMS, RCS, MIMS, IM, and/or Blockchain
communications.
[0007] The embodiments described herein are also directed to a system for
secure text messaging and object sharing that comprises a secure DRM
mobile text app, and a secure DRM cloud service.
[0008] The embodiments described herein are also directed to methods
related to the secure text messaging and object sharing mobile
application and system, including methods for connecting two mobile apps
via a P2P network, methods for protecting a text message attachment,
methods for providing a DRM server dedicated to the secure text messaging
and object sharing mobile applications, methods of selecting DRM rights
and restrictions from a menu of DRM rights and restrictions, methods of
selecting encryption from a menu of encryption choices, methods of
providing sender monitoring of compliance by the recipient or receiver of
the text of the DRM protected text messages and attachments, methods of
sending a warning or communication to a recipient of a text message
concerning the DRM compliance, methods of revoking DRM rights by the
sender, methods of removing a DRM protected and encrypted text message or
attachment from a conversation with the receiver, and so forth.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] FIG. 1 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network,
according to an embodiment.
[0010] FIG. 2 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, according to an
embodiment.
[0011] FIG. 3 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, and with a cloud
API connection to a social media account facility, according to an
embodiment.
[0012] FIG. 4 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, with a cloud API
connection to a social media account facility, and with Email to SMS
service, according to an embodiment.
[0013] FIG. 5 is a schematic block diagram showing various components
within the DRM Server and Cloud Service, as well as components needed to
operate the DRM-SMS mobile app within each mobile device.
[0014] FIG. 6A-6G is a series of illustrations showing examples of
screenshots within a DRM-SMS mobile app, according to the invention.
[0015] FIG. 7A-7H is a series of illustrations showing examples of
screenshots within a DRM-SMS mobile app to effect the local,
application-level functions of the invention.
[0016] FIG. 8A-8K is a series of illustrations showing examples of
screenshots within a DRM-SMS mobile app to effect the local,
application-level functions of the invention.
[0017] FIG. 9 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the mobile
app directing the DRM Server to locate the SMS attachment, the mobile app
instructing the DRM Server to assign DRM rights and saving the DRM
modified attachment, creating an Object link, and displaying the Object
link within a text SMS message, according to an embodiment.
[0018] FIG. 10 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
receiving a notification of incoming message, having the DRM-Object Link
presented in the recipient mobile app, clicking the link to obtain access
to the attachment file stored in the DRM Server, and having the mobile
app display or play the DRM protected attachment in the mobile app,
according to an embodiment.
[0019] FIG. 11 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
User A attempting to perform an action beyond what is permitted within
the DRM rights granted by the Sender, the DRM Server generating an Alert
sent to the Sender, and generating a Warning sent to the Recipient,
according to an embodiment.
[0020] FIG. 12 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
User A attempting to perform an action beyond what is permitted within
the DRM rights granted by the Sender, the DRM Server generating an Alert
sent to the Sender, and displaying a menu of DRm enforcement options
available to the Sender, such as a Warning, a revoking of the DRM
permissions for the document, or removing entirely the message from the
Recipient's phone, according to an embodiment.
[0021] FIG. 13 is a flowchart showing an example of steps in one preferred
process, especially obtaining the remote stored Sender document/object,
assigning a set of DRM permissions to the Sender document/object, and
providing the Sender mobile app with a DRM Link, where the DRM Link is
texted to another user, according to an embodiment of the invention.
[0022] FIG. 14 is a flowchart showing an example of steps in one preferred
process, especially the encryption/decryption in the authentication
process for the recipient/receiver, the assignment of DRM access to the
document/file, the ALERT sent to the Sender, the displaying or playing of
the DRM file, and the monitoring of the document to ensure compliance
with the DRM permissions, according to an embodiment of the invention.
[0023] FIG. 15 is a flowchart showing an example of steps in one preferred
process, especially the encryption/decryption in the authentication
process for the recipient/receiver, the assignment of DRM access to the
document/file, the ALERT sent to the Sender, the displaying or playing of
the DRM file, the monitoring of the document to ensure compliance with
the DRM permissions, the system reaction when a DRM violation is
detected, the options provided to the Sender, and the consequences of a
DRM violation to the Recipient, according to an embodiment of the
invention.
[0024] FIG. 16 is a flowchart showing an example of steps in one preferred
process, according to an embodiment of the invention.
[0025] FIG. 17 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for sending an encrypted SMS message.
[0026] FIG. 18 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for providing a secret chat service.
[0027] FIG. 19 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for sending an encrypted SMS message with
secure DRM file attachments.
[0028] FIG. 20 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for providing a secret chat service with
transfer of DRM attachments.
[0029] FIG. 21 is a schematic diagram illustrating various modes of
messaging and the combination provided by the inventive subject matter
described herein.
[0030] FIG. 22 is a diagram illustrating an SMS frame or protocol
description unit containing the ink to the DRM object.
[0031] FIG. 23 is a diagram illustrating industries that depend on secure,
private message and document sharing in relation to the compliance
requirements of federal laws that require secure, private messaging and
document sharing.
[0032] FIG. 24 is a diagram illustrating the compliance requirements of
federal laws that require secure, private messaging and document sharing
in relation to the DRM permissions available from the inventive subject
matter on messaging and document sharing available to achieve compliance
with those laws.
[0033] FIG. 25 is a diagram illustrating use of the inventive subject
matter to facilitate blockchain access to sensitive documents or files.
[0034] FIG. 26 is a diagram illustrating use of the inventive subject
matter to facilitate blockchain access to payment information.
DETAILED DESCRIPTION
[0035] Disclosed embodiments are directed to a secure text messaging and
object sharing mobile application, that provides encryption, digital
rights management (DRM) of the text and of the attachments, the
capability of sending SMS, RCS, MMS, IM or blockchain communications, the
capability of attaching documents, photos and so forth, the capability of
interfacing with a user's contacts application, and that operates in both
Android and iOS environments. The secure text messaging and object
sharing mobile application connects to DRM cloud service, and also
connects to a plurality of networked users thru their mobile app thru a
P2P network that provides SMS, RCS, MIMS, IM, and/or Blockchain
communications.
[0036] The embodiments described herein are also directed to a system for
secure text messaging and object sharing that comprises a secure DRM
mobile text app, and a secure DRM cloud service.
[0037] In some embodiments, the invention comprises a system for secure
text messaging and object sharing in a combined peer to peer (P2P)
network and DRM client-server network, comprising: a DRM Mobile Text App
configured to effect, by a mobile communication device in encrypted
communication with a DRM Cloud Server, assignment of DRM permissions on a
text message entry, to generate a DRM restricted text message entry, said
DRM Mobile Text App configured to send, by a TCP-IP communication module,
the text message entry encrypted in transit from a Sender to the DRM
Cloud Server, said DRM Cloud Server configured to render, by DRM
rendering module, a DRM restriction on the Sender's text message entry
sent to the DRM Cloud Server, and to save the DRM restricted text message
entry as a linkable file in storage on the DRM Cloud Server, said DRM
Cloud Server configured to generate, by a TCP-IP link module, a TCP-IP
link to the linkable file and to forward the TCP-IP link, encrypted in
transit, to the Sender's DRM Mobile Text App, said DRM Mobile Text App
configured to send, by a Peer-to-Peer Messaging module, a message
containing the TCP-IP link, encrypted in transit, from the Sender to a
Recipient mobile device having the DRM Mobile Text App installed thereon,
and said DRM Mobile Text App configured to process, by a DRM Enforcement
module, DRM permissions on a received message containing a received
TCP-IP link to a received DRM restricted text message entry, said DRM
Mobile Text App configured to send an Alert, encrypted in transit, by the
DRM Enforcement module, to the DRM Cloud Server when a DRM permissions
violation is detected, and said DRM Cloud Server forwarding the Alert,
encrypted in transit, by the TCP-IP communication module, to the Sender's
DRM Mobile Text App that assigned DRM permissions, said DRM Mobile Text
App configured to send an enforcement command to the DRM Cloud Server,
encrypted in transit, by the DRM Enforcement module, wherein the DRM
Cloud Server is configured to enforce DRM permissions, by a Warn or
Revoke module receiving the enforcement command, wherein the Warn or
Revoke module is configured to send to the Recipient, by the TCP-IP
communication module, encrypted in transit, a Warning message or a
command disabling the TCP-IP link to the linkable file or both.
[0038] In some embodiments, the invention comprises a secure text
messaging and object sharing mobile application for secure text messaging
and object sharing in a combined peer to peer (P2P) network and DRM
client-server network, comprising: a DRM Mobile Text App configured to
effect, by a mobile communication device in encrypted communication with
a DRM Cloud Server, assignment of DRM permissions on a text message entry
and a text message file attachment or object, to generate a DRM
restricted text message (entry) and a DRM restricted text message file
attachment, said DRM Mobile Text App configured to send, by a TCP-IP
communication module, the text message entry, encrypted in transit, to
the DRM Cloud Server, said DRM Mobile Text App configured to send, by the
TCP-IP communication module, a text message file attachment command,
encrypted in transit, to the DRM Cloud Server, said DRM Cloud Server
configured to retrieve, by a File Attachment module, a text message file
attachment that is associated with the text message file attachment
command, said DRM Cloud Server configured to render, by DRM rendering
module, a DRM restriction on the text message entry and the text message
file attachment sent to the DRM Cloud Server, and to save the DRM
restricted text message entry and the DRM restricted text message file
attachment as a linkable file in storage on the DRM Cloud Server, said
DRM Cloud Server configured to generate, by a TCP-IP link module, a
TCP-IP link to the linkable file and to forward the TCP-IP link,
encrypted in transit, to the DRM Mobile Text App, said DRM Mobile Text
App configured to send, by a Peer-to-Peer Messaging module, a message
containing the TCP-IP link, encrypted in transit, to a Recipient mobile
device having the DRM Mobile Text App installed thereon, and said DRM
Mobile Text App configured to process, by a DRM Enforcement module, DRM
permissions on a received message containing a received TCP-IP link to a
received DRM restricted text message entry and a received DRM restricted
text message file attachment, said DRM Mobile Text App configured to send
an Alert, by the DRM Enforcement module, encrypted in transit, to the DRM
Cloud Server when a DRM permissions violation is detected, and said DRM
Cloud Server forwarding the Alert, by the TCP-IP communication module,
encrypted in transit, to the DRM Mobile Text App that assigned DRM
permissions, said DRM Mobile Text App configured to send an enforcement
command, encrypted in transit, to the DRM Cloud Server, by the DRM
Enforcement module, wherein the DRM Cloud Server is configured to enforce
DRM permissions, by a Warn or Revoke module receiving the enforcement
command, wherein the Warn or Revoke module is configured to send, by the
TCP-IP communication module, sending a Warning message or a command
disabling the TCP-IP link to the linkable file or both.
[0039] Any of the systems or devices described herein can use encryption
that is standard 256-bit AES encryption or is split-key encryption.
[0040] Any of the systems or devices described herein can include a DRM
mobile text app is configured to interface with a contacts app on the
mobile communication device.
[0041] Any of the systems or devices described herein can use an Android
operating system or an iOS operating system.
[0042] Any of the systems or devices described herein can provide wherein
the first mobile communication having a DRM mobile text app is configured
to connect to DRM cloud service and to connect to a second mobile
communication device having a second DRM mobile text app thru a P2P
network, wherein the P2P network is selected from SMS, RCS, MIMS, IM, or
Blockchain.
[0043] In another preferred embodiment, the invention includes a system
for secure text messaging and object sharing system, comprising: (i) a
DRM Mobile Text App, (ii) a DRM Cloud Server, wherein the DRM Mobile Text
App configured to effect, by a mobile communication device in encrypted
communication with the DRM Cloud Server, assignment of DRM permissions on
a text message entry, to generate a DRM restricted text message entry,
said DRM Mobile Text App configured to send, by a TCP-IP communication
module, the text message entry to the DRM Cloud Server, said DRM Cloud
Server configured to render, by DRM rendering module, a DRM restriction
on the text message entry sent to the DRM Cloud Server, and to save the
DRM restricted text message entry as a linkable file in storage on the
DRM Cloud Server, said DRM Cloud Server configured to generate, by a
TCP-IP link module, a TCP-IP link to the linkable file and to forward the
TCP-IP link to the DRM Mobile Text App, said DRM Mobile Text App
configured to send, by a Peer-to-Peer Messaging module, a message
containing the TCP-IP link to another mobile device having the DRM Mobile
Text App installed thereon, and said DRM Mobile Text App configured to
process, by a DRM Enforcement module, DRM permissions on a received
message containing a received TCP-IP link to a received DRM restricted
text message entry, said DRM Mobile Text App configured to send an Alert,
by the DRM Enforcement module, to the DRM Cloud Server when a DRM
permissions violation is detected, and said DRM Cloud Server forwarding
the Alert, by the TCP-IP communication module, to the DRM Mobile Text App
that assigned DRM permissions, said DRM Mobile Text App configured to
send an enforcement command to the DRM Cloud Server, by the DRM
Enforcement module, wherein the DRM Cloud Server is configured to enforce
DRM permissions, by a Warn or Revoke module receiving the enforcement
command, wherein the Warn or Revoke module is configured to effect, by
the TCP-IP communication module, sending a Warning message or disabling
the TCP-IP link to the linkable file or both.
[0044] In yet another embodiment, the invention includes a system for
secure text messaging and object sharing system, wherein the DRM Cloud
Server is configured to assign DRM permissions on both a text message
entry and a text message file attachment, to generate a DRM restricted
text message entry and a DRM restricted text message file attachment,
wherein said DRM Mobile Text App is configured to send, by the TCP-IP
communication module, a text message file attachment command to the DRM
Cloud Server, wherein said DRM Cloud Server is configured to retrieve, by
a File Attachment module, a text message file attachment that is
associated with the text message file attachment command, wherein said
DRM Cloud Server is configured to render, by DRM rendering module, a DRM
restriction on both the text message entry and the text message file
attachment sent to the DRM Cloud Server, and to save the DRM restricted
text message entry and the DRM restricted text message file attachment as
a linkable file in storage on the DRM Cloud Server, and wherein said DRM
Mobile Text App configured to process, by a DRM Enforcement module, DRM
permissions on a received message containing a received TCP-IP link to a
received DRM restricted text message entry and a received DRM restricted
text message file attachment.
[0045] In some embodiments the invention is directed to a method of
assigning DRM permissions from a menu of DRM permission in a secure text
messaging and object sharing mobile application, comprising the steps:
[0046] STEP 1: generating in said DRM Mobile Text App a text message
entry;
[0047] STEP 2: transmitting the text message entry to the DRM Cloud
Server;
[0048] STEP 3: rendering, in the DRM rendering module of said DRM Cloud
Server, a DRM restriction on the text message entry sent to the DRM Cloud
Server;
[0049] STEP 4: saving the DRM restricted text message entry as a linkable
file in storage on the DRM Cloud Server;
[0050] STEP 5: generating, by the TCP-IP link module, a TCP-IP link to the
linkable file;
[0051] STEP 6: forwarding the TCP-IP link to the DRM Mobile Text App;
[0052] STEP 7: sending, by the Peer-to-Peer Messaging module in the DRM
Mobile Text App, a message containing the TCP-IP link to another mobile
device having the DRM Mobile Text App installed thereon.
[0053] In some embodiments the invention is directed to a method of
enforcing DRM permissions in a secure text messaging and object sharing
mobile application, comprising the steps:
[0054] STEP 1: processing, by the DRM Enforcement module, DRM permissions
on a received message containing a received TCP-IP link to a received DRM
restricted text message entry and a received DRM restricted text message
file attachment;
[0055] STEP 2: sending an Alert, by the DRM Enforcement module of the DRM
Mobile Text App, to the DRM Cloud Server when a DRM permissions violation
is detected;
[0056] STEP 3: forwarding the Alert, by the TCP-IP communication module of
said DRM Cloud Server, to a DRM Mobile Text App that assigned DRM
permissions;
[0057] STEP 4: sending an enforcement command by the DRM Enforcement
module of said DRM Mobile Text App to the DRM Cloud Server;
[0058] STEP 5: enforcing DRM permissions, by the Warn or Revoke module of
the DRM Cloud Server receiving an enforcement command, wherein the Warn
or Revoke module is configured to effect sending, by the TCP-IP
communication module of the DRM Cloud Server, a Warning message or
disabling the TCP-IP link to the linkable file or both.
[0059] The embodiments described herein are also directed to methods
related to the secure text messaging and object sharing mobile
application and system, including methods for connecting two mobile apps
via a P2P network, methods for protecting a text message attachment,
methods for providing a DRM server dedicated to the secure text messaging
and object sharing mobile applications, methods of selecting DRM rights
and restrictions from a menu of DRM rights and restrictions, methods of
selecting encryption from a menu of encryption choices, methods of
providing sender monitoring of compliance by the recipient/receiver of
the text of the DRM protected attachments, methods of sending a warning
or communication to a recipient/receiver of a text message concerning the
DRM compliance, methods of revoking DRM rights by the sender, methods of
removing a DRM protected and encrypted text message or attachment from a
conversation with the recipient/receiver, and so forth.
[0060] Any of the embodiments of the DRM Server and Mobile application
invention described herein may comprise wherein the linkable file is a
Block Chain transaction.
[0061] The terminology used herein is for the purpose of describing
particular embodiments only and is not intended to limit the full scope
of the claims. Unless defined otherwise, all technical and scientific
terms used herein have the same meanings as commonly understood by one of
ordinary skill in the art. Nothing in this disclosure is to be construed
as an admission that the embodiments described in this disclosure are not
entitled to antedate such disclosure by virtue of prior invention.
[0062] As used herein, the singular forms "a", "an" and "the" are intended
to include the plural forms as well, unless the context clearly indicates
otherwise. With respect to the use of substantially any plural and/or
singular terms herein, those having skill in the art can translate from
the plural to the singular and/or from the singular to the plural as is
appropriate to the context and/or application. The various
singular/plural permutations may be expressly set forth herein for sake
of clarity.
[0063] In general, terms used herein, and especially in the appended
claims (e.g., bodies of the appended claims) are generally intended as
"open" terms (e.g., the term "including" should be interpreted as
"including but not limited to," the term "having" should be interpreted
as "having at least," etc.). Similarly, the terms "comprises" and/or
"comprising," when used in this specification, specify the presence of
stated features, integers (or fractions thereof), steps, operations,
elements, and/or components, but do not preclude the presence or addition
of one or more other features, integers (or fractions thereof), steps,
operations, elements, components, and/or groups thereof. As used in this
document, the term "comprising" means "including, but not limited to."
[0064] As used herein the term "and/or" includes any and all combinations
of one or more of the associated listed items. It should be understood
that virtually any disjunctive word and/or phrase presenting two or more
alternative terms, whether in the description, claims, or drawings,
should be understood to contemplate the possibilities of including one of
the terms, either of the terms, or both terms. For example, the phrase "A
or B" will be understood to include the possibilities of "A" or "B" or "A
and B."
[0065] All ranges disclosed herein also encompass any and all possible
subranges and combinations of subranges thereof unless expressly stated
otherwise. Any listed range should be recognized as sufficiently
describing and enabling the same range being broken down into at least
equal subparts unless expressly stated otherwise. As will be understood
by one skilled in the art, a range includes each individual member.
[0066] The term "text" or "text message" or SMS refers, by way of
illustration and without limitation, to the Short Messaging Service,
which is a protocol used for sending messages over wireless networks. SMS
allows for messages of 160 characters in length. The SMS file is a
protocol description unit (PDU) that contains multiple subcomponents of
information, including length of Short Message Center (SMC), type of SMC,
a delivery code, length of address, type of sender address, sender
number, protocol ID, data encoding scheme, time stamp, SMS length, and
SMS message. As used herein the DRM permissions may be rendered within
the PDU. In one embodiment, the DRM permissions can be rendered within
the SMS message portion itself.
[0067] MMS refers to multimedia messaging service and is a way to send
multimedia, video, photos, audio, between capable mobile devices.
[0068] The term "DRM" or Digital Rights management" refers, by way of
illustration only and without limitation to technologies used for the
protection of digital content, typically photos, documents, audio files,
audiovisual files, and other objects that can be stored on a computer and
transmitted electronically. As used herein, DRM refers to permission or
restrictions placed within a header or made part of a file, especially a
text message or a file attachment to a text message. The DRM restrictions
can be made to a single device, can limit the number of time a text or an
attachment is opened, can restrict viewing, printing, editing, copying,
pasting, saving, saving as, sharing, macro execution, adding watermarks,
adding other links, adding-deleting-or-modifying identifying information
such as IP, network name, user, organization, or security clearance level
("DRM actions"), including restricting or permitting DRM actions by item,
by date/time, by policy, by person, by clearance, etc.
[0069] Typically, DRM works by encrypting the content before distribution,
and by limiting access to only those end-users who have acquired a proper
license to play or render (display) the content. An end-to-end DRM system
typically comprises three (3) parts: encryption, business-logic and
license-delivery. DRM starts with the encryption of the content. Once the
content is encrypted, a key is required to unlock the content. The
encrypted content can be delivered through any number of delivery
methods. An end-user who desires to play or render the content visits an
e-commerce web site and transacts with the business-logic process,
usually involving one of registration, login, and/or payment; once this
is done, the end-user is issued a license to play the content. The issued
license typically comprises (i) a key (for decrypting the content), (ii)
a set of rights (e.g. play or render exactly once, play for 30 days,
render, or the like), and (iii) with the property that the license is
valid only on the end-user machine to which it is issued. When an
end-user attempts to play or render the DRM protected content, an end
user player/client application enforces the DRM.
[0070] The term "DRM Cloud Service" refers to a cloud-based computer
system that provides encryption, Digital Rights Management (DRM), and the
Sender Alert and Revoke function. Encryption can include any standard
encryption, or can also include split-key encryption. The DRM of the DRM
Cloud Service includes the capability to apply permissions (rights) to
control the viewing of text messages and attachments on the mobile app.
DRM restrictions can include any function including copy, paste, save,
save as, print, forward, expiration, and revocation. The sender alert and
revoke, or "Poof" function provides an automatic notification to the
sender (sender side reporting) of recipient attempted or actual violation
of DRM permissions (rights). The alert and revoke function includes
denying or blocking access to text messages and/or attachments on the
recipient mobile app by expiring the content (or blocking the encrypted
keys). The recipient will experience the revoked SMS or object as an
instantaneous disappearance, or "poof", of the text message or attachment
to which the recipient previously had access.
[0071] By way of illustration, a DRM Cloud Server or DRM Cloud Service can
be a server database with Amazon Web Services (AWS) that captures all
DRM-related transactions from the "Poof" mobile apps. These transactions
can includes the ability to protect, consume, unprotect, log failed
consume, revoke (Poof), modify, print, and failed print.
[0072] In some embodiments, the data is collected by user, by mobile
device, by content, and by policy. This can provide administrators with
the ability to know what data or content is protected, where, by who,
provides easy access to documents, and DRM interaction history, and
provide an easy view of where the DRM content is, on which device.
[0073] In any of these embodiments, the mobile apps are designed for
measuring, auditing, tracking, and providing analytics of data sharing
and data content.
[0074] In any of the embodiments herein, the DRM Cloud Service can be for
individual use, or by enterprises by implementing corporate policy
assignments.
[0075] Any of the DRM Cloud Service embodiments can have an Administrative
interface to provide a comprehensive directory that provides the ability
to oversee and control enterprise/SMB Poofster customers, with both
internal and external users.
[0076] Any of the DRM Cloud Service embodiments here include content
policy options where administrators can create policies such as rules,
templates and water marks for internal and external users.
[0077] Any of the DRM Cloud Service embodiments herein include user
directory management where a user-friendly directory can organize
internal and external users.
[0078] Any of the DRM Cloud Service embodiments herein can include rule
creation to provide the ability to create rules so specific words,
patterns, and phrases in the SMS text messages can triggers automatics
content policy protection without a user's intervention. This can also
provide user or system Alerts and Alert creation, along with
Administrative and client-level reporting, documents revocation (Poof),
and allow/block lists.
[0079] The term "Mobile App" or "secure DRM mobile text app" etc. refers
to a downloadable mobile application, e.g. downloadable from the iOS or
Android app store, that provides encryption of text messages (SMS) and
text attachments, where the attachments are links to docs, pics, video,
and other objects that are uploaded from the Sender device and stored on
the DRM Server, in the DRM Cloud Service. The mobile app applies
permissions (DRM rights) to encrypted SMS and attachments. The mobile app
also provides the automatic notification (ALERT) to the sender when a
recipient attempts to perform a function on the text message or
attachment that is outside of the DRM rights assigned for that text
message or attachment. The mobile app can then provide the Sender with
the opportunity to send an optional Warning of DRM violation to the
recipient. The mobile app also provides the Sender with the capability to
update or modify the DRM permissions for the SMS text or attachment,
including the ability to deny or block access to the SMS text or
attachment for the recipient.
[0080] Any of the Mobile App embodiments herein may include operations to
enable protection, consumption, and editing of documents, PDF, pics, on
both Android and iOS devices.
[0081] Any of the Mobile App embodiments herein may include download
procedures from the Apple store or the Google Play Store or from a
website.
[0082] Any of the Mobile App embodiments herein may include where the Apps
retrieve encryption keys for decrypting documents and text messages,
including enforcement of usage rights.
[0083] Any of the Mobile App embodiments herein may include Workflow
descriptions, and where a user receives an SMS text message in the Poof
app, and where attachments (Word, ppt, pdf) and pictures (jpeg, etc.),
videos, and audio are inserted in the text message as a link. Recipients
can click on the SMS message to open the text link, and the encrypted
text message and file attachment links, if any, are decrypted through a
request made to the DRM Cloud Service.
[0084] Any of the Mobile App embodiments herein may allow for the
consumption/viewing of the SMS text message and of the file attachment
available through the link.
[0085] Any of the Mobile App embodiments herein may include composing,
reply, reply all, forwarding of documents, and pictures.
[0086] Any of the Mobile App embodiments herein may include specific
download rights, and may include user templates.
[0087] Any of the Mobile App embodiments herein may include support to
import, export objects to cloud applications including Dropbox,
SharePoint, OneDrive, Google Drive, Facebook, and Instagram.
[0088] The term "Hybrid P2P Network" refers to any combination of a
Peer-to-Peer (P2P) computing network used for text messaging, with a DRM
client-server cloud service which applies and manages message encryption
and the application of DRM permissions to the text messages and/or
attachments.
[0089] Email to Text Messaging Conversion software refers to downloadable
software for PCs, tablets, and handheld communication devices, that
converst standard emails in Outlook, Gmail, Yahoo mail, etc. and their
attachments (docs, pdf, pics, video) to text messages (SMS) and
attachment links embedded in the text messages. In some embodiments,
Enterprises can install an SMS Gateway API into email applications.
[0090] Document Storage Service refers to an API integration of the
present invention into cloud based document storage services including
Dropbox, Box, OneDrive, Google Drive, etc. to retrieve documents and
other objects stored in the cloud.
[0091] Social Media Service refers to an API integration with social media
services for pictures and videos including Facebook, Instagram, Twitter,
and so forth.
[0092] The term "registration" or "connecting to the DRM server" includes,
without limitation, the process whereby a registration module uses a
gateway to input a secure identification provided by a gateway
administrator; input a short code, a long code, or a phone number (for
example, a number associated with a cellular modem) to facilitate routing
of one or more messages. Furthermore, registration may comprise
exchanging encryption keys between a mobile device and a gateway. For
example, a server public key may be utilized to securely send the
encryption key of module to a mobile device. Registration uses a default
server public key, a unique public key, a short code, and a unique secure
identification code. In this manner, a module is able to contact gateway
to register. This module encrypts the unique secure identification code
and the newly generated public key with the default server public key and
sends the result in an SMS message to the short code. The Gateway
decrypts the SMS message using a default server private key. The Gateway
verifies the unique secure identification code and the phone number
associated with module. If the result is not verified, an error message
is returned to module. If the result is verified, the gateway transmits a
new server public key to module. The Gateway then creates a unique AES
key and sends this key, together with registration information, to the
module via a registration message encrypted with the module public key.
This module decrypts the registration message using the private key. The
Module then transmits a registration acknowledgement message, encrypted
with a unique AES key associated with module, to the Gateway. Upon
receipt of the registration acknowledgement message at the Gateway, the
module is registered with the Gateway.
[0093] Encryption as used herein refers to any standard encryption
technique for encrypting and decrypting SMS text messages, encrypting and
decrypting attachments that are uploaded from the Sender to the DRM
Server, encrypting and decrypting SMS text messages that contain a link
to the attachment(s) stored on the DRM Server, encrypting and decrypting
any alerts or notifications between a sender and a recipient or a user
and a DRM server.
[0094] In some embodiments, split key encryption is preferred. In an
embodiment, the invention can deploy multiple encryption keys designed to
prevent quantum computing attacks on text messages and attachments in
transit or at rest. Split key encryption is a preferred significant
advance over standard 256 bit key based encryption.
[0095] The term "split key encryption" as defined herein includes
cryptographic bit splitting or cryptographic data splitting, is a
technique for securing data over a computer network. The technique
involves encrypting data, splitting the encrypted data into smaller data
units, distributing those smaller units to different storage locations,
and then further encrypting the data at its new location. With this
process, the data is protected from security breaches, because even if an
intruder is able to retrieve and decrypt one data unit, the information
would be useless unless it can be combined with decrypted data units from
the other locations. Cryptographic splitting utilizes a combination of
different algorithms to provide the data protection. A block of data is
first encrypted using the AES-256 government encryption standard. The
encrypted bits are then split into different shares and then each share
is hashed using the National Security Agency's SHA-256 algorithm.
[0096] One application of cryptographic splitting is to provide security
for cloud computing. The encrypted data subsets can be stored on
different clouds, with the information required to restore the data being
held on a private cloud for additional security. Security vendor Security
First Corp uses this technology for its Secure Parser Extended (SPx)
product line.
[0097] Cryptographic splitting can be used with storage area networks. By
splitting the data into different parts of the storage area network, this
technique provided data redundancy in addition to security.
[0098] Cryptographic splitting has also been written about in the context
of more effectively using sensitive corporate information, by entrusting
different individuals within a company (trustees) with different parts of
the information.
[0099] Encryption entails encrypting data with one key and decrypting with
the other key in a public private key pair. When asymmetric key pairs are
generated, the public key is typically used to encrypt and the private
key is used to decrypt.
[0100] In cryptography, secret sharing refers to any methods for
distributing a secret among participant(s), each of which allocates a
share of the secret. The secret can only be reconstructed when the shares
are combined together; individual shares are of no use on their own.
[0101] The embodiments herein, and/or the various features or advantageous
details thereof, are explained more fully with reference to the
non-limiting embodiments that are illustrated in the accompanying
drawings and detailed in the following description. Descriptions of
well-known components and processing techniques are omitted so as to not
unnecessarily obscure the embodiments herein. The examples used herein
are intended merely to facilitate an understanding of ways in which the
embodiments herein may be practiced and to further enable those of skill
in the art to practice the embodiments herein. Accordingly, the examples
should not be construed as limiting the scope of the embodiments herein.
Rather, these embodiments are provided so that this disclosure will be
thorough and complete, and will fully convey the scope of the inventive
concepts to those skilled in the art. Like numbers refer to like elements
throughout.
[0102] Referring now to the FIGURES, FIG. 1 is a schematic diagram of a
system for secure text messaging and object sharing having mobile devices
in communication with a DRM server to establish a link for a shared text
message and text message attachment, that is then shared via a peer to
peer (P2P) network, according to an embodiment.
[0103] FIG. 1 shows a DRM Cloud Service providing end to end encryption,
assignment and modification of DRM permissions (rights), enforcement of
DRM permissions by alerts, warnings, and revocations, and poof capability
to deny access to objects for recipients who violate the DRM. FIG. 1
shows how a pair of mobile communication devices, such as cell phones,
install the DRM mobile text app and provide functions for encryption,
decryption, assigning and modifying DRM permissions, sending of text
messages, sending of text message attachments, and interfacing with the
contacts app of the mobile communication device to generate an DRM mobile
text app specific contact list.
[0104] FIG. 2 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, according to an
embodiment.
[0105] FIG. 2 includes the DRM Cloud Service, the P2P network, and the DRM
mobile text apps of FIG. 1, but also includes one or more APIs to
interface with commercial or private cloud-based document storage
services such as Dropbox, Box, OneDrive, Google Drive, iCloud drive, etc.
[0106] FIG. 3 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, and with a cloud
API connection to a social media account facility, according to an
embodiment.
[0107] FIG. 3 includes the DRM Cloud Service, the P2P network, and the DRM
mobile text apps of FIGS. 1 and 2, and also includes one or more APIs as
in FIG. 2 to interface with commercial or private cloud-based document
storage services such as Dropbox, Box, OneDrive, Google Drive, iCloud
drive, etc., but also includes one or more APIs to interface with Social
Media accounts to access photos, video, documents, and other objects
located within a social media environment.
[0108] FIG. 4 is a schematic diagram of a system for secure text messaging
and object sharing having mobile devices in communication with a DRM
server to establish a link for a shared text message and text message
attachment, that is then shared via a peer to peer (P2P) network, with a
cloud API connection to a cloud based storage facility, and with a cloud
API connection to a social media account facility, and with an Email to
SMS program included therein, according to an embodiment.
[0109] FIG. 4 includes the DRM Cloud Service, the P2P network, and the DRM
mobile text apps, the one or more APIs to interface with commercial or
private cloud-based document storage services, the one or more APIs to
interface with Social Media accounts as illustrated in embodiments shown
in FIGS. 1-3, but also includes an Email to SMS program included therein,
according to an embodiment.
[0110] FIG. 5 illustrates a functional block diagram of a Secure Mobile
Text Messaging and Object Sharing system as a machine in the example form
of computer system, within which a set of instructions for causing the
machine to perform any one or more of the methodologies, processes or
functions discussed herein may be executed. In some examples, the machine
is a plurality of mobile telephone devices in communication with a DRM
Server as described above. The machine operates as both a server or a
client machine in a client-server network environment when each mobile
telephone is connected to the DRM Server in the cloud, and in a
peer-to-peer (or distributed) network environment, when the mobile
telephones are communicating by text message (SMS, RCS, MIMS, IM,
blockchain, etc.). The machine may be any special-purpose machine capable
of executing a set of instructions (sequential or otherwise) that specify
actions to be taken by that machine for performing the functions describe
herein. Further, while only a single machine is illustrated, the term
"machine" shall also be taken to include any collection of machines that
individually or jointly execute a set (or multiple sets) of instructions
to perform any one or more of the methodologies discussed herein.
[0111] Example computer system may include processor, memory, data storage
and communication interface, which may communicate with each other via
data and control bus. In some examples, computer system also includes
display and/or user interface.
[0112] Processor may include, without being limited to, a microprocessor,
a central processing unit, an application specific integrated circuit
(ASIC), a field programmable gate array (FPGA), a digital signal
processor (DSP) and/or a network processor. Processor may be configured
to execute processing logic for performing the operations described
herein. In general, processor may include any suitable special-purpose
processing device specially programmed with processing logic to perform
the operations described herein.
[0113] Memory may include, for example, without being limited to, at least
one of a read-only memory (ROM), a random access memory (RAM), a flash
memory, a dynamic RAM (DRAM) and a static RAM (SRAM), storing
computer-readable instructions executable by processing device. In
general, memory may include any suitable non-transitory computer readable
storage medium storing computer-readable instructions executable by
processing device for performing the operations described herein.
Although one memory device is illustrated in FIG. 5, in some examples,
computer system may include two or more memory devices (e.g., dynamic
memory and static memory).
[0114] Computer system may include communication interface device, for
direct communication with other computers (including wired and/or
wireless communication), and/or for communication with network. In some
examples, computer system may include display device (e.g., a liquid
crystal display (LCD), a touch sensitive display, etc.). In some
examples, computer system may include user interface (e.g., touchscreen,
keyboard, an alphanumeric input device, a cursor control device, etc.).
[0115] In some examples, computer system may include data storage device
storing instructions (e.g., software) for performing any one or more of
the functions described herein. Data storage device may include any
suitable non-transitory computer-readable storage medium, including,
without being limited to, solid-state memories, optical media and
magnetic media.
[0116] Various implementations of the systems and techniques described
here may be realized in digital electronic circuitry, integrated
circuitry, specially designed ASICs (application specific integrated
circuits), computer hardware, firmware, software, and/or combinations
thereof. These various implementations may include implementation in one
or more computer programs that are executable and/or interpretable on a
programmable system including at least one programmable processor, which
may be special or general purpose, coupled to receive data and
instructions from, and to transmit data and instructions to, a storage
system, at least one input device, and at least one output device. These
computer programs (also known as programs, software, Software
applications or code) include machine instructions for a programmable
processor, and may be implemented in a high-level procedural and/or
object-oriented programming language, and/or in assembly/machine
language.
[0117] As used herein, the terms "machine-readable medium"
"computer-readable medium" refers to any computer program product,
apparatus and/or device (e.g., magnetic discs, optical disks, memory,
Programmable Logic Devices (PLDs)) used to provide machine instructions
and/or data to a programmable processor, including a machine-readable
medium that receives machine instructions as a machine-readable signal.
The term "machine-readable signal" refers to any signal used to provide
machine instructions and/or data to a programmable processor. To provide
for interaction with a user, the systems and techniques described here
may be implemented on a computer having a display device for displaying
information to the user and a U.I. touchscreen, stylus pencil, voice
command, keyboard and a pointing device (e.g., a mouse or a trackball) by
which the user may provide input to the computer. Other kinds of devices
may be used to provide for interaction with a user as well; for example,
feedback provided to the user may be any form of sensory feedback (e.g.,
visual feedback, auditory feedback, or tactile feedback); and input from
the user may be received in any form, including acoustic, speech, or
tactile input.
[0118] The systems and techniques described here may be implemented in a
computing system that includes a back end component (e.g., as a data
server), or that includes a middleware component (e.g., an application
server), or that includes a front end component (e.g., a client computer
having a graphical user interface or a Web browser through which a user
may interact with an implementation of the systems and techniques
described here), or any combination of such back end, middleware, or
frontend components. The components of the system may be interconnected
by any form or medium of digital data communication (e.g., a
communication network). Examples of communication networks include a
local area network ("LAN"), a wide area network ("WAN"), and the
Internet. The computing system may include clients and servers. A client
and server are generally remote from each other and typically interact
through a communication network. The relationship of client and server
arises by virtue of computer programs running on the respective computers
and having a client-server relationship to each other. A number of
embodiments have been described. Nevertheless, it will be understood that
various modifications may be made without departing from the spirit and
scope of the invention.
[0119] FIG. 6A-6G is a series of illustrations showing examples of
screenshots within a DRM-SMS mobile app, according to the invention.
[0120] FIG. 6A shows a welcome screen having options to log in or create
an account. FIG. 6A also illustrates a typical location for TOS and
privacy policy statements, along with a radio button to indicate an
agreement with the TOS and privacy policy. FIG. 6B illustrates that a
user can enter a telephone number in order to verify by SMS or other two
factor authentication. FIG. 6C shows an illustration of a screen shot
where a 2FA code can be entered to complete the authentication of the
Mobile App within the system, and to send administrative communications
to the DRM Cloud Server to provision a communications link. FIG. 6D
illustrates a screen shot of a page in the mobile app that provides a
user with the option to access their Contact list to search for, match,
and expand the number of authenticated users in the sender's network.
FIG. 6E illustrates a screen providing an option to enter profile
information including a user name and a user profile photo to associate
with their account. FIG. 6F illustrates a main ready-to-function screen
that provides a radio button to initiate a CHAT or a radio button that
provides access to the mobile app settings pages. FIG. 6G is an
illustration of the functions available within a settings menu.
[0121] FIG. 7A-7H is a series of illustrations showing examples of
screenshots within a DRM-SMS mobile app to effect the local,
application-level functions of the invention.
[0122] FIG. 7A illustrates a screen from the mobile app and shows a mobile
phone communication device having an icon to access the inventive mobile
app. FIG. 7B illustrates a screen from the mobile app and shows a main
ready-to-function screen that provides a radio button to initiate a CHAT
or a radio button that provides access to the mobile app settings pages.
FIG. 7C illustrates a screen from the mobile app and provides a pair of
radio button selectors to choose from finding a person in a contacts list
or inviting a new person. FIG. 7D illustrates a screen from the mobile
app and shows a text message entry box along with an illustration of
radio button selectors to make a text link, attach an Object, and select
DRM. FIG. 7E illustrates a screen from the mobile app and shows a sample
text message entry "what's going on?" and that the Select DRM radio
button has been actuated. FIG. 7F illustrates a DRM screen from the
mobile app and shows some non-limiting options for DRM permissions that
can be selected. Examples include restrictions or permissions on
forwarding (fwd), copying (copy), printing (print), setting an expiry
date for the object or message (expire), or saving the item (save). FIG.
7F shows that, e.g. a printing restriction is chosen by the sender. FIG.
7G illustrates a screen from the mobile app and shows that the DRM radio
button now reflects that DRM is being requested, and that the "make link"
radio button is actuated to send the message to the DRM Cloud Server to
have the DRM rights applied to the item, by creating a new item, no
longer "text message entry" but a "DRM text message entry", by having DRM
restrictions rendered into the header. The DRM Cloud Sever will then save
the DRM restricted item, generate a link to the DRM Cloud-stored
location, and return the link to the DRM Mobile Text App on the mobile
phone for sending to the recipient. Rendering such a protected file
verifies the DRM, and shows or makes the document available subject to
the permissions or restrictions.
[0123] FIG. 8A-8K is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the mobile
app directing the DRM Server to locate the SMS attachment, the mobile app
instructing the DRM Server to assign DRM rights and saving the DRM
modified attachment, creating an Object link, and displaying the Object
link within a text SMS message, according to an embodiment.
[0124] Similar to FIG. 7A-7G, FIG. 8A illustrates a screen from the mobile
app and shows a mobile phone communication device having an icon to
access the inventive mobile app. FIG. 8B illustrates a screen from the
mobile app and shows a main ready-to-function screen that provides a
radio button to initiate a CHAT or a radio button that provides access to
the mobile app settings pages. FIG. 8C illustrates a screen from the
mobile app and provides a pair of radio button selectors to choose from
finding a person in a contacts list or inviting a new person. FIG. 8D
illustrates a screen from the mobile app and shows a text message entry
box along with an illustration of radio button selectors to make a text
link, attach an Object, and select DRM. FIG. 8E illustrates a screen from
the mobile app and shows a sample text message entry "what's going on?"
and that the "ATTACH OBJECT" radio button has been actuated. FIG. 8F
illustrates a "select object" menu where a remote or local file
attachment can be selected by the user from a variety of pre-linked
storage options. FIG. 8F illustrates that e.g. Google drive can be chosen
from a menu of Dropbox, OneDrive, Other, and Local (on the mobile phone
itself). FIG. 8G illustrates a screen that shows access to a view of a
users files available on e.g. Google drive that can be selected as a file
attachment to be send using the DRM Mobile Text App. Fil3.img is
highlighted to show how many types types of file types can be selected,
including Word docs, PDFs, images such as .img, .jpg, .tif, .png, etc.,
video such as .mov, and even audio such as .mp3 files. FIG. 8H
illustrates that the attach Object radio button now reflects that an
object has been chosen for attachment, and that the user is prompted to
chosen DRM permissions or restrictions for the text message entry and the
file attachment for the text message. FIG. 8H shows that the Select DRM
radio button has been actuated. FIG. 8I illustrates a DRM screen from the
mobile app and shows some non-limiting options for DRM permissions that
can be selected. Examples include restrictions or permissions on
forwarding (fwd), copying (copy), printing (print), setting an expiry
date for the object or message (expire), or saving the item (save). FIG.
8J shows that, e.g. a printing restriction is chosen by the sender. FIG.
8K illustrates a screen from the mobile app and shows that the DRM radio
button now reflects that DRM is being requested, and that the "make link"
radio button is actuated to send the message to the DRM Cloud Server to
have the DRM rights applied to the item, by rendering a new item, no
longer "text message entry" but a "DRM text message entry", by having DRM
restrictions rendered into the header. The DRM Cloud Sever will then save
the DRM restricted item, generate a link to the DRM Cloud-stored
location, and return the link to the DRM Mobile Text App on the mobile
phone for sending to the recipient.
[0125] FIG. 9 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the SENDER
writing the outgoing message, sending the attach object command to the
DRM Cloud Server, having the DRM Cloud Server obtain the file attachment
(object) from a remote storage account, assigning DRM, rendering the new
DRM-restricted object, creating the TCP-IP link, forwarding the DRM link
to the sender's mobile phone, and having the DRM-Object Link presented in
the recipient mobile app, according to an embodiment.
[0126] FIG. 10 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
receiving a notification of incoming message, having the DRM-Object Link
presented in the recipient mobile app, clicking the link to obtain access
to the attachment file stored in the DRM Server, and having the mobile
app display or play the DRM protected attachment in the mobile app,
according to an embodiment.
[0127] FIG. 11 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
User A attempting to perform an action beyond what is permitted within
the DRM rights granted by the Sender, the DRM Server generating an Alert
sent to the Sender, and generating a Warning sent to the Recipient,
according to an embodiment.
[0128] FIG. 11 is a schematic sequence diagram showing transmission and
receipt of certain communications of the system, especially the recipient
User A attempting to perform an action beyond what is permitted within
the DRM rights granted by the Sender, the DRM Server generating an Alert
sent to the Sender, and displaying a menu of DRM enforcement options
available to the Sender, such as a Warning, a revoking of the DRM
permissions for the document, or removing entirely the message from the
Recipient's phone "You've been POOF'd", according to an embodiment.
[0129] In one embodiment, the RECIPIENT may acknowledge receipt of the
text. The RECIPIENT may then open the message in accordance with the DRM
restrictions. If the recipient attempts to performs a function that is
not permitted by the DRM restrictions, a warning can be sent to the
RECIPIENT that the object contains DRM restrictions, and that further
attempts to contravene the DRM permissions will result in the text and/or
attachment being blocked or revoked by denying the encryption key to the
RECIPIENT. FIG. 12 then shows a situation where the RECIPIENT has
attempted to violate the DRM restrictions and the SENDER has revoked
access to the text and/or attachment for the RECIPIENT.
[0130] FIG. 13 is a flowchart showing an example of steps in one preferred
process, especially obtaining the remote stored Sender document/object,
assigning a set of DRM permissions to the Sender document/object, and
providing the Sender mobile app with a DRM Link, where the DRM Link is
texted to another user, according to an embodiment of the invention.
[0131] FIG. 14 is a flowchart showing an example of steps in one preferred
process, especially the encryption/decryption in the authentication
process for the receiver, the assignment of DRM access to the
document/file, the ALERT sent to the Sender, the displaying or playing of
the DRM file, and the monitoring of the document to ensure compliance
with the DRM permissions, according to an embodiment of the invention.
[0132] FIG. 15 is a flowchart showing an example of steps in one preferred
process, especially the encryption/decryption in the authentication
process for the receiver, the assignment of DRM access to the
document/file, the ALERT sent to the Sender, the displaying or playing of
the DRM file, the monitoring of the document to ensure compliance with
the DRM permissions, the system reaction when a DRM violation is
detected, the options provided to the Sender, and the consequences of a
DRM violation to the Recipient, according to an embodiment of the
invention.
[0133] FIG. 16 is a flowchart showing an example of steps in one preferred
process, according to an embodiment of the invention.
[0134] 1. SENDER writes text msg in an authenticated DRM-text mobile app,
SENDER selects to attach file/object.
[0135] 2. SENDER selects file/object from Sender Storage in mobile app.
[0136] 3. DRM Server obtains file/object.
[0137] 4. SENDER assigns DRM permissions (rights) to the attachment link
in the DRM-text mobile app.
[0138] 5. DRM Server renders a DRM-protected File/Object, and saves with a
TCP-IP Link.
[0139] 6. SENDER sends encrypted SMS text including the Link to the
DRM-protected File/Object to a RECIPIENT.
[0140] 7. RECIPIENT is notified about the msg, and is authenticated if
already a subscriber, or is offered a free trial use of the DRM-text
mobile app.
[0141] 8. RECIPIENT receives the encrypted text and decrypts the message
in the mobile app.
[0142] 9. RECIPIENT clicks the Link to the DRM-restricted attachment
file/object stored on the DRM Server.
[0143] 10. DRM Server provides the RECIPIENT with the assigned DRM access
to the attachment file/object, where the file is viewed/played remotely
and transmitted to the mobile app or the file is transferred to the
mobile app and viewed/played locally.
[0144] 11. SENDER receives an ALERT if the RECIPIENT attempts to violate
DRM permissions.
[0145] 12. SENDER sends a warning or revokes access by the RECIPIENT to
the DRM-restricted attachment file/object.
[0146] The embodiments described herein are also directed to methods
related to the secure text messaging and object sharing mobile
application and system, including methods for connecting two mobile apps
via a P2P network, methods for protecting a text message attachment,
methods for providing a DRM server dedicated to the secure text messaging
and object sharing mobile applications, methods of selecting DRM rights
and restrictions from a menu of DRM rights and restrictions, methods of
selecting encryption from a menu of encryption choices, methods of
providing sender monitoring of compliance by the receiver of the text of
the DRM protected attachments, methods of sending a warning or
communication to a receiver of a text message concerning the DRM
compliance, methods of revoking DRM rights by the sender, methods of
removing a DRM protected and encrypted text message or attachment from a
conversation with the receiver, and so forth.
[0147] Although the present disclosure may provide a sequence of steps, it
is understood that in some embodiments, additional steps may be added,
described steps may be omitted, and the like. Additionally, the described
sequence of steps may be performed in any suitable order.
[0148] FIG. 17 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for sending an encrypted SMS message. FIG.
17 shows a DRM Cloud Service in encrypted communication with a Sender
mobile device having a mobile text app and a Receiver mobile device
having a mobile text app. The mobile devices send encrypted SMS messages
using an SMS network. Where no DRM is selected, and no 256 AES or split
key encryption is provided, simply sending a text in this fashion
represents the state of the art.
[0149] FIG. 18 is a schematic diagram of the invention as a Mobile Text
App and Cloud Service system for providing a secret chat service. FIG. 18
shows a DRM Cloud Service in encrypted communication with a Sender mobile
device having a mobile text app and a Receiver mobile device having a
mobile text app. The mobile devices send encrypted SMS messages using an
SMS network. In this example, the message is restricted with specific
message rights. These rights include, without limitation, permission or
restrictions on the ability for the text message to: protect, copy,
paste, print, expire, save, save as, forward, edit, and revoke.
[0150] In use, FIG. 18 shows that a Sender will compose a text message.
The Sender will then choose message rights from a menu. The message is
then sent, encrypted in transit, to the DRM Cloud Service, where the
message has the message rights added to the text message file. The newly
created DRM-text message is temporarily stored within the DRM Cloud
Service, a link is created, and the link is sent back to the Sender's
mobile device into the mobile text app of the invention. The link-only
text message is then sent over the SMS network, encrypted in transit, to
a Receiver's mobile device. The Receiver may already be a subscriber to
the DRM Cloud Service or, if not, is invited to download a free install
to set up a free account, in order to receive the link-only text message,
and be able to click open and consume the linked text message from the
Sender that is stored on the DRM Cloud Service. In this example, both the
DRM-mobile device and the mobile-to-mobile connections are encrypted, and
can be 256 AES or split key encryption.
[0151] FIG. 19 is a schematic diagram of the invention as an Mobile Text
App and Cloud Service system for sending an encrypted SMS message with
secure DRM file attachments. FIG. 19 shows a DRM Cloud Service in
encrypted communication with a Sender mobile device having a mobile text
app and a Receiver mobile device having a mobile text app. The mobile
devices send encrypted SMS messages using an SMS network. In this
example, the message is sent with encryption and the attachment (object)
is restricted with specific message rights. These rights include, without
limitation, permission or restrictions on the ability for the attachment
to be: protected, copied, pasted, printed, expired, saved, saved as,
forwarded, edited, and revoked.
[0152] In use, FIG. 19 shows that a Sender will compose a text message.
The Sender will then choose a file attachment (object) to be sent with
the text message. The Sender will then choose object rights from a menu.
A file attachment command is sent, encrypted in transit, to the DRM Cloud
Service, where the DRM Cloud Service is instructed to obtain the file.
The file attachment can be an MS Word document, a PDF, a spreadsheet, a
presentation file, an image/photo, an email message, an attachment from
an email message, a video, an audio file, and so forth. The DRM Cloud
Service assigns the object rights to the retrieved or uploaded file
attachment. The newly created DRM-object is temporarily stored within the
DRM Cloud Service, a link is created, and the link is sent back to the
Sender's mobile device into the mobile text app of the invention. The
link-only text message is then sent over the SMS network, encrypted in
transit, to a Receiver's mobile device. The Receiver may already be a
subscriber to the DRM Cloud Service or, if not, is invited to download a
free install to set up a free account, in order to receive the link-only
text message, and be able to click open and consume the linked object
from the Sender that is stored on the DRM Cloud Service. In this example,
both the DRM-mobile device and the mobile-to-mobile connections are
encrypted, and can be 256 AES or split key encryption.
[0153] FIG. 20 is a schematic diagram of the invention as an Mobile Text
App and Cloud Service system for providing a secret chat service with
transfer of DRM attachments. FIG. 20 shows a DRM Cloud Service in
encrypted communication with a Sender mobile device having a mobile text
app and a Receiver mobile device having a mobile text app. The mobile
devices send encrypted SMS messages using an SMS network. In this
example, both the message and the attachment (object) are restricted with
specific message rights. These rights include, without limitation,
permission or restrictions on the ability for the text message and the
attachment to be: protected, copied, pasted, printed, expired, saved,
saved as, forwarded, edited, and revoked.
[0154] In use, FIG. 20 shows that a Sender will compose a text message.
The Sender will then choose a file attachment (object) to be sent with
the text message. The Sender will then choose message rights and object
rights from a menu. A file attachment command is sent, encrypted in
transit, to the DRM Cloud Service, where the DRM Cloud Service is
instructed to obtain the file. The file attachment can be an MS Word
document, a PDF, a spreadsheet, a presentation file, an image/photo, an
email message, an attachment from an email message, a video, an audio
file, and so forth. The DRM Cloud Service assigns the message rights to
the text message and the object rights to the retrieved or uploaded file
attachment. The newly created DRM-message+object is temporarily stored
within the DRM Cloud Service, a link is created, and the link is sent
back to the Sender's mobile device into the mobile text app of the
invention. The link-only text message is then sent over the SMS network,
encrypted in transit, to a Receiver's mobile device. The Receiver may
already be a subscriber to the DRM Cloud Service or, if not, is invited
to download a free install to set up a free account, in order to receive
the link-only text message, and be able to click open and consume the
linked DRM-message+object from the Sender that is stored on the DRM Cloud
Service. In this example, both the DRM-mobile device and the
mobile-to-mobile connections are encrypted, and can be 256 AES or split
key encryption.
[0155] FIG. 21 is a schematic diagram illustrating various modes of
messaging and the combination provided by the inventive subject matter
described herein.
[0156] As shown in FIG. 21, SMS or Short Message Service is defined as
using 1,120 bits of data (140 bytes @ 8 bits/byte). SMS is sent through
mobile phone network and uses a simplex signal--Y/N acknowledgement. SMS
is not password protected. SMS messages are sent to a Short Message
Service Center (SMSC) as part of a store and forward service. SMS can be
a send and retry process if the message does not immediately go through,
or SMS can be configured as a send using best efforts delivery service
without requiring delivery confirmation.
[0157] SMS message are composed of 160 GSM characters @ 7 bits/GSM
character, or may also be composed as a message having 70 unicode
characters @ 16 bits/Unicode. Messages larger are broken into segments
and are truncated, or Concatenated.
[0158] As shown in FIG. 21, the DRM Server provides an encrypted link to
each device and provides an embedded link to one or more stored objects
that have been modified with DRM permissions and stored temporarily in
the DRM server.
[0159] In contrast, traditional MMS was built for sending pictures but
does not have DRM capability. In MIMS, the data is encoded, and sent to a
cell tower as MMS. The cell tower recognizes the MMS message and notifies
the Multimedia Messaging Service Center (MMSC) for transport.
[0160] Also, in contrast to the inventive subject matter, traditional
Mobile App messages are sent through the internet but do not have DRM
capability. Mobile apps are able to use duplex signaling for signal
acknowledgement and can be password protected.
[0161] Also, in contrast to the inventive subject matter, RCS messaging
uses internet instead of SMS or MMS. RCS sends to an SMS gateway
connected to the internet.
[0162] FIG. 22 is a diagram illustrating an SMS frame or protocol
description unit containing the ink to the DRM object. FIG. 22 shows that
SMS Protocol Description Unit (PDU) is composed of subcomponent segments
consisting typically of: Length of SMC, Type of SMC, Delivery Code,
Length of Address, Type of Sender Address, Sender Number, Protocol ID,
Data encoding scheme, Time stamp, SMS length, and the SMS message which
includes the text of the message, if any, e.g. "you've received a secure
message" as well as a link to a secure message and a link to a
DRM-modified object.
[0163] FIG. 23 is a diagram illustrating industries that depend on secure,
private message and document sharing in relation to the compliance
requirements of federal laws that require secure, private messaging and
document sharing.
[0164] FIG. 23 shows a list of exemplary industries that depending on
Secure, Private Messaging and Document Sharing, including: BANKING,
FINANCIAL, MEDICAL, RETAILER, AIRLINE, TSA BORDER CONTROL, SOCIAL
SECURITY, LAW ENFORCEMENT, MILITARY COMMUNICATIONS, INSURANCE, etc.
[0165] FIG. 23 also shows an exemplary list of Federal Laws requiring
Secure, Private Messaging and Document Sharing, including:
[0166] Telephone Consumer Protection Act (TCPA) 47 USC 227--regulates SMS
Marketing
[0167] CAN-SPAM Act--protects vs. unwanted spam messages and calls
[0168] Gramm Leach Bliley Act (GLBA) 15 USC 6802--protection of personal
information by banks, insurance, financial services
[0169] Fair Credit Reporting Act (FCRA) 15 USC 1681--protects credit
reports, credit card information, credit fraud, comply with Payment Card
Industry Data Security Standard (PCI-DSS)
[0170] Health Information Portability and Accountability Act (HIPAA) 29
USC 1181--protect health status, information, payment information
[0171] Family Education Rights and Privacy Act (FERPA) 20 USC
1232--protects student records
[0172] Drivers Privacy Protection Act (DPPA) 18 USC 2721--protects DMV
information
[0173] Children's Online Privacy Protection.
[0174] FIG. 24 is a diagram illustrating the compliance requirements of
federal laws that require secure, private messaging and document sharing
in relation to the DRM permissions available from the inventive subject
matter on messaging and document sharing available to achieve compliance
with those laws.
[0175] FIG. 24 shows how the inventive subject matter can be used to
facilitate and ensure compliance with the various listed laws requiring
secure private messaging and document sharing. FIG. 24 shows a list of
how the invention can provide compliance with the transmission and
safe-keeping of valuable information for the following laws, including:
[0176] (TCPA) compliant--DRM can be used to restrict SMS Marketing,
[0177] CAN-SPAM Act compliant--DRM can be used to restrict spam,
[0178] (GLBA) compliant--DRM can be used to restrict access and abuse of
personal financial information,
[0179] (FCRA) compliant--DRM can be used to protect credit reports, credit
card information, (PCI-DSS),
[0180] (HIPAA) compliant--DRM can be used to protect health status,
information, payment information,
[0181] (FERPA) compliant--DRM can be used to protect student records,
[0182] (DPPA) compliant--DRM can be used to protect DMV information,
[0183] (COPPA) compliant--DRM can be used to protect against collection of
a child's personal information,
[0184] (VPPA) compliant compliant--DRM can be used to protect against
online theft,
[0185] (CCPA) compliant--DRM can be used to protect subscriber privacy,
[0186] (CCPA) compliant--DRM can be used to protect personal information,
[0187] (CFAA) compliant--DRM can be used to prohibit unauthorized computer
use,
[0188] (ECPA) compliant--DRM can be used to prohibit intercepted
communications
[0189] SOX compliant--DRM can be used to enforce protection of
cybersecurity credentials, and
[0190] DFAR compliant--DRM can be used to protect unauthorized
dissemination of information valuable to the U.S. Department of Defense,
including communications with DoD contractors, DoD personnel, and
communications required to be shared outside of DoD with agencies and
parties having varying security clearances.
[0191] As used herein the term "Block Chain" or "Block Chain technology"
refers to a secure, decentralized, distributed, and oftentimes public,
digital ledger that is used to record transactions across many computers
so that any involved record cannot be altered retroactively, without the
alteration of all subsequent blocks. A "Block" refers to digital
information that includes one or more transactions, each transaction
typically including the date, time, a payload, and a digital signature.
Each Block is typically 1 MB, and so can contain many transactions. A
"Chain" refers to a stacked series of Blocks, attached in chronological
order, with each Block identified by it's own number as well as the
number of the preceding Block. Thus, for example, a recent Block might be
named 615,401/615,400, and the one before it would be named
615,400/615,399. In this way, the chain cannot be tampered with and the
data is secure. Additionally, a copy of the ledger of all blocks is
synchronized and kept by all parties. Thus, no single party can alter the
chain unless it is approved by a consensus of the users. The term
"transaction" refers to the date, time, payload, and ID, with the ID
typically being a public key in a public-private key system. This
information is then run through a hashing algorithm that generates the
information as an alpha-numeric string. For example, in a Secure Hashing
Algorithm (SHA) version 256 (SHA-256), the file contents are coded into a
256-bit length alpha-numeric string, where the string is typically
64-characters in length. Generating this string is a one-way process used
to create a tool that can verify that the file contains what it purports
to contain. Thus, when a Block Chain system hashes a block, it can verify
that the strings are either identical and verified, or that they are
different and thus corrupt. When Block Chain is used for cryptocurrency,
the payload is the amount of funds to transfer. When Block Chain is used
for other applications, the payload can be a link, a document, an image,
etc.
[0192] Referring now to FIG. 25. FIG. 25 is a diagram illustrating use of
the inventive subject matter to facilitate blockchain access to sensitive
documents or files. FIG. 25 shows how a recipient can receive an
encrypted SMS containing a generic notice that a Secure message has been
received. When the recipient clicks the link, the mobile app requests
delivery of encrypted SMS text message. The message can contain, as
illustrated, a link to a sensitive document or object, such as a mortgage
application.
[0193] Other sensitive documents may include, without limitation, an
eBook, music, video, a stock certificate, a stock order/transaction
request, a bond certificate, a bond order/transaction request, a bank
transaction, a health or medical record, a property record or title, a
smart contract, a country of origin authentication for a supply chain
verification, a sensitive government document, a government contract
document, a student record, an insurance document, a retail coupon,
rebate, or receipt, a gift card, and so forth.
[0194] FIG. 25 shows how the sensitive document may be located in a
separate server, such as a Dropbox storage, and that the sender has
chosen to apply DRM restrictions to the sensitive document thus
establishing a DRM-document and a DRM server link. FIG. 25 shows how the
DRM server link may be incorporated into a Block Chain transaction as
part of a Block transaction payload and may include a date, time, and a
user ID. In this non-limiting example, the user ID is a public key.
[0195] FIG. 25 then shows that the Block Chain transaction is transmitted
to the recipient, along with a legend showing that the transaction file
is DRM protected. When the DRM Server technology of the present invention
is used in conjunction with Block Chain technology, the DRM Server may be
programmed to hash the Block containing the transaction to verify the
transaction. FIG. 25 shows that the text and link within the transaction
file can be hashed to obtain the string ending in . . . 184d8.
[0196] In the example shown in FIG. 25, when the recipient receives the
Block Chain transaction file, the DRM restrictions (chosen by the sender)
requires action within a period of 2 minutes, and that the file may not
be forwarded, saved, printed, copied, or captured. The recipient would
then use their Wallet App for this transaction to receive the verified
sensitive document. In this way, the present invention can be used in
combination with Block Chain technology to secure and control the
communication of the Block Chain transaction data. In addition, since the
DRM Server maintains control of link to the file, if a DRM violation
occurs, such as tampering or forwarding the transaction file, the Alert
that is generated and sent to the Sender, can allow the Sender to revoke
the link and cancel the access to the transaction file.
[0197] Referring now to FIG. 26, FIG. 26 is a diagram illustrating use of
the inventive subject matter to facilitate blockchain access to payment
information. FIG. 26 shows how a recipient can receive an encrypted SMS
containing a generic notice that a Secure message has been received. When
the recipient clicks the link, the mobile app requests delivery of
encrypted SMS text message. The message can contain, as illustrated, a
link to a transaction file.
[0198] Transaction files may include transaction information for BitCoin,
Ethereum, XRP, Tether, Bitcoin Cash, as well as any of the other 200+
cryptocurrencies available, see e.g.
https://coinmarketcap.com/all/views/all/.
[0199] FIG. 26 shows how the cryptocurrency transaction information may be
located in a separate server, and that the sender has chosen to apply DRM
restrictions to the transaction file thus establishing a DRM-transaction
document. FIG. 26 shows how the DRM-transaction payload may include a
date, time, amount and a user ID. In this non-limiting example, the user
ID is a public key.
[0200] FIG. 26 then shows that the Block Chain transaction is transmitted
to the recipient, along with a legend showing that the transaction file
is DRM protected. When the DRM Server technology of the present invention
is used in conjunction with Block Chain technology, the DRM Server may be
programmed to hash the Block containing the transaction to verify the
transaction. FIG. 26 shows that the text and link within the transaction
file can be hashed to obtain the string ending in . . . 8eaccb.
[0201] In the example shown in FIG. 26, when the recipient receives the
Block Chain transaction file, the DRM restrictions (chosen by the sender)
requires action within a period of 2 minutes, and that the file may not
be forwarded, saved, printed, copied, or captured. The recipient would
then use their Wallet App for this transaction to receive the verified
transaction (funds). In this way, the present invention can be used in
combination with Block Chain technology to secure and control the
communication of the Block Chain transaction data. In addition, since the
DRM Server maintains control of link to the file, if a DRM violation
occurs, such as tampering or forwarding the transaction file, the Alert
that is generated and sent to the Sender, can allow the Sender to revoke
the link and cancel the access to the transaction file.
Example--POOFster Mobile App
[0202] POOFster is platform agnostic. A user does not need to own the same
brand of phone as the call recipient or be on a specific platform--the
app works with iPhone, Android, and Windows phones. Like any other SMS
messenger, you can initiate a conversation with an individual or a group.
[0203] In any preferred embodiment, the POOFster mobile app allows a user
to share location, broadcast status to contacts, share contacts, set
customized wallpapers and notification alerts, email chat history, use
the camera to shoot photos and videos from within the app, and
simultaneously broadcast messages to multiple contacts. When logged in,
the POOFster app receives messages, and when not logged in, the POOFster
app saves recent messages for when you re-open the app.
[0204] POOFster has a simple interface with chats in text boxes, a
timestamp, and the POOFster app has notifications when a recipient has
viewed the text. POOFster allows a user to establish a status message.
[0205] POOFster can match people in a user's contact list who currently
use the app, to avoid having to manually add contacts. POOFster allows a
user to invite people who don't have POOFster account or who aren't in
your contact list. POOFster allows a user to create groups with up to 256
participants. POOFster allows a user to block contacts within the app
also. The POOFster app allows a user to change the wallpaper background.
POOFster can interface with a user's GPS location for mapping.
[0206] POOFster has a search function that allows a user to search by
phone number, contact name, keyword, or group.
[0207] POOFster has end-to-end encryption, just like Apple's iMessage and
Signal. All text messages flowing through the platform are secured so
that only the sender and the recipient can view them. POOFster cannot
read these messages. The app doesn't store your personal information, and
only people you approve as contacts can message you. In a preferred
embodiment, POOFster uses two-factor authentication.
[0208] POOFster provides a user with control over group messages,
particularly who can add the user to groups.
[0209] While illustrative embodiments have been described herein, the
scope thereof includes any and all embodiments having equivalent
elements, modifications, omissions, combinations (e.g., of aspects across
various embodiments), adaptations and/or alterations as would be
appreciated by those in the art based on the present disclosure. For
example, the number and orientation of components shown in the exemplary
systems may be modified.
* * * * *