Human-read-only configured e-mail
First Claim
Patent Images
1. A method of configuring an e-mail system, said method comprising:
- a first user generating a message;
encrypting said message using a key word;
taking an image of said key word;
distorting said image of said key word;
wherein said key word has a logical relationship with a related code;
attaching said distorted image of said key word to said encrypted message;
sending said encrypted message along with said attached distorted image and a decryption tool to a second user;
prompting said second user to interpret said attached distorted image;
asking said second user to use said interpreted attached distorted image to come up with said key word and a first code;
said second user entering said first code into said system, using a user interface;
said second user entering said key word into said system, using said user interface;
if said first code is the same as said related code, then decrypting said encrypted message by said decryption tool using said key word; and
if said first code is not the same as said related code, then prompting said second user to interpret said attached distorted image.
1 Assignment
0 Petitions
Accused Products
Abstract
This presentation shows a method to present e-mails to human users only, by encoding the body of the e-mail with a user defined keyword, attaching the distorted image of the keyword to the e-mail and sending it to the intended user. This keyword image is extracted and verified by the user in a CAPTCHA style test on the receive side to authenticate human user participation and then e-mail body is decoded and presented to the intended user.
29 Citations
1 Claim
-
1. A method of configuring an e-mail system, said method comprising:
-
a first user generating a message; encrypting said message using a key word; taking an image of said key word; distorting said image of said key word; wherein said key word has a logical relationship with a related code; attaching said distorted image of said key word to said encrypted message; sending said encrypted message along with said attached distorted image and a decryption tool to a second user; prompting said second user to interpret said attached distorted image; asking said second user to use said interpreted attached distorted image to come up with said key word and a first code; said second user entering said first code into said system, using a user interface; said second user entering said key word into said system, using said user interface; if said first code is the same as said related code, then decrypting said encrypted message by said decryption tool using said key word; and if said first code is not the same as said related code, then prompting said second user to interpret said attached distorted image.
-
Specification