Browse Prior Art Database

Deployment of mobile applications using steganography methods

IP.com Disclosure Number: IPCOM000240319D
Publication Date: 2015-Jan-22
Document File: 1 page(s) / 226K

Publishing Venue

The IP.com Prior Art Database

Related People

CAPY, Laurent: INVENTOR

Abstract

This invention is about distribution of mobile applications, with users retrieving and installing the applications through traditional distribution model, and where the administrator of a site where a mobile application is to be deployed doesn’t need to take action on the users’ mobile phones.

This text was extracted from a Microsoft Word document.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 59% of the total text.

This invention is about distribution of mobile applications, with users retrieving and installing the applications through traditional distribution model, and where the administrator of a site where a mobile application is to be deployed doesn’t need to take action on the users’ mobile phones.

The mobile application cannot work without key information, for instance, the address and port of a server or a password. But this key-information should not be entered in the mobile application by the user to avoid spreading sensitive information. Thus, the site administrator will hide the information inside a picture, using a specific encoding application.

The encoding of the information inside the photo is done using two or three keys:

-          The name of the targeted mobile application. Each mobile application can have its own encryption algorithm.

-          The picture itself.

-          Potentially a unique identifier to distinguish the mobile phone, as for instance the MAC address of its WIFI connector. With this third key, the unlocking picture can be used only on the targeted mobile phone.

Hiding of information in the picture can be done by modifying the least significant bits of some pixels. Using least significant bits avoid a huge change in the color of the pixel and so the detection of this modification.

The pixel to modify will be selected using an algorithm based on the key described above. The picture being itself a key as its colorimetric parameters will be taken into account. These colo...