Dynamic pixel display in electronic communications to enhance data security

ABSTRACT

There are provided systems and methods for a dynamic pixel display in electronic communications to enhance data security. Electronic network communications by a service provider, such as an electronic transaction processor for digital transactions, may be compromised by malicious computing attacks or other actions that compromise the security of the communications and corresponding data within the communications. To increase security of the data within a communication, such as text or images in an email, the service provider may utilize a pixel arrangement within a field of the communication that has corresponding identifiers and weblinks to backend pixel data that have randomized so that each pixel&#39;s location is variable between different communications. When the email is opened, code for the email may request the backend pixel data using the weblinks. A malicious party listening to the communication does not receive the data without having to reconstruct the randomized layout.

TECHNICAL FIELD

The present application generally relates to digital data security andmore particularly to preventing digital data within electroniccommunications from being compromised by external entities.

BACKGROUND

Online service providers may provide services to different users, suchas individual end users, merchants, companies, and other entities. Whenproviding these services, the service providers may provide an onlineplatform that may be accessible over a network, which may be used tosend and receive different types of electronic communications includingemails, instant messages, push notifications, and the like. Thus, usersmay utilize a computing device to access and view content withinelectronic communications. In some cases, the content may be sensitiveor private, such as personally identifiable information (PII) or fundingsource information. This may include names and social security numbers,addresses or other locations, account numbers and balance, and otherprivate user or business data. However, as hackers and other malicioususers or entities become more sophisticated, they may perform differentcomputing attacks and other malicious conduct to compromise thesecommunications. Additionally, some communications may be impermissiblyproliferated when unintended parties or entities receive thecommunications. For example, a typo or a mistaken email transmission(e.g., reply or forward action) may cause an email to be shared withimpermissible parties. Thus, service providers require more robust andsophisticated manners of hiding or securing this data in thecommunications to prevent breach or access by undesired or unintendedentities.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a networked system suitable forimplementing the processes described herein, according to an embodiment;

FIG. 2 is an exemplary block diagram of a pixel arrangement thatincludes a randomized mapping of pixels to web links to dynamic pixeldata display, according to an embodiment;

FIG. 3 is an exemplary environment where a service provider server mayinteract with a client device to provide dynamic pixel data displaythrough a pixel arrangement in an electronic communication, according toan embodiment;

FIG. 4 is a flowchart for a dynamic pixel display in electroniccommunications to enhance data security, according to an embodiment; and

FIG. 5 is a block diagram of a computer system suitable for implementingone or more components in FIG. 1, according to an embodiment.

Embodiments of the present disclosure and their advantages are bestunderstood by referring to the detailed description that follows. Itshould be appreciated that like reference numerals are used to identifylike elements illustrated in one or more of the figures, whereinshowings therein are for purposes of illustrating embodiments of thepresent disclosure and not for purposes of limiting the same.

DETAILED DESCRIPTION

Provided are methods utilized for a dynamic pixel display in electroniccommunications to enhance data security. Systems suitable for practicingmethods of the present disclosure are also provided.

In network communications, such as between online platforms and systemsfor service providers and end users' client devices, electroniccommunications and other network computing architecture may facedifferent types of computing attacks coming from malicious sources overa network. A bad actor may initiate a computing attack on the computingenvironment of the service provider, such as an eavesdropping attack, apassword attack and/or account takeover, a web abuse (e.g., accountenumeration, brute force attacks, SQL injection), or other type ofcomputing attack that may compromise electronic communications, such asexposing data contained in the electronic communications to the badactor. This computing attack may introduce risk to private,confidential, or sensitive data of users and/or the service provider,which may lead to fraud and loss. For example, electronic communicationsmay be used to send and receive personally identifiable information(PII) and/or funding source information between the service provider anda user, which may be eavesdropped by a malicious party to read the datain an unauthorized manner. Further, an electronic communication may beaccidentally shared in the event of a typo or mistaken transmission ofthe electronic communication.

In order to assist in preventing or minimizing these computing attacksand other abuses of the service providers, the service providers, invarious embodiment, may utilize a dynamic pixel display through arandomized pixel arrangement within a pixel field of an electroniccommunication to display data, such as one or more pixel layouts thatdisplay pixelated image data. Each pixel may be assigned a correspondingweb link (e.g., a uniform resource locator (URL) or uniform resourceidentifier (URI) assigned to each pixel) with the hypertext markuplanguage (HTML) or cascading style sheets (CSS) code associated with theelectronic communication. Thus, when the electronic communication isaccessed and opened, the service provider may return pixel display datadynamically for each pixel in the pixel arrangement. This allows theservice provider to dynamically change the data for each pixel when thepixel arrangement is viewed and requested to display data from theservice provider. Further, without knowing the particular pixelarrangement that has been randomized, a malicious user or other entitywould require considerable computing resources to reconstruct, if atall, the dynamic pixel display.

For example, a service provider may provide electronic transactionprocessing to entities through digital accounts, including consumers andmerchants that may wish to process transactions and payments. Otherservice providers may also provide computing services, including email,social networking, microblogging, media sharing, messaging, business andconsumer platforms, etc. In order to establish an account, thesedifferent users may be required to provide account details, such as alogin, password (and/or other authentication credential, such as abiometric fingerprint, retinal scan, etc.), and other account creationdetails. The account creation details may include identificationinformation to establish the account, such as personal information for auser, business or merchant information for another entity, or othertypes of identification information including a name, address, and/orother information. The entity may also be required to provide financialor funding source information, including payment card (e.g.,credit/debit card) information, bank account information, gift cardinformation, benefits/incentives, and/or financial investments, whichmay be used to process transactions. The online payment provider mayprovide digital wallet services, which may offer financial services tosend, store, and receive money, process financial instruments, and/orprovide transaction histories, including tokenization of digital walletdata for transaction processing. The application or website of theservice provider, such as PayPal® or other online payment provider, mayprovide payments and the other transaction processing services. However,malicious users, entities, and/or other computing devices (e.g.,computing devices that may include malware, viruses, and the like thatmay be hijacked to automate computing attacks) may attempt to abuseelectronic communications sent and/or received through digital accountsin order to compromise sensitive data, such as PII and/or funding sourcedata, which may lead to exploitation and/or unauthorized use by thesemalicious parties.

Thus, a service provider may determine an electronic communication, suchas an email, is required to be sent to a user, such as a consumer,merchant, or other entity associated with the service provider. Theelectronic communication may be required to be sent to provide somesensitive, private, or confidential information to the user or otherentity, such as PII. In other embodiments, other data that is secure maybe required to be sent, such as a two-factor authentication code oranother authentication credential, an account balance or other financialinformation that may be sensitive, and the like. The service providermay utilize a randomized pixel arrangement within a field of theelectronic communication to display the PII or other data. Thus, inorder to present the PII or other data via the randomized pixelarrangement, the service provider first may determine a pixelated imageof the PII or other data that may be presented through the pixelarrangement based on the pixels that are randomly arranged or laid outwithin the field. For example, the pixelated image may correspond to anoutput display of pixels within the field, such as required color foreach pixel to display the required PII or other data.

Where the PII or other data for display corresponds to text information,each pixel may display one of a “no color” or a “color” output, such asan invisible (e.g., background color) or white pixel output, or insteada black pixel output. However, the data for the pixel arrangement mayalso be other images, including colored images. In some embodiments, thedetermination of the pixel image may also utilize user attributes,parameters, or information to determine the pixelated image. Forexample, if the user is older or has bad eyesight, the pixelated imagemay display the PII or other data in a larger and/or more readable font.Further, in some embodiments, the image may instead correspond to aseries of images, such as an animation, that is required to display thePII or other data to a user. In such embodiments, the sequence mayinclude multiple pixelated images for display, as well as identifiersfor each image that allows for reconstruction of the image (e.g., anumber 1-10 in a corner of the pixelated animation images so that a usercan reconstruct the order of the images in the animation).

In some embodiments, the PII or other data may also be encoded or linkedto using a displayable code, which may be output via the pixels in thepixel arrangement. For example, a barcode, QR code, or other displayablecode may be used to encoded data into that code, which may allow foradditional language, text, numbers, symbols, or the like to be encoded.This allows for association of additional amounts of data with thepixelated image than may be presented in plain text within the pixelarrangement (e.g., depending on the number of pixels in the pixelarrangement). In further embodiments, the displayable code or anotherimage may be used to link to available online data through an imagingapplication when captured. Thus, the service provider may provide linkeddata when the image is captured and provided to the service provider sothat additional amounts of data may be associated with pixelated imagedisplayed through a pixel arrangement. When a displayable code is used,the PII or other data may be encoded and/or linked to the pixelatedimage so that the displayable code may be presented in the pixelarrangement within the electronic communication.

Thereafter, the service provider may then determine the randomized pixelarrangement so that the service provider may determine a color output orvalue for each pixel that causes the pixelated image to be displayed inthe field having the pixel arrangement. The service provider may firstdetermine a number of pixels for the field, which may be generic (e.g.,8,000 pixels) or may be specifically selected based on the pixelatedimage of the PII or other data and/or the electronic communication. Witha higher pixel count, more security may be provided to the electroniccommunication and PII or other data for display in the field of theelectronic communication. This is due to the difficulty in performingbrute force attacks and computing actions to attempt to rebuild thepixel arrangement when placement of the pixels is randomized in thepixel arrangement. However, where less security is necessary, lesspixels may be utilized in order to conserve computing resources andnetwork communication links by reducing the number of web links andWebSocket communication channels (e.g., using the WebSocket protocol)required to return pixel data for each pixel in the pixel arrangement.

To randomize the pixel arrangement, placement of each pixel within thearrangement and corresponding field may be randomized so that the pixelsare randomly placed and not according to their identifier and/orcorresponding web links. For example, each pixel may be assigned anidentifier and/or associated with a web link used to communicate withthe service provider to return a pixel value via a correspondingWebSocket communication. Thereafter, each pixel is randomly sorted orarranged within the field for the pixel arrangement. Instead of usingsequential ordering of the pixels according to their identifier and/orweb link, the pixels may instead be randomly placed so that an orderingis unknown to eavesdropping malicious users. Thus, only by possessingthe electronic communication and corresponding code allows for knowledgeof the exact pixel arrangement. In other words, a malicious user that isable to access or view the network traffic being transmitted between adevice of the user and the service provider may be able to see the pixeldata being transmitted, but will not be able to arrange the pixelscorrectly to identify the sensitive user information. Each pixel is alsoassigned a web link to return the corresponding pixel data, which may bereferenced in the HTML code, CSS code, or other code for the electroniccommunication based on the randomized pixel arrangement. In someembodiments, where an animation is utilized, each pixel may insteadcorrespond to an animated image, such as a .gif image, so that eachpixel may display a value or color for a length of time (e.g., 10-30seconds) and then changed based on the next image in the animation.

Once the field's pixel arrangement has been determined, and thecorresponding web links for each pixel assigned and/or determined forthe electronic communication's code, the service provider may thendetermine output display data required to present the pixelated imagevia the field. This may correspond to determine a pixel output or colorvalue (including null or invisible where no pixel output is to bedisplayed or changed) that corresponds to each pixel in the randomizedarrangement to that the field displays the pixelated image. Thus, pixelpresentation data may include the data required to be transmitted orreturned to each corresponding pixel through a WebSocket or anothercommunication when each web link is accessed. For example, when theelectronic communication is opened, code within the electroniccommunication may request pixel data or a color value for each pixelusing the web link assigned to each pixel, which may then be returnedfor display. When determining the data for display of the pixelatedimage, the service provider may also determine one or more validityterms, periods, or attributes for the data as well. This may includedevice data, such as valid and/or invalid IP addresses, MAC addresses,geo-locations, and/or other device data, as well as email addresses,account identifiers, and the like. Other validity terms may includevalid times of day/week/month to display the data, an expiration data, anumber of valid openings/viewings of the field and/ electroniccommunication, and the like. In some embodiments, the service providermay also predetermine one or more status error images or messages, fraudalerts or fraud detection messages, and/or obfuscated data that may bereturned through the field when fraud or an error is detected (e.g., thepixelated image should not be shown through the field). However, thisdata may later be determined and/or accessed through stock images anddata, such as at the time of detected error or fraud. Additionally, anerror code or status error for a page not found or a webpage redirection(e.g., a 404 error status code for a “page not found”) may instead bereturned when a pixels data should not be shown.

Thereafter, the service provider may transmit the electroniccommunication to one or more accounts, email addresses, deviceidentifiers, phone number or text message identifier, or the like. Thismay include valid accounts to receive the address. However,eavesdropping attacks and other malicious network spying or listeningattackers may receive information for the electronic communication bymonitoring network communications. For example, an eavesdropping attackmay monitor portions of the electronic communication transmitted betweenthe service provider and the valid user, device, and/or accountreceiving the electronic communication. In some embodiments, atransmission error or computing attack may cause the electroniccommunication to be sent to invalid addresses and users, includingincorrect users as well as malicious users. This may also occur when atypo, mistaken transmission action, or the like may accidentally shareor transmit the electronic communication to an incorrect address,account, device, or user.

If an invalid transmission is detected, the service provider mayimmediately invalidate the pixel display data for the pixelated imagecorresponding to the PII or other data. If the corresponding web linksare accessed after the pixel display data has been invalidated, then nodata will be returned, a 404 error will be returned, or another messagethat does not contain the pixel display data will be returned (as statedabove). Additionally, if a validity term expires or is detected (e.g.,an expiration date), the pixelated image's display data for the fieldmay also be invalidated. However, if not, the service provider may waitfor an access of the electronic communication that requests display ofdata via the field having the pixel arrangement, such as an opening ofan email or other message and/or a request to view the data in thefield.

After transmission of the electronic communication, the service providermay then detect an access of the electronic communication. This may beperformed through code (e.g., HTML, CSS, or other code) for theelectronic communication transmitting requests to receive pixel data foreach pixel in the field of the electronic communication via the web linkfor each pixel. However, in other embodiments, other code may also beimplemented in order to detect that the electronic communication hasbeen accessed, opened, or viewed, such as through a message readdetection operation. When receiving the request to return a pixel outputor color value from each web link, a WebSocket or other communicationchannel may be established to communicate between the device accessingthe electronic communication and the service provider's server. Thesecommunication channels may be generated for each web link and thereforecorresponding pixel so that pixel data may be returned for eachdesignated pixel within the pixel arrangement of the electroniccommunication's field.

In order to determine whether the pixelated image for the PII or otherdisplayable data should be output via the field of the electroniccommunication, the service provider may perform a fraud assessment orrisk analysis device and/or account accessing the electroniccommunication. The service provider may receive or access device datafor the device, which may correspond to an IP address, MAC address,device fingerprint, geo-location or other device location, or otherdevice data for the device. A risk analysis may then be performed of thedevice to determine if the device indicates a computing attack,malicious behavior, or fraud. For example, the device data may becompared to one or more blacklists of malicious devices or the dataotherwise violates a risk rule or risk decision system. In otherembodiments, further data may also or instead be analyzed. For example,an email address receiving and accessing the electronic communication,or other account identifier, may be used to determine if the account isacting maliciously, fraudulently, or validly, including whether theaccount was authorized to receive the electronic communication. A timeof access, expiration data of the electronic communication, maximumnumber of openings of the electronic communication, or the like may alsobe used to determine whether the electronic communication is beingvalidly accessed.

If the electronic communication is being validly accessed, pixel displaydata for display of the pixelated image of the PII or other data may bedetermined, which may be used to return pixel data or a valid pixelcolor value for each pixel to display the pixelated image. Thus, fortext or images a particular pixel color value (e.g., black and white fortext) may be used to display text of the PII or other data within thefield based on the pixelated image of the PII or other data. In someembodiments, in order to conserve network resources and communications,pixel color values or other pixel data for background colors (e.g.,white for the background to contrast with the black color of text), maynot be required to be returned. For example, instead of returning awhite pixel color value or data, no pixel value or data (e.g., aninvisible pixel) may be returned so that the pixel maintains the samewhite (or other color) background for the electronic communication.Thus, for WebSocket communication channels for “white” pixels, thechannel may be timed out after a period of no response by the serviceprovider, and no pixel data may be returned. Further, the black pixelsmay be returned via the communication channels for each web link so thatthe black pixels may make up the displayable data for the pixelatedimage. Since with text, the black pixels may make up 15-20% of thepixels, the service provider may conserve 80+% of network communicationand computing resources in returning pixel values. Further, some pixelsmay be grouped into URL or URI groupings that allow for a single weblink to return pixel data. Further, external hosted CSS data by theservice provider may be used to dynamically change mappings and colorvalues for pixels

However, if the access to the electronic communication appearsfraudulent, malicious, or unauthorized, the service provider maydetermine to change the display values or data for the field having thepixel arrangement in the electronic communication. This may be done toobfuscate the data within the electronic communication so that the PIIor other data is not output through the field. However, in furtherembodiments, fraud alert, or other data that indicates the unauthorizedaccess may be provided. Additionally, a webpage or data returned for thepixels when an unauthorized access of the electronic communication isdetect may correspond to an error code, status error message, or other“page not found” error code that does not return pixel data and/ordisplays different data within the pixel. This may occur immediately,such as when an accidental or mistaken transmission of an electroniccommunication is detected, such as when a typo or mistaken action (e.g.,forwarding, reply, etc.) occurs. In further embodiments, this may alsooccur when the electronic communication is accessed by the incorrectuser, such as based on device data, a fingerprint, network address, orthe like. Moreover, in the event of a typo or accidental transmission ofthe electronic communication, the information presented within the pixelarrangement may be changed to present the correct information for thereceiving party and/or change the displayed image based on the receivingparty. For example, the receiving party may receive information directedto the receiving party (e.g., PII for the receiving party). However,other images may also be displayed (e.g., to obscure the PII for theoriginally intended party).

In some embodiments, the service provider may also provide data thatappears valid but may be used to tracking purposes to gain betterknowledge of the malicious party, such as a honeypot password or codethat is not valid but may be used to determine the malicious entity whenthe code is entered. Thus, the data may be changed quickly on thebackend of the service provider so that data is not compromised whenunauthorized transmissions and/or access is detected, thereby preservingthe data for security concerns. Further, the service provider mayutilize the randomization of the pixel arrangement so that eavesdroppingattacks are unable to rebuild the data from multiple communicationchannels without having the underlying layout or arrangement.

FIG. 1 is a block diagram of a networked system 100 suitable forimplementing the processes described herein, according to an embodiment.As shown, system 100 may comprise or implement a plurality of devices,servers, and/or software components that operate to perform variousmethodologies in accordance with the described embodiments. Exemplarydevices and servers may include device, stand-alone, andenterprise-class servers, operating an OS such as a MICROSOFT® OS, aUNIX® OS, a LINUX® OS, or another suitable device and/or server-basedOS. It can be appreciated that the devices and/or servers illustrated inFIG. 1 may be deployed in other ways and that the operations performed,and/or the services provided by such devices and/or servers may becombined or separated for a given embodiment and may be performed by agreater number or fewer number of devices and/or servers. One or moredevices and/or servers may be operated and/or maintained by the same ordifferent entity.

System 100 includes a computing device 110 and a service provider server120 in communication over a network 140. Computing device 110 may beutilized by a user to receive communications over network 140, whereservice provider server 120 may provide various data, operations, andother functions over network 140 to provide messages, data, images, andother pixelated data. In this regard, computing device 110 may determinea pixelated image for PII or other data to display in a pixelarrangement within a field of an electronic communication, such as anemail. Service provider server 120 may transmit the electroniccommunication, and when the electronic communication is accessed and/oropened, determine whether to reconstruct and display the pixelated imagevia the pixel arrangement within the field.

Computing device 110 and service provider server 120 may each includeone or more processors, memories, and other appropriate components forexecuting instructions such as program code and/or data stored on one ormore computer readable mediums to implement the various applications,data, and steps described herein. For example, such instructions may bestored in one or more computer readable media such as memories or datastorage devices internal and/or external to various components of system100, and/or accessible over network 140.

Computing device 110 may be implemented as a communication device thatmay utilize appropriate hardware and software configured for wiredand/or wireless communication with service provider server 120. Forexample, in one embodiment, computing device 110 may be implemented as apersonal computer (PC), a smart phone, laptop/tablet computer,wristwatch with appropriate computer hardware resources, eyeglasses withappropriate computer hardware (e.g. GOOGLE GLASS®), other type ofwearable computing device, implantable communication devices, and/orother types of computing devices capable of transmitting and/orreceiving data, such as an IPAD® from APPLE®. Although only one deviceis shown, a plurality of devices may function similarly and/or beconnected to provide the functionalities described herein.

Computing device 110 of FIG. 1 contains a messaging application 112, adatabase, and a network interface component 116. Messaging application112 and other applications 114 may correspond to executable processes,procedures, and/or applications with associated hardware. In otherembodiments, computing device 110 may include additional or differentmodules having specialized hardware and/or software as required.

Messaging application 112 may correspond to one or more processes toexecute software modules and associated components of computing device110 to provide features, services, and other operations for a user overnetwork 140, which may include receiving and displaying messages andelectronic communications from service provider server 140. In thisregard, messaging application 112 may correspond to specialized softwareutilized by a user of computing device 110 that may be used to access awebsite or UI that may display one or more electronic communications. Invarious embodiments, messaging application 112 may correspond to ageneral browser application configured to retrieve, present, andcommunicate information over the Internet (e.g., utilize resources onthe World Wide Web) or a private network. For example, messagingapplication 112 may provide a web browser, which may send and receiveinformation over network 140, including retrieving website information(e.g., a website for an email provider or other messaging service),presenting the website information to the user, and/or communicatinginformation to the website. However, in other embodiments, paymentmessaging application 112 may include a dedicated application of serviceprovider server 120 or other entity (e.g., an email provider ormessaging service). Messaging application 112 may be associated withaccount information, user financial information, and/or transactionhistories. However, in further embodiments, different services may beprovided via messaging application 112, including social networking,media posting or sharing, microblogging, data browsing and searching,online shopping, and other services available through service providerserver 120 that may be utilized in conjunction with messaging services.Thus, messaging application 112 may also correspond to different serviceapplications and the like.

When using messaging application 112, an electronic communication may bereceived that includes a field having a randomized pixel arrangement,where each pixel has a corresponding web link (e.g., URL or URI) that isused to fetch data for display in the pixel (e.g., a pixel value orcolor). The web links may be referenced and utilized by code (e.g., HTMLcode) for the electronic communication so that when the electroniccommunication is accessed and opened, each web link is called toretrieve pixel display data, such as a pixelated image of PII or otherdata, from service provider server 120. Retrieval of the data may bedone through a web connection, such as a Web Socket communicationchannel or connection. This allows for display of the PII or other datathrough the pixel arrangement in the field. If a bad actor executes acomputing attack to perform some operation to compromise an electroniccommunication from service provider server 120 and/or conduct fraud,including account takeover where a message may be viewed when notauthorized, the computing attack may attempt to discover secret orsensitive information, takeover an account, request fraudulentelectronic transaction processing, or otherwise perform an conduct thatattempts to listen or eavesdrop on data transmissions for electroniccommunications. During this conduct, service provider server 120 mayprovide the pixel display data to the randomized pixel arrangement sothat the pixelated image would require significant time and processingresources to attempt to rebuild without knowledge of the pixelplacements within the randomized pixel arrangement. Further, if theelectronic communication is being viewed by an unauthorized user and/ordevice, service provider server 120 may perform a security check and/orfraud assessment to determine that different pixel display data shouldbe returned to protect the underlying PII or other data.

In various embodiments, computing device 110 also includes otherapplications 114 as may be desired in particular embodiments to providefeatures to computing device 110. For example, other applications 114may include security applications for implementing client-side securityfeatures, programmatic client applications for interfacing withappropriate application programming interfaces (APIs) over network 140,or other types of applications. Other applications 114 may also includeadditional communication applications, such as email, texting, voice,social networking, and IM applications that allow a user to send andreceive emails, calls, texts, and other notifications through network140, which may include interfacing with messaging application 112 forthe opening and viewing of communications having pixel arrangements.Other applications 114 may be utilized with service application 112 toutilize an account and/or service, as well as provide device and/or userdata to service provider server 120 that may be used during AIdecision-making. Other applications 114 may include device interfacesand other display modules that may receive input and/or outputinformation. For example, other applications 114 may contain softwareprograms, executable by a processor, including a graphical userinterface (GUI) configured to provide an interface to the user.

Computing device 110 may further include a database 116 stored on atransitory and/or non-transitory memory of computing device 110, whichmay store various applications and data and be utilized during executionof various modules of computing device 110. Database 116 may include,for example, identifiers such as operating system registry entries,cookies associated with messaging application 112 and/or otherapplications, identifiers associated with hardware of computing device110, or other appropriate identifiers, such as identifiers used forpayment/user/device authentication or identification, which may becommunicated as identifying the user/computing device 110 to serviceprovider server 120. Moreover, database 116 may store electroniccommunications received from service provider server 120, includingthose having pixel arrangements within display fields for display ofixel display data associated with PII or other data.

Computing device 110 includes at least one network interface component116 adapted to communicate with service provider server 120. In variousembodiments, network interface component 116 may include a DSL (e.g.,Digital Subscriber Line) modem, a PSTN (Public Switched TelephoneNetwork) modem, an Ethernet device, a broadband device, a satellitedevice and/or various other types of wired and/or wireless networkcommunication devices including WiFi, microwave, radio frequency,infrared, Bluetooth, and near field communication devices.

Service provider server 120 may be maintained, for example, by an onlineservice provider, which may provide operations for transmissions ofelectronic communications, such as emails, including pixel arrangementsfor display of pixelated images including text, graphics, and the like.In this regard, service provider server 120 includes one or moreprocessing applications which may be configured to interact withcomputing device 110 to transmit an electronic communication tocomputing device 110, which may be used to display data within the pixelarrangements. In one example, service provider server 120 may beprovided by PAYPAL®, Inc. of San Jose, Calif., USA. However, in otherembodiments, service provider server 120 may be maintained by or includeanother type of service provider.

Service provider server 120 of FIG. 1 includes a digital communicationsapplication 130, an account application 122, other applications 124, adatabase 124, and a network interface component 126. Digitalcommunications application 130 and other applications 124 may correspondto executable processes, procedures, and/or applications with associatedhardware. In other embodiments, service provider server 120 may includeadditional or different modules having specialized hardware and/orsoftware as required.

Digital communications application 130 may correspond to one or moreprocesses to execute modules and associated specialized hardware ofservice provider server 120 to provide digital electroniccommunications, such as emails, network messages and communications,push notifications, and the like. In this regard, digital communicationsapplication 130 may correspond to specialized hardware and/or softwareused by service provider server 120 to first determine data to displayvia a pixel arrangement, which may include PII, authentication oraccount data (including a password, PIN, or 2-factor authenticationcode), or other sensitive or private data that may be desirable tosecure. Communication generation process 132 may generate an electroniccommunication, such as an email, that includes PII or other data. ThePII or other data for display in an electronic communication maycorrespond to data that is to be entered to the electronic communicationand transmitted to a user, such as PII or other data within an email fortransmission to a user. Thereafter, communication generation process 132may determine a field to display the data, where the field includes aplurality of pixels (e.g., several hundred to thousands in order toproperly display data). Such a field having pixels is shown in FIG. 2.When determining the field, communication generation process 132 ofdigital communications application 130 may then randomize a pixelarrangement within the field, where pixels are not sequentiallyorganized or otherwise organized in a manner according to theiridentifier and/or associated web link for pixel display color or valueretrieval. This may include randomizing the ordering and organization ofthe pixels within the field's arrangement.

Based on the randomized pixel arrangement, communications application130 may determine a pixelated image that may be used to display the PIIor other data required for the electronic communication in a displayablepixel layout. The pixelated image may therefore correspond to pixeldisplay data that includes pixel outputs 136 that may be used to displaythe pixelated image by returning a pixel color or value that causesdisplay of the pixelated image via a pixel layout. Pixel outputs 136 mayalso be adjusted in order to display obfuscated data, including an errormessage or image, a fraud alert, or other image that may hide the PII orother data. Where pixel outputs 136 are not return, instead an errorstatus code or other webpage error code may be returned and displayed,or not data may be displayed. Thus, different pixel layouts may displaydifferent data when different devices attempt to access or display thepixelated data (e.g., an authorized device and/or unauthorized device).Each pixel within the randomized pixel arrangement may be associatedwith an identifier and/or web link, such as URLs 138 (as well as URIs orother linked data) that may make a web call (e.g., via one or more APIinteractions and/or calls) to service provider server 120 in order toretrieve a pixel value or color for display via the pixel. This maycause display of a pixelated image via the pixel arrangement.Communication generation process 132 may reference each of these URLs138 in code for the electronic communication, such as HTML code for anemail. Communication generation process 132 may then complete generationof the electronic communication, which may be transmitted to computingdevice 110 via digital communications application 130.

Thereafter when the electronic communication is opened, dynamic pixelimage process 134 may determine whether to return the pixelated imagevia pixel outputs 136. For example, on opening of an email, the email'sHTML code may utilize URLs 138 to request pixel display data for thepixels within the randomized pixel arrangement in the field of theelectronic communication. This may correspond to an output pixel coloror value at each of the pixels within the randomized pixel arrangementof the electronic communication. Dynamic pixel image process 134 maydetermine an IP address, a MAC address, or a device fingerprint, whichmay be used to determine whether computing device 110 is an authorizeddevice (as well as not compromised or risky) to open the electroniccommunication and display the pixelated image via the pixel arrangement.In some embodiments, dynamic pixel image process 134 may also utilize anidentifier for an account, such as an email account, a messagingaccount, or a social networking account in order to determine whetherthe account has authorization to access and open the electroniccommunication.

If authorized, dynamic pixel image process 134 may provide pixel outputs136 corresponding to the pixel display data used to render and displaythe pixelated image of the PII or other data via the pixel arrangementin the field of the electronic communication. Pixel outputs 136 may beretrieved via URLs 138, where each of URLs 138 in the electroniccommunication cause establishment of a communication channel, such asthrough Web Socket or the like. In some embodiments, portions of thecommunication channels via Web Socket may be timed out for white or nocolor pixels so that all of the communication channels are not requiredto transmit data for the pixel displays. Thus, only those pixels havingblack or another color may keep communication channels open fortransmission of pixel outputs 136. Since the pixel arrangement israndomized, reconstruction of the pixelated image from pixel outputs 136would be time consuming and resource intensive, thereby securing thedata. However, if computing device 110 in not authorized to open theelectronic communication and/or shows indications of fraud or securitybreach, dynamic pixel image process 134 may instead provide obfuscateddata via pixel outputs 136 in order to hide the pixelated image of thePII or other data.

Account application 122 may correspond to one or more processes toexecute modules and associated specialized hardware of service providerserver 120 to perform a service to end users of service provider server120, such as sending and receiving electronic communications withcomputing device 110. In this regard, account application 122 maycorrespond to specialized hardware and/or software used by a userassociated with computing device 110 to perform one or more messaging orcommunication services. Account application 122 may correspond tomessaging, social networking, media posting or sharing, microblogging,data browsing and searching, online shopping, and other servicesavailable through service provider server 120. Account application 122may be used by a user to establish a payment account and/or digitalwallet, which may be used to generate and provide user data for theuser, as well as view communications from digital communicationsapplication 130. In various embodiments, financial information may bestored to the account, such as account/card numbers and information. Adigital token for the account/wallet may be used to send and processpayments, for example, through an interface provided by service providerserver 120. In some embodiments, the financial information may also beused to establish a payment account and provide payments through thepayment account. The payment account may be accessed and/or used througha browser application and/or dedicated payment application. Further, theaccount may be used to receive electronic communications having a fieldwith a randomized pixel arrangement used to display pixelated images forPII or other data.

Additionally, service provider server 120 includes database 124.Database 124 may store various identifiers associated with computingdevice 110. Database 124 may also store account data, including paymentinstruments and authentication credentials, as well as transactionprocessing histories and data for processed transactions. Database 124may store financial information or other data generated and stored byother applications 124. Database 124 may also include PII and/or othersensitive or private data, which may be transmitted through anelectronic communication having a randomized pixel arrangement within afield used to display the PII or other data. In this regard, theseelectronic communications and associated data, such as pixel outputs 136and URLs 138 may also be stored by database 124.

In various embodiments, service provider server 120 includes at leastone network interface component 126 adapted to communicate computingdevice 110 over network 140. In various embodiments, network interfacecomponent 126 may comprise a DSL (e.g., Digital Subscriber Line) modem,a PSTN (Public Switched Telephone Network) modem, an Ethernet device, abroadband device, a satellite device and/or various other types of wiredand/or wireless network communication devices including WiFi, microwave,radio frequency (RF), and infrared (IR) communication devices.

Network 140 may be implemented as a single network or a combination ofmultiple networks. For example, in various embodiments, network 140 mayinclude the Internet or one or more intranets, landline networks,wireless networks, and/or other appropriate types of networks. Thus,network 140 may correspond to small scale communication networks, suchas a private or local area network, or a larger scale network, such as awide area network or the Internet, accessible by the various componentsof system 100.

FIG. 2 is an exemplary block diagram 200 of a pixel arrangement thatincludes a randomized mapping of pixels to web links to dynamic pixeldata display, according to an embodiment. Diagram 200 of FIG. 2 includesa pixel image 202 shown within a simplified pixel arrangement, such asone that may be displayed within an electronic communication (e.g., anemail). The electronic communication may be transmitted by a serviceprovider, such as service provider server 120, which may include thepixel arrangement used to display pixel image 202. In this regard, theservice provider may generate the electronic communication and pixelarrangement based on randomization of pixel placements within thearrangement such that pixels and their corresponding identifiers and/orweb links, are placed in a random arrangement within a fieldcorresponding to the pixel arrangement. Thereafter, the web links may beused to retrieve pixel display data, such as a pixel color or value foreach pixel, that causes display of pixel image 202.

Pixel image 202 is therefore displayed through the pixels shown indiagram 200. For example, an exemplary pixel 204 is shown as a singleblock pixel; however, other pixel shapes and/or groupings may be used(e.g., a grouping of 2 or more pixels that may have the same or similarweb link to allow for coloration of the pixel grouping). Pixel 204 maycorrespond to a single pixel within a physical output display (e.g., apixel within a display monitor), as well as groupings of pixels in thedisplay monitor. Additionally, as shown in diagram 200, a web link 206,such as a URL, URI, or the like, is shown as assigned to pixel 204.Within the other pixels in diagram 200, each pixel has a correspondingdifferent web link. In diagram 200, the pixels and the corresponding weblinks are randomized in a manner such that the web links and/oridentifiers are not sequential and/or organized in a particular manner(e.g., by alphanumeric identifiers for the web links). Therefore, inorder to display pixel image 202, the layout and arrangement of thepixels in diagram 200 is required or the returned colors or values forthe pixel display data are not shown in a proper order and placementthat allows for presentation and display of pixel image 202.

Web link 206 is shown as having a specific unique web link and/oridentifier for retrieval of a color, value, or other data for displaywithin pixel 204. Web link 206 therefore includes an alphanumericidentifier for a web link that specifically may be used to a databasetable lookup and/or points to specific online data that allows forreturning of a color for pixel 204. Further, web link 206 may bereferenced in the software code, such as HTML code, for an electroniccommunication having the pixel arrangement in diagram 200. For example,each of the web links shown in diagram 200 are referenced in the code sothat when the corresponding electronic communication is opened, each weblink is accessed so that a data request is sent to a backend server ofthe service provider via a network communication channel, such as aWebSocket channel. This allows for retrieval of the correspond pixelcolor or value for each pixel. For example, when the correspondingelectronic communication is opened, the web links are used to fetch orretrieve pixel display data for pixel image 202 having a pixel color orvalue for each pixel in diagram 200.

In this regard, pixel image 202 displays the word “TIN”, which maycorrespond to PII or other data that may be secret, sensitive, orprivate. In order to reconstruct TIN, 3 letters are required, as shownfrom a first pixel group 208, a second pixel group 210, and a thirdpixel group 212. Additionally, to provide contrast and viewing of theindividual letters, white pixels 214 are also required, which includepixel 204. Thus, when the electronic communication is opened, thecommunication's code may make calls and/or requests to the correspondingservice provider server using web link 206 and the other web links indiagram 200. This may establish different communication channels, suchas through WebSocket. In diagram 200, to display pixel image 202, thepixel arrangement is 10×2 pixels, or 20 total pixels, which causes 20different communication channels. Thereafter, a black pixel value may bereturned via the communication channels for first pixel group 208,second pixel group 210, and third pixel group 212. This allows fordisplay of the letter T for first pixel group 208, the letter I forsecond pixel group 210, and the letter N for third pixel group 212.

Moreover, for white pixels 214, a white color value may be returned, ora no color value (e.g., invisible or no returned data). In someembodiments, for white pixels 214, the corresponding communicationchannels may be timed out quickly, such as after a brief (e.g., 10milliseconds) delay, which allows for reduction of the over networkcommunication channels and network/processing resources. For example, indiagram 200, by timing out the communication channels for white pixels214, 9 less communication channels are required, and therefore only 11communication channels stay open to provide a color value for the blackpixels in first pixel group 208, second pixel group 210, and third pixelgroup 212. Thereafter, pixel image 202 then displays the text TIN withindiagram 200. In various embodiments, instead of generating the text TINwithin diagram 200, other representations of data may be provided. Forexample, a barcode, QR code, or other scannable image/code may berepresented in diagram 200, which may include encoded data and/or linkto available data. The scannable code may be used to encoded and/or linkto additional data so that diagram 200 may correspond to a larger amountof data and/or may include less pixels to conserve network resources andprovide additional convenience to users and service providers.

FIG. 3 is an exemplary environment 300 where a service provider servermay interact with a client device to provide dynamic pixel data displaythrough a pixel arrangement in an electronic communication, according toan embodiment. Environment 300 includes interactions 302 that may beperformed by computing device 110 and service provider server 120discussed in reference to system 100 of FIG. 1. In this regard, acustomer 304 may utilize computing device 110 to receive an electroniccommunication that may include a pixel field having a randomizedarrangement of pixels for display of a pixelated image.

In environment 300, interactions 302 display return of pixel displaydata for a pixelated image that displays PII or other data through afield within an electronic communication. This field includes arandomized arrangement of pixels such that placement of each pixel isperformed in a random order to defeat simple reconstruction of the pixelarrangement through alphanumeric identifiers and the like. Thus,customer 304 may initially open and/or access an email 308 or otherelectronic communication from an external provider that has the pixelarrangement in a field of email 308, at interaction 1000. Interaction1000 may occur when customer 304 accesses an email service providerand/or web server and requests display of contents within email 308.Thereafter, email 308 may execute code or contain executable code forHTML with mapping 310, at interaction 1002, which corresponds to HTMLcode having web links to each pixel's backend server data (e.g., displaycolor or value). Within HTML with mapping 310, email 308's code maycause the web links to open and/or be established, such as throughWebSocket connections, with the backend server.

Thus, at interaction 1004, HTML with mapping 310 may then request adynamic pixel-text 312 within email 308 through the networkcommunication connections or channels with the backend server thatcauses rendering and display of PII or other data through email 308. Inthis regard, interaction 1004 causes HTML with mapping 310 to requestdisplay of dynamic pixel text 312 in the field having the pixelarrangement in email 308. At interaction 1006, data for dynamic pixeltext 312 is requested from a server 314, which may then renderconstructed sensitive text 316. For example, at interaction 1006, datais provided to server 314 that may be used to determine what text isrendered and displayed from dynamic pixel text 312. For example, an IPaddress, a MAC address, or a device fingerprint may be provided toserver 314 for the device of customer 304, which may be used for adetermination of whether email 308 is being validly opened in anauthorized manner. This may also include a check for the account (e.g.,email, social networking, messaging, and the like) opening email 308 inthe event that email 308 was transmitted to an incorrect account and/orimpermissibly or accidentally sent or forwarded to another account(e.g., when a typo or mistaken action occurs when transmitting email308).

Further, server 314 may also determine whether opening of email 308complies with one or more validity parameters and/or terms, such as anexpiration date, valid geo-locations, authorized devices/accounts,viewing times, and the like. If server 314 determines that the data maybe validly returned, constructed sensitive text 316 may be determined,which may correspond to an image or other pixelated data of thecorresponding PII or other data. Thus, constructed sensitive text 316may include pixel display data for at least a portion of the pixels inemail 308. However, in other embodiments, constructed sensitive text 316may instead correspond to obfuscated text of the PII or other data,which may indicate that email 308 is not authorized to be opened and/orviewed by customer 304, is being eavesdropped by an attacker 306, and/oris otherwise compromised. In such events, the pixel display data foremail 308 may correspond to data that hides or obscures the PII or otherdata, including a page not found or 404 page error status code.

Thereafter, at interaction 1008, pixel display data is returned tocustomer 304, which may be displayed via one or more user interfaces ofa computing device for customer 304 when viewing email 308. Interaction1008 is shown by rendering constructed sensitive text 316 by providingpixel display data for a randomized arrangement of pixels within a fieldof email 308. However, attacker 306 may attempt to eavesdrop orotherwise compromise email 308, at interaction 1010. Attacker 306 maynot have access directly to email 308 that includes the actualarrangement of the pixels (which has been randomized for email 308). Forexample, attacker 306 may eavesdrop on the network communications suchthat pixel display data and/or returned pixel colors or values for eachpixel is detected and/or determined by attacker 306, at interaction1010. However, without the actual arrangement of the pixels,reconstruction of constructed sensitive text 316 displaying the PII orother data, even if possible, would require brute force and numerousattempts. With a large pixel field, such as 8,000 pixels, the number ofattempts may be so numerous to be considered impossible or too timeand/or resource intensive. Thus, constructed sensitive text 316 may beprotected through the pixel arrangement in email 308. Further, anoptional interaction 1012 may also be performed, such as betweeninteractions 1004, 1006, and 1008, where a dynamic CSS 318 may beutilized to dynamically rearrange and/or change pixel values within thepixel arrangement. For example, an external hosted CSS with email 308may be used to change the pixel arrangement through dynamic CSS 318.

FIG. 4 is a flowchart 400 for a dynamic pixel display in electroniccommunications to enhance data security, according to an embodiment.Note that one or more steps, processes, and methods described herein offlowchart 400 may be omitted, performed in a different sequence, orcombined as desired or appropriate.

At step 402 of flowchart 400, an image for display via a pixelarrangement in a field of an electronic communication is determined.This may include determining PII or other sensitive, confidential, orprivate data, including authentication data and shared secrets, that isto be sent to a user via an email or other electronic communication. Inone or more embodiments, the information in the electronic communicationmay be scanned, using optical character recognition, natural languageprocessing, and/or machine learning techniques to identify the PII orother sensitive, confidential or private data within the electroniccommunication.

A service provider transmitting the electronic communication maydetermine a pixelated image that may cause display of the correspondingimage through a pixel arrangement within a field or other portion of theelectronic communication. However, in further embodiments, once the datafor the image is determined, the pixelated image may later be generatedand/or adjusted. For example, based on a user or account opening theemail or other electronic communication, display of the PII or otherdata may be adjusted (e.g., increasing or decreasing a font size, changea font, adjusting text color and/or background, and the like).

Once the image is determined, pixels within the pixel arrangement forthe electronic communication are randomized, at step 404. Randomizationof the pixels may correspond to changing the ordering and/or placementso that the pixels are not arranged sequential and/or corresponding totheir alphanumeric identifiers and/or corresponding web links (e.g.,URL/URI codes or identifiers). Thus, the pixel arrangement maycorrespond to randomizing the placements of pixels so that reordering ofthe pixels is difficult if not impossible due to the computing resourcesrequired to brute force attack and reorder the pixels. For example, withthousands of pixels, rearrangement of the pixels may take a large amountof resources and time to determine the randomized order. Thereafter, atstep 406, each pixel in the randomized pixel arrangement is associatedwith a unique web link in code for the electronic communication. Forexample, each pixel may be assigned or otherwise provided with a uniqueweb link that allows for retrieval of pixel data, such as a color orvalue, that is output via the corresponding pixel. Each web link may beused by the code for the electronic communication to request the pixeldata from the backend server and database, so presentation of the imageor other data may be performed through the randomized pixel arrangement.

At step 408, output data for each pixel retrievable at each web link isdetermined to display the image in the randomized pixel arrangement.This output data may correspond to pixel display data that causes atleast a portion of the pixels in the randomized pixel arrangement todisplay the corresponding pixelated image. For example, each pixel maybe assigned a color, value, or other display data that causes the imageof the PII or other data to be displayed in the randomized pixelarrangement. Further, in some embodiments, validity terms or parametersmay be determined for returning the output data, such as an expirationtime, number of viewings/openings of the electronic communication, validgeo-locations, users, accounts, and/or device, or the like. Suchvalidity terms may be required to be checked prior to returning theoutput data, and if the opening violates one or more terms, causesdifferent pixel display data to be returned.

The electronic communication is then transmitted with the field havingthe randomized pixel arrangement, at step 410. This may includetransmitting to any selected accounts or other communicationidentifiers. However, the electronic communication may be accidentallyor maliciously shared or transmitted, such as to unauthorized ormalicious accounts/users. For example, a computing attack, typo in anaccount identifier or email address, or the like may cause an electroniccommunication to be impermissibly shared. Thus, at step 412, a requestto display the image in the electronic communication is received, forexample, via the web links within the code of the electroniccommunication. In this regard, when the electronic communication isopened and viewed, code for the electronic communication may utilize theweb links to establish communication channels or connections with thebackend server to return an output for each pixel in the randomizedpixel arrangement. Prior to returning data, a fraud assessment of therequest is performed, at step 414, which may include assessing an IPaddress, a MAC address, or a device fingerprint, as well as an accountidentifier (e.g., email, social networking, messaging, and the like)and/or validity terms that are associated with the electroniccommunication. This data may be detected and/or received in response todetecting the opening of the electronic communication.

If fraud is detected or suspected, at step 416, obfuscated data isreturned at the pixels via the web links. For example, a malicious orunauthorized user may obtain the electronic communication. However,based on the fraud assessment, the service provider may determine thatthe opening of the electronic communication is unauthorized. Thus, theservice provider may determine to hide the PII or other data fromdisplay in the randomized pixel arrangement of the electroniccommunication's field. The obfuscated data may provide garbled orotherwise unrecognizable data, or each pixel may receive and/or displayan error code or status error that displays an error code or no pixeldata. In some embodiments, the obfuscate data may also include aphishing attempt and/or honeypot data that may attempt to have themalicious user use the data for enhanced identification of the malicioususer. Moreover, the receiving user and/or device of the electroniccommunication may be determined so that if a typo in the email addressof other identifier for the intended user occurs, or if the electroniccommunication is accidentally transmitted to the receiving party,different data may be provided through the pixels via the web links. Forexample, PII or other data intended for the receiving user (and not theintended user) may instead be provided through the electroniccommunication (e.g., via the pixels). The obfuscated data may alsoinclude other data for the receiving party and/or in order to hide thePII or other data via the pixels.

In contrast, if no fraud is detected, at step 418, the output data(e.g., the pixel display data for the pixelated image of the PII orother data) is returned to display the image at the pixels via the weblinks. Thus, a user interface of a computing device opening the email inan authorized manner may then display the image through the randomizedpixel arrangement in the field of the electronic communication.Moreover, if step 418 occurs, any malicious user eavesdropping on thenetwork communications between the valid user's device and the serviceprovider, may only view garbled or obfuscated data without knowledge ofthe exact layout and placement of the pixels within the randomized pixelarrangement.

FIG. 5 is a block diagram of a computer system 500 suitable forimplementing one or more components in FIG. 1, according to anembodiment. In various embodiments, the communication device maycomprise a personal computing device e.g., smart phone, a computingtablet, a personal computer, laptop, a wearable computing device such asglasses or a watch, Bluetooth device, key FOB, badge, etc.) capable ofcommunicating with the network. The service provider may utilize anetwork computing device (e.g., a network server) capable ofcommunicating with the network. It should be appreciated that each ofthe devices utilized by users and service providers may be implementedas computer system 500 in a manner as follows.

Computer system 500 includes a bus 502 or other communication mechanismfor communicating information data, signals, and information betweenvarious components of computer system 500. Components include aninput/output (I/O) component 504 that processes a user action, such asselecting keys from a keypad/keyboard, selecting one or more buttons,image, or links, and/or moving one or more images, etc., and sends acorresponding signal to bus 502. I/O component 504 may also include anoutput component, such as a display 511 and a cursor control 513 (suchas a keyboard, keypad, mouse, etc.). An optional audio input/outputcomponent 505 may also be included to allow a user to use voice forinputting information by converting audio signals. Audio I/O component505 may allow the user to hear audio. A transceiver or network interface506 transmits and receives signals between computer system 500 and otherdevices, such as another communication device, service device, or aservice provider server via network 140. In one embodiment, thetransmission is wireless, although other transmission mediums andmethods may also be suitable. One or more processors 512, which can be amicro-controller, digital signal processor (DSP), or other processingcomponent, processes these various signals, such as for display oncomputer system 500 or transmission to other devices via a communicationlink 518. Processor(s) 512 may also control transmission of information,such as cookies or IP addresses, to other devices.

Components of computer system 500 also include a system memory component514 (e.g., RAM), a static storage component 516 (e.g., ROM), and/or adisk drive 517. Computer system 500 performs specific operations byprocessor(s) 512 and other components by executing one or more sequencesof instructions contained in system memory component 514. Logic may beencoded in a computer readable medium, which may refer to any mediumthat participates in providing instructions to processor(s) 512 forexecution. Such a medium may take many forms, including but not limitedto, non-volatile media, volatile media, and transmission media. Invarious embodiments, non-volatile media includes optical or magneticdisks, volatile media includes dynamic memory, such as system memorycomponent 514, and transmission media includes coaxial cables, copperwire, and fiber optics, including wires that comprise bus 502. In oneembodiment, the logic is encoded in non-transitory computer readablemedium. In one example, transmission media may take the form of acousticor light waves, such as those generated during radio wave, optical, andinfrared data communications.

Some common forms of computer readable media includes, for example,floppy disk, flexible disk, hard disk, magnetic tape, any other magneticmedium, CD-ROM, any other optical medium, punch cards, paper tape, anyother physical medium with patterns of holes, RAM, PROM, EEPROM,FLASH-EEPROM, any other memory chip or cartridge, or any other mediumfrom which a computer is adapted to read.

In various embodiments of the present disclosure, execution ofinstruction sequences to practice the present disclosure may beperformed by computer system 500. In various other embodiments of thepresent disclosure, a plurality of computer systems 500 coupled bycommunication link 518 to the network (e.g., such as a LAN, WLAN, PTSN,and/or various other wired or wireless networks, includingtelecommunications, mobile, and cellular phone networks) may performinstruction sequences to practice the present disclosure in coordinationwith one another.

Where applicable, various embodiments provided by the present disclosuremay be implemented using hardware, software, or combinations of hardwareand software. Also, where applicable, the various hardware componentsand/or software components set forth herein may be combined intocomposite components comprising software, hardware, and/or both withoutdeparting from the spirit of the present disclosure. Where applicable,the various hardware components and/or software components set forthherein may be separated into sub-components comprising software,hardware, or both without departing from the scope of the presentdisclosure. In addition, where applicable, it is contemplated thatsoftware components may be implemented as hardware components andvice-versa.

Software, in accordance with the present disclosure, such as programcode and/or data, may be stored on one or more computer readablemediums. It is also contemplated that software identified herein may beimplemented using one or more general purpose or specific purposecomputers and/or computer systems, networked and/or otherwise. Whereapplicable, the ordering of various steps described herein may bechanged, combined into composite steps, and/or separated into sub-stepsto provide features described herein.

The foregoing disclosure is not intended to limit the present disclosureto the precise forms or particular fields of use disclosed. As such, itis contemplated that various alternate embodiments and/or modificationsto the present disclosure, whether explicitly described or impliedherein, are possible in light of the disclosure. Having thus describedembodiments of the present disclosure, persons of ordinary skill in theart will recognize that changes may be made in form and detail withoutdeparting from the scope of the present disclosure. Thus, the presentdisclosure is limited only by the claims.

What is claimed is:
 1. A system comprising: a non-transitory memory; andone or more hardware processors coupled to the non-transitory memory andconfigured to read instructions from the non-transitory memory to causethe system to perform operations comprising: identifying personallyidentifiable information from within an electronic communication to bedisplayed to via a plurality of pixels; generating a plurality of pixeldata corresponding to the personally identifiable information, whereinthe plurality of pixel data is accessible via a plurality of web links;receiving, from a computing device, a request to access the plurality ofweb links, wherein each of the plurality of web links uniquely map toone of the plurality of pixels; in response to receiving the request,determining pixel display data for each of the plurality of pixels; andcausing at least a portion of the plurality of pixels to be displayedaccording to the pixel display data within the electronic communicationon the computing device, wherein the plurality of pixels is displayed ina first pixel layout.
 2. The system of claim 1, the operations furthercomprising: determining device data for the computing device andcomprising at least one of an IP address, a MAC address, or a devicefingerprint; and determining to cause another portion of the pluralityof pixels to be displayed according to a second pixel layout based ondetermining that the device data does not correspond to a stored devicedata.
 3. The system of claim 1, wherein the pixel display data comprisesan output pixel color for each of the plurality of pixels that causes adisplay of the first pixel layout corresponding to an image of thepersonally identifiable information, an image corresponding to an errorcode, an image corresponding to a status error, or an imagecorresponding to a fraud alert.
 4. The system of claim 3, wherein priorto the determining the pixel display data, the operations furthercomprise: determining device data for the computing device and comprisesat least one of an IP address, a MAC address, or a device fingerprint;and determining whether to cause the display of the first pixel layoutcorresponding to the image of the personally identifiable informationbased determining whether the device data corresponds to stored devicedata.
 5. The system of claim 3, wherein prior to the determining thepixel display data, the operations further comprise: determining anaccount accessing the electronic communication via the computing device,wherein the account comprises one of an email account, a messagingaccount, or a social networking account; and determining whether toprovide the image via the first pixel layout based on the account,wherein the determining the pixel display data is further based on thedetermining whether to provide the image.
 6. The system of claim 1,wherein prior to the receiving the request, the operations furthercomprise: generating the first pixel layout based on a randomization ofpixel placements for the plurality of pixels within the first pixellayout; assigning the plurality of web links to the plurality of pixels;and transmitting the electronic communication to the computing device,and wherein the determining the pixel display data is further based onthe randomization of the pixel placements.
 7. The system of claim 1,wherein the pixel display data comprises at least one of alphanumerictext, a symbol, a graphical object, or an animation.
 8. The system ofclaim 1, wherein the causing the each of the plurality of pixels todisplay the pixel display data comprises returning a pixel display colorto the each of the plurality of pixels based on the pixel display dataand WebSocket network connections associated with the plurality of weblinks.
 9. The system of claim 1, wherein the request to access theplurality of web links comprises one of opening the electroniccommunication or requesting a display of the pixel display data withinthe electronic communication.
 10. The system of claim 1, wherein theelectronic communication comprises an email having an expiration timefor display of the personally identifiable information via the firstpixel layout.
 11. The system of claim 10, wherein the determining thepixel display data comprises: determining that the expiration time haslapsed; and determining the pixel display data based on the determiningthat the expiration time has lapsed, wherein the pixel display datahides the personally identifiable information.
 12. A method comprising:determining display data for displaying a pixelated image within anarrangement of pixels contained in an email; randomizing the arrangementof the pixels within a field of the email; determining a mapping of thepixels to uniform resource locators (URLs) in hypertext markup language(HTML) code for the email, wherein the mapping uniquely assigns each ofthe pixels to one of the URLs within the mapping; determining pixelpresentation data for each of the pixels based on the display data fordisplaying the pixelated image, wherein the pixel presentation datacomprises a pixel output for the each of the pixels that causes thepixelated image to be displayed within the randomized arrangement of thepixels; and providing the randomized arrangement of the pixels withinthe field of the email with the URLs for the pixels in the HTML code forthe email.
 13. The method of claim 12, wherein the pixel output for theeach of the pixels comprises one of a black output, a white output, acolor output, or no output.
 14. The method of claim 12, furthercomprising: receiving a request to display the pixel presentation datain the email based on an access request for the URLs through the HTMLcode; determining whether to display the pixelated image through thefield of the email based on the receiving the request; and displayingone of the pixelated image using the pixel presentation data or asecurity breach message based on the determining whether to display thepixelated image.
 15. The method of claim 14, wherein prior to thedetermining whether to display the pixelated image, the method furthercomprises: analyzing device data for a device that is accessing theemail based on authorized devices associated with the email, wherein thedevice data comprises at least one of a device identifier, a devicenetwork address, or a device fingerprint, wherein the determiningwhether to display the pixelated image is further based on theanalyzing.
 16. The method of claim 15, wherein the analyzing is furtherbased on account data for an account accessing the email and authorizedaccounts associated with the email, wherein the account data comprisesat least one of an account identifier or an account risk flag.
 17. Themethod of claim 14, wherein the security breach message comprises atleast one of a notification associated with one of a breach of theemail, a sharing of the pixelated image with an unauthorized entity, ora refresh instruction to display the pixelated image in an additionalemail.
 18. The method of claim 12, wherein the pixelated image comprisesan expiration parameter for a display of the pixelated image via thefield in the email, and wherein the method further comprises:determining that the expiration parameter has lapsed; and updating thepixel presentation data to prevent the display of the pixelated imagevia the field.
 19. A non-transitory machine-readable medium havingstored thereon machine-readable instructions executable to cause amachine to perform operations comprising: providing a pixel arrangementfor a digital image in an electronic communication, wherein each pixelwithin the pixel arrangement is uniquely associated with a virtual pathto a pixel display output for the each pixel in code for the electroniccommunication; transmitting the electronic communication to a computingdevice; detecting a viewing of the electronic communication based on arequest to access the virtual path for the each pixel in the pixelarrangement; and determining whether to display the digital image in thepixel arrangement.
 20. The non-transitory machine-readable medium ofclaim 19, wherein the operations further comprise: causing to bedisplayed, within the pixel arrangement, one of a fraud prevention imagewithin the pixel arrangement or the digital image using the pixeldisplay output for the each pixel.