H04L51/00

Single instance storage of metadata and extracted text

Embodiments of the present disclosure are directed to a method for processing computer readable electronic files in an investigation in a computer system including a processor coupled to a display and an electronic storage device coupled to the processor. The method includes the processor accessing the electronic files and related data from a data source. The accessed files and related data are culled by the processor based on predetermined filter criteria. The processor stores the remaining files and related data in a third-party data repository and maps a set of electronic files and related data stored in the third-party data repository into a predetermined database schema. The mapped files and related data are analyzed by the processor, which applies a status decision on them. The analyzed electronic files and related data are submitted to a third-party e-discovery processing application based on the applied status decision.

HARVESTING AND DISTRIBUTING A CERTIFICATE BASED ON A DNS NAME

According to certain embodiments, a delivery manager comprises an interface and processing circuitry. The interface is configured to receive a certificate that a DNS associates with a DNS name of a first endpoint. The processing circuitry is configured to distribute the certificate to a second endpoint. The second endpoint is configured to store the certificate in a local memory of the second endpoint and, in response to a future determination to establish a connection with the first endpoint, use the certificate from the local memory of the second endpoint to establish transport layer security (TLS) for the connection.

Intelligent messaging system based temporary receiver registration for electronic message communications

An intelligent messaging server (herein messaging server) that is communicably coupled to trusted directory nodes receives, from a first user computing device, an electronic request that includes at least a unique identifier of a second user. Using the unique identifier, the messaging server determines that the second user is a registered user of the messaging server. Responsive to a negative determination that the second user is a registered user, the messaging server generates and transmits an electronic registration message to the second user. The electronic registration message includes a link to a secure web page that prompts the second user to temporarily register with the messaging server. Responsive to a temporary registration of the second user, the messaging server generates a record that includes at least an account identifier of the temporarily registered second user's account, providing enhanced security to the second user's data via the trusted directory nodes.

PHONE APPLIANCE WITH DISPLAY SCREEN AND METHODS FOR USING THE SAME
20190245952 · 2019-08-08 ·

A phone appliance and method of use are provided where the phone appliance can be used to make VoIP communications calls. In a preferred embodiment, the phone appliance includes an RF connection for connecting to a computer or other computing device for facilitating the placement of the VoIP communications calls. The phone appliance further includes a display or portal for depicting advertisements provided by various advertisers. The advertisements provided can be used to defray all or part of the cost associated with making VoIP communications calls. The portal can also be used to communicate with businesses for ordering products. such as ordering a pizza, and to perform various services, such as purchasing stocks. In an exemplary system, the phone appliance is used to transmit to a control center information related to the user of the phone appliance, such as interests and buying habits, and queries for receiving additional information for various advertised products and services. The control center transmits the queries to the appropriate vendors for providing the user with additional information. Other functions and features are provided to the phone appliance, such as being able to download e-mail messages stored within or received by the computer.

Efficient Communication for Devices of a Home Network

Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an electronic device may efficiently control communication to balance power and reliability concerns, may efficiently communicate messages to certain preferred networks by analyzing Internet Protocol version 6 (IPv6) packet headers that use an Extended Unique Local Address (EULA), may efficiently communicate software updates and status reports throughout a fabric network, and/or may easily and efficiently join a fabric network.

SERVER AND NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER-READABLE INSTRUCTIONS FOR SERVER
20190245854 · 2019-08-08 ·

A server may receive a target e-mail address from a terminal device; store in the memory the target e-mail address and authentication information in association with each other; send a first e-mail including the target e-mail address, as a destination address, and the authentication information; receive the authentication information from the first communication device; specify the target e-mail address associated with the authentication information in the memory; and execute a predetermined process by using the target e-mail address, the predetermined process being a process which is necessary for the server or the first communication device to send a second e-mail including the target e-mail address, as a destination address, and related information related to the first communication device.

SYSTEM AND METHOD FOR PROVIDING TO PUSH NOTIFICATIONS TO COMMUNICATION ENDPOINTS
20190245895 · 2019-08-08 ·

A first Session Initiation Protocol (SIP) INVITE message is received to establish a communication session where a communication application, in a first communication endpoint that is used to establish the communication session has been suspended or is not running. A first message is sent that causes the communication application to become active. A second message is received from that indicates that the communication application is active. Various processes are then used to establish the communication session with the previously suspended or not running communication application.

Secure Electronic Mail System
20190238493 · 2019-08-01 ·

An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.

Secure Electronic Mail System
20190238494 · 2019-08-01 ·

An e-mail system is disclosed that overcomes many deficiencies of, but is backward compatible with, existing e-mail systems. Embodiments of the system may include various features, including but not limited to: (1) secure transfer of e-mail messages, without the need for users to replace existing e-mail clients or to change e-mail addresses; (2) tracking of all actions performed in connection with an e-mail transmission; (3) the ability for a recipient to view information about an e-mail message, optionally including information about how other addressees have responded to it, before deciding whether to retrieve the e-mail message; (4) the aggregation of entire e-mail conversations into a single threaded view; (5) the ability to include both private and public messages in a single e-mail communication; (6) sender control over downstream actions performed in connection with an e-mail message; (7) flexible control over cryptographic methods used to encrypt emails messages for storage.

Security for mobile and stationary electronic systems

An automated system and method for electronic systems is disclosed providing proactive and anticipatory autonomous security procedures for mobile device and stationary environments including hybrid security and authentication mechanisms.