H04L51/00

Interaction tracking and organizing system
10334397 · 2019-06-25 · ·

A server that cross-references a first user's device location with registered members in a spatial proximity of the first user's device and returns the results by disclosing personal user attributes including pictures and names of all members in the spatial proximity of the first user's device. The first user who initiated the inquiry may select from the results returned any discovered user he/she wishes to connect with and send a form of invitation to connect using network available tools such as email, SMS, text or any customized invitation form. The invitation to connect to the inquiring user includes his/her personal attributes including a picture and name. The discovered member who received the invitation may accept, ignore, or decline connecting with the inquiring user. The first user may also receive an invitation from the server to accept, ignore, or decline connecting with the discovered member.

FITNESS ACTIVITY RELATED MESSAGING
20190190862 · 2019-06-20 ·

In one embodiment, a method for generating a message to a friend of a user is provided, comprising: processing activity data of a first user measured by an activity monitoring device to update a value of an activity metric for the first user; identifying a change in an inequality relationship between the value of the activity metric for the first user and a value of the activity metric for a second user; in response to identifying the change in the inequality relationship, prompting the first user to generate a message to the second user.

RECURRENT NOTIFICATION FRAMEWORK

A notification job is executed as a background job in a recurrent notification framework. The registered scenario along with the recurrent notification information is retrieved from a central notification scenario registration table. The user information along with an application context is retrieved from a notification scenario BADI. The user information along with a notification preference is retrieved from a user registration table. The mapping information of the user identifier and the device identifier is retrieved from the device registration table. Based on the retrieved information, the notification channel is identified from the recurrent notification information. A recurrent notification is sent through the notification channel to a device.

ELECTRONIC MAIL SECURITY USING A HEARTBEAT

Electronic communications passing through a communication gateway or similar device for an enterprise can be monitored for indicators of malicious activity. When potentially malicious activity is identified, a user-based inquiry can be employed to identify potential sources of the malicious activity within the enterprise network. More specifically, by identifying a user that sourced the communication, instead of or in addition to a network address, devices within the enterprise network associated with the user can be located, analyzed, and remediated as appropriate.

Message response routing

Systems and methods for extracting contact information from a message are described. A system can receive a message for a recipient, where the message originates from a message source having a first contact identifier (i.e., phone number, text address, etc.). The system can determine text data associated with the content of that message and process the text data to determine that the message refers to a second contact identifier that is different from the first contact identifier. The system may output the message to a recipient device (such as using text-to-speech, etc.) and may store an association between the message source and the second contact identifier. When the recipient speaks a command to reply to the first message or contact the message source, the system may determine the reply is intended for the message source and may route the reply using the second contact identifier included in the first message.

MAILBOX PROTECTION IN WEB CONFERENCING SYSTEMS
20190182063 · 2019-06-13 ·

Techniques for protecting mailboxes in computer-implemented conferencing systems are disclosed herein. In one embodiment, a method includes caching availability data representing availability information of meeting participants in a mailbox corresponding to a meeting organizer. The method also includes monitoring a mailbox size of the mailbox corresponding to the meeting organizer and determining whether the monitored mailbox size exceeds a preset threshold. The method further includes in response to determining that the monitored mailbox size exceeds the preset threshold, ceasing to cache additional availability data representing new availability information of the meeting participants received at the mailbox in order to prevent performance degradation of accessing the mailbox by the meeting organizer via the computer network.

Efficient communication for devices of a home network

Systems and methods are provided for efficient communication through a fabric network of devices in a home environment or similar environment. For example, an electronic device may efficiently control communication to balance power and reliability concerns, may efficiently communicate messages to certain preferred networks by analyzing Internet Protocol version 6 (IPv6) packet headers that use an Extended Unique Local Address (EULA), may efficiently communicate software updates and status reports throughout a fabric network, and/or may easily and efficiently join a fabric network.

Location-based discovery of network members
10321267 · 2019-06-11 · ·

A technique for allowing members of the same social network using mobile devices to discover others in the vicinity by personal attributes and in specific picture(s) and name for the purpose of connecting, and the ability to use functions provided by a social network such as SMS, e-mail, chat/instant messaging, multimedia, or video by using unique hardware identification of each member mobile device and personal login information that are stored in a network server computing device; and associating the unique apparatus of the members' hardware with the members' personal profile such that when a search is initiated between members, the results contain the members' profile's picture(s), name, location and additional information as stored in the profiles. The proximity of the users is determined by static or dynamic location of the actual device location identified through mobile radio frequency location technology and internet IP information and saved in the user profile.

Translating building automation events into mobile notifications

Devices, methods, and systems for translating building automation events into mobile notifications are described herein. One device includes a memory, and a processor configured to execute executable instructions stored in the memory to receive a notification of an event from a building automation system, translate the event into a mobile notification of the event, and transmit the mobile notification of the event to a mobile device.

REMINDER VIEWS IN EMAIL APPLICATIONS

Systems, methods, and software disclosed herein facilitate draft reminders. In at least one implementation, a primary view of an information management application is rendered. In various scenarios the primary view may include primary items, such as emails, events, tasks, or other types of items. When a reminder view is invoked, draft items are identified to include in the reminder view. The reminder view is then rendered in an overlaid manner with respect to the primary view and includes the draft items.