Patent classifications
H04L51/00
Managing an electronic mail in a communication network
A method for managing an electronic mail. A command list of a communication electronic mail transmission protocol is partitioned into command sub-lists using recursive parameters appearing in the command list prior to the partitioning of the command list. Each recursive parameter is a command that is repeated in respective command sub-lists as a result of the partitioning. Each command sub-list includes at least one command pertaining to a receiver or sender of the electronic mail. Each command sub-list is individually selectable for subsequent use of the at least one command in a subsequently selected command sub-list in implementing the electronic mail. A selection of at least one of the command sub-lists viewable in a user interface is received. Each command of the at least one command specifies a respective aspect of how to implement the electronic mail in a subsequent implementation of the electronic mail.
COLLABORATIVE WORKFLOW THROUGH MESSAGING CONVERSATIONS
A networked application and email application were described herein that provide for an intuitive system by which users can participate in collaborative workflow relating to a network document. In one implementation, a system includes a messaging server component to provide messaging services and an application server component to provide a networked application. The application server component interacts with the messaging server component in response to a user command to initiate collaboration on the network document. The interaction with the messaging server component includes providing a link that refers to a version of the network document as created or edited by the user.
METHOD AND APPARATUS FOR PROCESSING SCHEDULING REQUESTS IN A SHARED CALENDAR SYSTEM
According to a computer-implemented method, a scheduling request is received to schedule a user in a shared calendar system as a participant in a meeting to occur on a specified date. Based on a predefined meeting policy, a determination is made of a maximum permissible quantity of meetings for the user to participate in during a predefined time period that includes the specified date. A quantity of meetings in the shared calendar system that are already scheduled for the user to occur within the predefined time period is compared to the maximum permissible quantity of meetings for the user. Based on the comparing indicating that the quantity of meetings already scheduled is greater than or equal to the maximum permissible quantity of meetings, a notification is transmitted to the user to indicate that that approval of the scheduling request would violate the predefined meeting policy.
Method and apparatus for controlling uplink transmission on discontinuous reception operation in wireless communication system
A method for controlling uplink transmissions on discontinuous reception (DRX) operation, by a wireless device, in a wireless communication system, the method includes configuring a channel quality indicator (CQI) masking which indicates that channel state information is to be reported on a physical uplink control channel (PUCCH) while an onDurationTimer is running; determining, at a first subframe prior to a second subframe, whether or not the onDurationTimer is to be running at the second subframe according to whether or not a physical downlink control channel (PDCCH) is received at the first subframe; and controlling the uplink transmissions so as not to report the channel state information on the PUCCH at the second subframe if the onDurationTimer is determined, at the first subframe, to be not running at the second subframe, wherein the channel state information includes at least one of a CQI, a precoding matrix index (PMI).
Providing additional information related to a vague term in a message
Methods and apparatus related to providing additional information related to a vague term in a message. For example, in some implementations, one or more messages sent by a sender and received by one or more recipients may be identified, a vague term in the message may be identified, a user-restricted database may be identified that is associated with the sender or a recipient, and additional information related to the vague term may be determined from the user-restricted database. A vague term is a term which may have multiple meanings and that can be clarified with additional information. In some implementations, user-restricted databases may include additional information that is associated with the user that may be utilized to replace the vague term with a clarified term. In some implementations, a user-restricted database may be utilized to identify additional information in another database that may be utilized to clarify the vague term.
Managing email content in an activity stream
Managing email content in an activity stream includes receiving a selection of a number of criteria that indicate content to be presented in an activity stream, retrieving email content based on the number of criteria, and displaying the email content in an activity stream by referencing email data related to the metadata.
System and method for targeting information based on message content in a reply
A method of presenting information to a party through a messaging application is described. Responsive to receipt of a communication from a party (e.g., the first user), a reply is sent. The communication and the reply is presented in an interface to the sender. The messaging system determines matching content that is relevant to one or both of the communication and the reply and determines a quality of the match. Determining the quality of the match may include determining a score for an advertisement based on the advertisement's responsiveness to content identified in the reply message that was sent. Based on a determination that the quality is above a threshold, the matching content is presented along with the communication and the reply.
System and method for targeting information based on message content in a reply
A method of presenting information to a party through a messaging application is described. Responsive to receipt of a communication from a party (e.g., the first user), a reply is sent. The communication and the reply is presented in an interface to the sender. The messaging system determines matching content that is relevant to one or both of the communication and the reply and determines a quality of the match. Determining the quality of the match may include determining a score for an advertisement based on the advertisement's responsiveness to content identified in the reply message that was sent. Based on a determination that the quality is above a threshold, the matching content is presented along with the communication and the reply.
Managing Assets
A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.
DETECTION OF EMAIL SPOOFING AND SPEAR PHISHING ATTACKS
A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender. If the determined statistical dispersion is lower than a dispersion threshold, the received email may be evaluated in the processor against a plurality of conditions associated with email spoofing and spear phishing attacks, using the generated contact model, to generate a features vector that is constituted of a plurality of binary values and a plurality of dispersion values between 0 and 1, and using at least the generated features vector to classify with a supervised learning algorithm the received email as a likely legitimate email or as a likely malicious email spear phishing attack; and notifying a recipient of the email when the received email is classified as a likely malicious email spear phishing attack.