Patent classifications
H04L51/00
Analysis of content sharing in a messaging platform
A system and method for message analysis, including: receiving, from a client device, a reporting request identifying a first broadcasted message authored by a context account of a messaging platform; identifying, by a computer processor, engagement data corresponding to engagement with the first broadcasted message by a set of engaging accounts of the messaging platform that engaged with the first broadcasted message; generating, using the engagement data and by the computer processor, propagation data representing propagation of the first broadcasted message in a connection graph of the messaging platform; and providing the propagation data for the client device in response to the reporting request, where the client device is operable to display a visual representation of the propagation data.
METHODS, SYSTEMS, AND COMPUTER-READABLE MEDIUMS FOR CONFIGURING ELECTRONIC MESSAGING APPLICATIONS
Methods, systems, and computer-readable mediums configure electronic messaging applications to communicate with a server storing messages to and/or from an electronic messaging account of a user. A method involves receiving an electronic message address and a password of the user as inputs, deriving server connection settings based on the electronic message address, and applying the server connection settings to the electronic messaging account. Another method involves receiving an electronic message address of the user and discovering the server connection settings for the electronic messaging account on a server having a designated protocol name as a server prefix name to assist in locating the server and having the server connection settings. The method also involves retrieving the server connection settings from a file provided by the server in response to locating the server having the designated name and applying the server connection settings to the electronic messaging account.
MULTI-USER MULTI-GPU RENDER SERVER APPARATUS AND METHODS
The invention provides, in some aspects, a system for rendering images, the system having one or more client digital data processors and a server digital data processor in communications coupling with the one or more client digital data processors, the server digital data processor having one or more graphics processing units. The system additionally comprises a render server module executing on the server digital data processor and in communications coupling with the graphics processing units, where the render server module issues a command in response to a request from a first client digital data processor. The graphics processing units on the server digital data processor simultaneously process image data in response to interleaved commands from (i) the render server module on behalf of the first client digital data processor, and (ii) one or more requests from (a) the render server module on behalf of any of the other client digital data processors, and (b) other functionality on the server digital data processor.
Network-based service for secure electronic mail delivery on an internet protocol network
A network is disclosed that includes a message originator computer and a message recipient computer, for secure electronic mail delivery. In accordance with the invention, the network includes a message delivery server that can distinguish between real and phantom messages. In operation, the message originator computer waits a random time and then transmits a first encrypted phantom message to the message delivery server. This message is to spoof an eavesdropper into believing that there is a steady stream of messages being sent from the originator computer. However, the message delivery server recognizes the message as a phantom message and discards it. When the message originator computer receives a user request to transmit a real message to the recipient computer, it waits a random time and then encrypts and transmits the real message to the message delivery server. The message delivery server recognizes the message as a real message and forwards the real message to the recipient computer. Meanwhile, the message originator computer can continue transmitting encrypted phantom messages to the message delivery server. In this manner, an eavesdropper will be tricked into believing that there is a steady stream of messages being sent from the originator computer.
Systems and methods for storing and transferring message data
Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for storing and transferring messages. An example method includes providing a queue having an ordered plurality of storage blocks. Each storage block stores one or more respective messages and is associated with a respective time. The times increase from a block designating a head of the queue to a block designating a tail of the queue. The method also includes reading, by each of a plurality of first sender processes, messages from one or more blocks in the queue beginning at the head of the queue. The read messages are sent, by each of the plurality of first sender processes, to a respective recipient. One or more of the blocks are designated as old when they have associated times that are earlier than a first time. A block is designated as a new head of the queue when the block is associated with a time later than or equal to the first time. One or more of the first sender processes is allowed to read messages from the old blocks until a second time which is later than the first time. One or more of the old blocks are deleted at a time later than or equal to the second time.
Method and apparatus for controlling uplink transmission on discontinuous reception operation in wireless communication system
A method for controlling uplink transmissions on discontinuous reception (DRX) operation, by a wireless device, in a wireless communication system, the method comprising: configuring a channel quality indicator (CQI)-masking which indicates that at least one of a CQI, a precoding matrix index (PMI), a rank indicator (RI), or a precoding type indicator (PTI) is not to be reported on a physical uplink control channel (PUCCH) when an onDurationTimer is not running; and determining, at a first subframe prior to a second subframe, whether or not the onDurationTimer is to be running at the second subframe, wherein the at least one of the CQI, the PMI, the RI, or the PTI is not to be reported on the PUCCH at the second subframe, if the onDurationTimer is determined, at the first subframe, to be not running at the second subframe.
DYNAMIC GRANULAR MESSAGING PERSISTENCE
Embodiments of the present invention provide a method, system and computer program product for dynamic, granular messaging persistence in a messaging system. In an embodiment of the invention, a method for dynamic, granular messaging persistence in a messaging system is provided. The method includes monitoring operational performance of a message broker and receiving a message for queuing in a message queue of the message broker. The method also includes parsing the message to extract different fields and corresponding priorities and selectively storing in fixed storage, data for corresponding ones of the different fields based upon consideration of corresponding ones of the priorities and the monitored operational performance. Finally, the method includes queuing the message in the message queue.
Computerized system and method for advanced network content processing
A computerized system and method for processing network content in accordance with at least one content processing rule is provided. According to one embodiment, the network content is received at a first interface. A transmission protocol according to which the received network content is formatted is identified and used to intercept at least a portion of the received network content. The intercepted portion of the network content is redirected to a proxy, which buffers the redirected portion of network content. The buffered network content is scanned in accordance with a scanning criterion and processed in accordance with the at least one content processing rule based on the result of the scanning. The processed portion of network content may be forwarded using a second interface.
ZERO-KNOWLEDGE ENVIRONMENT BASED SOCIAL NETWORKING ENGINE
Methods, systems, and apparatus are described providing social networking engines. Specifically, the present specification relates to a method for implementing software containers implementing social network engines that may be configured to act in a zero-knowledge environment. In such implementations, all information pertaining to the social network engine associated with a user that is stored in the container is solely that of a user unless explicitly shared by the user. In some implementations, the containers may be configured to participate in a publish-and-subscribe network in order to share information. In addition, the containers may be provisioned with controls so that global operators may comply with local privacy rules.
INCREASED COMMUNICATION SECURITY
A system may include a first computer system and a second computer system. The first computer system may be configured to generate a Constrained Application Protocol (CoAP) message including authentication data and message data. The first computer system may be further configured to communicate the CoAP message for delivery to the second computer system. The second computer system may be configured to perform message validation based on the authentication data.