Patent classifications
H04L51/00
MANAGEMENT OF HOSTED CHANNEL MEMBERSHIP IN A COMMUNICATION PLATFORM
Management of hosted channel membership of a communication platform is described. A request can be received from a first client of a first user, associated with a first organization, of the group-based communication platform, wherein the request is to associate a second user, associated with a second organization, with a communication channel of the first organization. An invitation to join the communication channel can be sent to a second client of the second user. In response to receiving an indication of an acceptance of the invitation, the second user can be associated with the communication channel. A request can be received from the second client to associate other user(s) associated with the second organization with the communication channel and the other user(s) can be associated with the communication channel based at least in part on permission(s) associated with the communication channel.
METHODS AND APPARATUSES FOR MANAGING EXTERNAL APPROVAL PROVISIONING AND EXTERNAL MESSAGING COMMUNICATION REQUESTS IN A GROUP-BASED COMMUNICATION SYSTEM
Various embodiments of the present disclosure are directed to a group-based communication system that is configured to more efficiently manage resource sharing requests. In particular, in some embodiments, the group-based communication system is configured to enable admin users to use an external service, such as an external approval provisioning service, that is separate and distinct from the group-based communication system to manage group-based communication resource sharing requests. In other embodiments, the group-based communication system is configured to allow communication with external users and to trigger new user onboarding protocols through the ingestion of external user directories associated with a sponsor user.
Personalized low latency communication
Embodiments relate to personalized low latency communications. A method may include receiving a description of content of a message, receiving recipient data corresponding to at least two possible recipients within a population of possible recipients, and selecting a relevant subpopulation of the population. The selecting may include, for each of the at least two possible recipients, ranking a strength of an indirect relationship between the description and the recipient data. The indirect relationship may be based on the description, the recipient data and at least one additional data source. The selecting may also include, for each of the at least two possible recipients, adding a possible recipient to the relevant subpopulation based on the ranking of the indirect relationship associated with the possible recipient. The method may further include initiating a two-way communication channel between a sender of the message and the relevant subpopulation.
Publish-subscribe messaging systems, methods, apparatuses, computer programs and computer program products
Complete and partial object publication using, for example, MQTT or other protocol is described. In some embodiments, an emphasis is placed on keeping the amount of state information that the broker must maintain to a minimum, as well as allowing idempotent operations over objects in order to keep the object view between the subscribers consistent. Embodiments are described in which only the parts of an object have changed are transferred to the subscribers who subscribe to that object.
Email sender and reply-to authentication to prevent interception of email replies
An electronic messaging system that reviews content of inbound messages, verifies elements of header fields, and initiates an action if Name (N) and Address (A) of From (F)_and Reply-To (R) elements of header fields match or do not match, those elements being N.sub.F=N.sub.R and A.sub.F≠A.sub.R, to protect recipients against inadvertent routing of their reply email to an imposter of the named From sender, thereby mitigating risk of recipients falling prey to what is referred to herein as “Reply-To Whaling” attacks, within the email security category of anti-phishing.
System and method for identifying pairs of related application users
Systems and methods for passive monitoring of computer communication that does not require performing any decryption. A monitoring system receives the traffic exchanged with each relevant application server, and identifies, in the traffic, sequences of messages—or “n-grams”—that appear to belong to a communication session between a pair of users. Subsequently, based on the numbers and types of identified n-grams, the system identifies each pair of users that are likely to be related to one another via the application, in that these users used the application to communicate (actively and/or passively) with one another. The system may identify those sequences of messages that, by virtue of the sizes of the messages in the sequence, and/or other properties of the messages that are readily discernable, indicate a possible user-pair relationship.
Techniques for supervising communications from multiple communication modalities
A computing device can receive communications sent using one or more communication modalities. The communications can be determined to be a single interaction. A communication object can be generated for the single interaction with a structure being consistent across different communication modalities. A policy can be identified that defines which communication objects to review. The communications can be reviewed along with one or more additional communications similar to the communication object.
Secured attachment management
The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.
Replay of conversations for task completion and delegation
A system is configured to replay a selected conversation with a selected agent. The selected conversation may be selected from a plurality of previously conducted conversations with other agents. The selected agent may be selected from a plurality of available agents. The system determines various tasks, named entities, and user preferences from the selected conversation. During a replay of the selected conversation with the selected agent, the system generates responses to messages received from the selected agent based on the determined tasks, named entities, and user preferences. The system also allows a user to select whether the replayed conversation should be conducted in a passive mode or in an active mode. In a passive mode, the system generally conducts the replayed conversation autonomously whereas, in an active mode, the system requests user input before sending a response to the selected agent.
Secure communication platform for a cybersecurity system
An expert interface component can automatically connect a system user with a system support expert. A user interface module can present a threat-tracking graphical user interface and a query interface component integrated into the threat-tracking graphical user interface to a system user belonging to a client team to review a potential cyber threat and receive a query for assistance. The query interface component can allow the system user to digitally grab a visual data container displaying information and containing a data object. The query interface component can collect the visual data container from the threat-tracking graphical user interface into a collection window of the query interface component. A communication module provides an incident ticket containing the query and the visual data container to a system support expert at a remote platform.