H04L51/00

Systems and methods for third party risk assessment

Embodiments for systems and methods for third party assessment related to the evaluation of risks associated with third parties in which hacker conversations on websites are filtered and analyzed using keywords as input to uncover relevant forum and marketplace discussions are disclosed herein.

Managing multiple forms of messages in a messaging application
11336607 · 2022-05-17 · ·

Provided is a method of providing a function of managing a VIP message. The method includes transmitting and receiving messages from a plurality of clients; setting at least one of the plurality of clients to a specific person; extracting messages transmitted by a specific person among the transmitted and received messages as VIP messages; combining the extracted VIP messages; and providing the combined VIP messages through a combined chat room.

Proxy-based messaging system of a telecommunication network
11336740 · 2022-05-17 · ·

A method for transmitting data messages between endpoints of a telecommunication network includes: transmitting, by a sending endpoint of the telecommunication network, a data message to a messaging system of the telecommunication network; receiving, by a messaging proxy of the messaging system, the data message; and forwarding, by the messaging proxy, the data message to a data queue or a data topic provided by a message bus of the messaging system.

Integration of chat messaging in email

Disclosed are various approaches for integrating chat conversations with email messages. A user can request to view a received email message exchanged between multiple entities. If there is an established chat conversation associated with the user that is linked to the email message, the user interface including the email message can include a messaging component that can allow a user to view the corresponding chat conversation. The user interface can also include a component that allows the user to initiate a chat conversation with another party included in the email without switching to a third-party service.

User model-based data loss prevention

A cloud security service provides network security. The cloud security service receives, via a computer network, an electronic message sent by a sending user of an enterprise to a receiving user. The cloud security service analyzes the electronic message using a machine-learned user model describing the sending user's electronic messages, the user model generated based at least in part on previous electronic messages sent by the sending user. The cloud security service determines, based on the analysis, that the electronic message violates a security policy of the enterprise. The cloud security service performs a security action based on the determination that the electronic message violates the security policy.

Devices, Methods, and Graphical User Interfaces for Messaging

An electronic device displays a messaging user interface of a message application, including a conversation transcript of a messaging session between a user of the electronic device and at least one other user, a message-input area, the conversation transcript including a plurality of messages and a plurality of message regions, each message region containing a respective message of the plurality of messages. In response to a first input corresponding to a first respective message in the conversation transcript, displaying an indication that the first respective message has been selected. In response to one or more second inputs, including message composition inputs, displaying in a second message region in the conversation transcript a second message corresponding to the message composition inputs, and displaying a grouping indicia that connects the first respective message region with the second message region.

DATA STORAGE ARCHITECTURE FOR AN ENTERPRISE COMMUNICATION SYSTEM

Various embodiments are directed to group-based data storage systems configured for maintaining data exchanged between client devices within channel-specific shards each corresponding with one or more group-identifiers to provide group-based access to those channel-specific shards and for applying group-specific policies for data stored within those channel-specific shards. Membership of particular users within particular groups and within particular channels may be monitored such that access to particular channel shards may be controlled based on group-memberships of the users, and access to data stored within particular channel shards may be controlled based on channel-memberships of the users.

MESSAGE SENDING METHOD AND TERMINAL DEVICE
20220150201 · 2022-05-12 · ·

A message sending method includes: obtaining message content input by a user and contacts selected by the user; and sending the message content to a contact that does not meet a preset condition among the contacts selected by the user, and/or sending preset content to a contact that meets the preset condition among the contacts selected by the user.

EXECUTING REAL-TIME MESSAGE MONITORING TO IDENTIFY POTENTIALLY MALICIOUS MESSAGES AND GENERATE INSTREAM ALERTS
20220150276 · 2022-05-12 ·

Aspects of the disclosure relate to identifying potentially malicious messages and generating instream alerts based on real-time message monitoring. A computing platform may monitor a plurality of messages received by a messaging server associated with an operator. Subsequently, the computing platform may detect that a message of the plurality of messages is potentially malicious. In response to detecting that the message of the plurality of messages is potentially malicious, the computing platform may execute one or more protection actions. In executing the one or more protection actions, the computing platform may generate an alert message comprising information indicating that the message of the plurality of messages is potentially malicious. Then, the computing platform may send the alert message to the messaging server, which may cause the messaging server to deliver the alert message to a computing device associated with an intended recipient of the message.

DETERMINING TOPIC COHESION BETWEEN POSTED AND LINKED CONTENT

Systems and method for determining a topic cohesion measurement between a content item and a hyperlinked landing page are presented. In one embodiment, a plurality of content item signals is generated for the content item and a corresponding plurality of signals are generated for the hyperlinked landing page. An analysis of the corresponding signals is conducted to determine a measurement of topic cohesion, a topic cohesion score, between the content item and the hyperlinked landing page. A cohesion predictor model is trained to generate the predictive topic cohesion score between an input content item and a hyperlinked landing page. Upon a determination that the topic cohesion score is less than a predetermined threshold, remedial actions are taken regarding the hyperlink of the content item. Alternatively, positive actions may be carried out, including promoting the content item to others, associating advertisements with the content item, and the like.