Patent classifications
H04L51/00
Methods and systems for processing an ephemeral con tent message
Exemplary embodiments relate to techniques for transmitting ephemeral content messages. A sending client may establish an end-to-end encrypted session with possible recipients of the message, using a first decryption key during initial session setup. The client may send an ephemeral content message, including encrypted content and a second key, to the recipients through a server. The server may be unable to retrieve the encrypted content due to a lack of the second key. The server may filter a list of intended recipients, and may forward the ephemeral content message to the recipients on the filtered list. The recipients may retrieve the second key from the message, and use the first and second keys to decrypt the encrypted content. The sending client may change the second key each time the recipient list changes from the perspective of the sending client, as determined at the time the ephemeral content message is transmitted.
Managing membership rights in a data exchange
Systems and methods for managing membership in a private data exchange are provided herein. In one embodiment, the method includes generating, by a first member of a data exchange a listing. The listing comprises a reference to shared data within a database controlled by the first member. The method further includes providing a second member of the data exchange with a set of rights with respect to listing. The method further includes limiting, by a processing device, access for the second member to a portion of the shared data that is less than all of the database referenced by the listing based on the set of rights of the second member with respect to the listing.
Summarizing multi-modal conversations in a multi-user messaging application
An embodiment of a summarization application divides collected conversation data into media and text components. The application implements respective machine learning mechanisms to enhance modeling operations of the text and media components to identify key elements from the conversation. The application generates a headline banner from a group of key elements based on an analysis involving first predetermined criteria. The application also combines additional key elements to the group of key elements to form a second group of key elements. The application generates a summary from the second group of key elements based on a second analysis involving second predetermined criteria. The application presents, via a display, the headline banner according to a first output of the first key element analysis and the summary according to a second output of the second key element analysis.
Bulk message deletion
Systems and methods are provided for deleting messages. The systems and methods include operations for: establishing, by a computing device, a communication session between a plurality of users; receiving a plurality of messages in the communication session; determining that a first message of the plurality of messages has been read by a first user of the plurality of users at a read time; in response to determining that the first message has been read by the first user at the read time, automatically associating the read time with a second of the plurality of messages that precedes the first message in the communication session; and automatically deleting the first and second messages in response to determining that an elapsed time measured from the read time associated with the first and second messages corresponds to a threshold time period.
Prohibited Content Propagation using a Social Network Data Structure
A method for prohibiting email content propagation that receives, at a server, an email message. At the server, at least one email address associated with the email message which is designated not to receive a content of the email message is identified. At the server, the email message is modified by selectively removing a content of the email message to be conveyed to the at least one email address. The server conveys the modified email message to the at least one email address. The server conveys the email message to one or more recipient email addresses except the at least one email address. Consequently, the server has sent a submitted message to multiple email addresses, while modifying the content sent to a subset of the addresses that received the email message.
SYSTEMS AND METHODS FOR PROVIDING USER INTERFACES BASED ON ACTIONS ASSOCIATED WITH UNTRUSTED EMAILS
The present disclosure describes a system that notifies users regarding specific user decisions with respect to solution phishing emails. The system notifies users when users perform specific actions with respect to the untrusted phishing emails. The system pauses execution of these actions and prompts the user to confirm whether to take the actions or to revert back to review the actions. In contrast from anti-ransomware technologies which are entirely in control, the system gives the user autonomy in deciding actions relating to untrusted phishing emails. The system interrupts execution of actions related to untrusted phishing emails in order to give users a choice on whether to proceed with actions.
SYSTEM, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR GENERATING A GROUP-BASED COMMUNICATION INTERFACE HAVING IMPROVED PANES POSITIONED IN A DEFINED DISPLAY WINDOW
This disclosure is directed to a group-based communication system that is configured to generate a group-based communication interface comprising a priority pane, a last actions pane, and a missed pane. Each of the priority pane, the last actions pane, and the missed pane and configured for efficient positioning within a defined display window of a client device.
FICTITIOUS ACCOUNT GENERATION ON DETECTION OF ACCOUNT TAKEOVER CONDITIONS
Methods and systems for fictitious account generation on detection of account takeover conditions are described. A login attempt may be detected and determined to indicate fraud, such as when the login attempt is accompanied by many failed login attempts or is from an untrusted or known malicious endpoint. A fictitious account may be generated, which may include falsified account data and may limit account functionality to prevent unauthorized and fraudulent use of the account. The computing device that performs the login attempt may be routed and permitted to log in to the fictitious account, where the service provider or another computing entity may then monitor activity and usage of the fictitious account by the potentially malicious party. The fictitious account may be maintained so that other actors using the account may access the account and their activity also monitored.
MOBILE DASHBOARD FOR AUTOMATED CONTACT CENTER TESTING
A mobile dashboard for automated contact center testing gives up-to-the-minute status reports on your customer experience, enabling you to make operational decisions and drill down to the source Of an issue while on the go. A rookie-optimized executive dashboard display can be customized for each unique user, so business and technical stakeholders can filter the display for the customer experience (CX) metrics that re most relevant to them, and configure push notification alerts accordingly.
System and method for controlling configuration settings for mobile communication devices and services
A system for controlling configuration settings for mobile data communication devices and services includes a redirection server and a policy generation system. The redirection server detects a triggering event in a host system and in response to the triggering event continuously redirects data items from the host system to a wireless network. Each mobile data communication device receives data items from the wireless network and includes a device configuration stored in a memory location on the mobile data communication device. The device configuration of each mobile data communication device controls one or more functions of the mobile data communication device. The policy generation system receives a policy setting from a user interface and stores the policy setting in a user information record associated with a mobile data communication device. The redirection server detects the policy setting in the user information record and in response to detecting the policy setting transmits the policy setting over the wireless network to the mobile data communication device associated with the user information record. The mobile data communication device automatically modifies the device configuration to include the policy setting. Methods of controlling a configuration setting in mobile data communication devices are also disclosed.