H04L51/00

Biometric authentication device, biometric authentication method, and program
11379569 · 2022-07-05 · ·

A biometric authentication method causes a processor of a biometric authentication device to execute a process. The process may include: receiving user identification information and sensor type information from a terminal; confirming whether or not the received sensor type information has a predetermined relationship with a registered sensor type information corresponding to the received user identification that is among sensor type information of biometric sensors that have acquired biometric data registered for respective user identification information; and controlling, based on the confirmed sensor type information having the predetermined relationship, the issuance of a password to be used to re-register biometric data.

Device and method for processing a message
11411909 · 2022-08-09 · ·

A message treatment process executed by a user's terminal when a message is being drafted is disclosed. The terminal has access to a corpus of messages containing at least one message sent by that user to at least one recipient user. In one aspect, at least one part of the message drafted by the user is retrieved. Concerning at least one message in the corpus, a semantic similarity score is calculated with a view to match at least part of the draft message with one message at least in the predetermined corpus of messages. At least one message is selected in the corpus of messages, based on the semantic similarity score calculated for a least one message in the corpus, then at least part of a previously received reply to at least one selected message is replicated.

Systems and methods for custodial email management and transaction verification

A proxy email account management system configured to identify emails comprising receipt information and match the identified emails to respective transactions. The proxy email account management system may comprise a custodial email management system associated with a proxy email address. The custodial email management system may parse emails for receipt information and account-holder information, identify receipt information and account-holder information, determine if the emails correspond to a purchase made by an account-holder, and forward the email to a primary email address associated with the account-holder.

Systems and methods for merging tenant shadow systems of record into a master system of record

The present disclosure is related to systems and methods of merging tenant shadow systems of record into a master system of record. First tenant record objects of a first tenant system of record can be accessed. A master record object for a master system of record can be generated using the corresponding first tenant record object. A second tenant record object of a second tenant system of record can be accessed. Whether the second tenant record object is to be merged into the corresponding master record object can be determined. When determined to merge, the second tenant record object can be merged into the corresponding master record object. When determined to not merge, a new master record can be generated.

Dual fallback hardened VoIP system with signal quality measurement

A hardened VoIP system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing LMR systems, a secure voice platform ensures malicious software, unauthorized access and brute force security attacks will not compromise the voice communications of the system. The VoIP system is engineered to ensure graceful system degradation in the event of maintenance activities, natural disasters and failure modes. The hardened VoIP system offers the functions a LMR trunking system while utilizing broadband connections. Private calls, group calls, Emergency Alarms with covert monitoring capability, scanning and priority scanning may be incorporated into the system. The system includes a VoIP controller that serves as a trunking controller, manages available VoIP based conference bridges, and assigns them as needed to the parties involved in each voice call. The system includes multiple fallback methods that may be prioritized based on pre-failure analytics.

Dual fallback hardened VoIP system with signal quality measurement

A hardened VoIP system is presented that includes secure push-to-talk voice functionality. Through the addition of encryption, authentication, user filtering, and integration with new and existing LMR systems, a secure voice platform ensures malicious software, unauthorized access and brute force security attacks will not compromise the voice communications of the system. The VoIP system is engineered to ensure graceful system degradation in the event of maintenance activities, natural disasters and failure modes. The hardened VoIP system offers the functions a LMR trunking system while utilizing broadband connections. Private calls, group calls, Emergency Alarms with covert monitoring capability, scanning and priority scanning may be incorporated into the system. The system includes a VoIP controller that serves as a trunking controller, manages available VoIP based conference bridges, and assigns them as needed to the parties involved in each voice call. The system includes multiple fallback methods that may be prioritized based on pre-failure analytics.

Systems and methods for filtering notifications for end points associated with a user
11411904 · 2022-08-09 · ·

Described embodiments provide systems and method for filtering notifications across multiple end points associated with a user. A server can establish, for a user of an end point, a session with the end point. The server can identify properties of a plurality of applications and properties of the plurality of end points. A filter can be generated for the user and the filter can include one or more polices to selectively permit or prevent notifications received from one or more applications through the client application. The server can apply the filter to the applications and use the filter to filter one or more notifications received from the applications to selectively permit or prevent the one or more notifications from being received at each end point of the plurality of end points that the user accesses during the session to the server through the client application.

ELECTRONIC MESSAGING SECURITY AND AUTHENTICATION

An electronic messaging method comprises, in respect of a message received from a purported sender, determining if a blockchain transaction identifier is appended to the message, and comparing a hash created from the message body, the purported identity of the sender and the identity of the recipient with a hash stored on a blockchain network identified by the blockchain transaction identifier. When the created hash does not match with the stored hash, the received message is determined to be not from the purported sender. When the created hash matches the stored hash, the method may check a blockchain address registry associated with the blockchain network to determine if a blockchain address corresponding to the blockchain transaction identifier has an associated valid address in the blockchain address registry. A receipt transaction may be committed to the blockchain network in respect of the received message.

Method, system, and non-transitory computer-readable record medium for managing event messages and system for presenting conversation thread

Methods, systems, and non-transitory computer-readable record media for managing event messages may be provided. A message management method may include generating, by at least one processor, an event related to a chatroom based on an event message input from the chatroom, assigning, by the at least one processor, a reply to the event message, from among messages in the chatroom, to the event, and displaying, by the at least one processor, the reply to the event message in association with the event.

SUMMARIZING MULTI-MODAL CONVERSATIONS IN A MULTI-USER MESSAGING APPLICATION

An embodiment of a summarization application divides collected conversation data into media and text components. The application implements respective machine learning mechanisms to enhance modeling operations of the text and media components to identify key elements from the conversation. The application generates a headline banner from a group of key elements based on an analysis involving first predetermined criteria. The application also combines additional key elements to the group of key elements to form a second group of key elements. The application generates a summary from the second group of key elements based on a second analysis involving second predetermined criteria. The application presents, via a display, the headline banner according to a first output of the first key element analysis and the summary according to a second output of the second key element analysis.