H04L51/00

Systems and methods for screening electronic communications

According to certain aspects of the disclosure, a computer-implemented method computer-implemented method may be used for screening electronic communications. The method may comprise analyzing contents of an electronic communication to determine whether the contents include sensitive information. A recipient list of the electronic communication may be compared to a screening list. Based on the analyzing and the comparing, it may be determined whether the contents are permitted to be transmitted to the recipient list. Upon determining that the contents are not permitted to be transmitted to at least one party of the recipient list, a notification may be provided to an author of the electronic communication indicating that contents are not permitted to be transmitted to the at least one party of the recipient list.

Intelligent determination of whether to initiate a communication session for a user based on proximity to client device

A client device receives a request to initiate a communication session with a particular user of a first plurality of users that are registered with the client device. The client device determines, using a sensor of the client device, a respective identity of each of a second plurality of users that are proximate to the client device. The client device determines whether an identity of the particular user matches the respective identity of any of the second plurality of users, and, in response to determining that the identity of the particular user matches the respective identity of any of the second plurality of users, the client device transmits the request to a device of the particular user.

Web control with real-time content analysis
11412057 · 2022-08-09 · ·

The present disclosure describes a client-based web control system for analyzing and filtering web content received at a user device and presenting the filtered content on the user device in real-time, one or more operations and functions being efficiently achieved via this system comprise: receiving, at a user device, web content; identifying, at the user device, at least one model for classifying the web content; performing, at the user device, real-time analysis on the web content using the at least one model to classify the web content and determine a classification result; and taking an action on the web content at the user device based on the classification result. The present disclosure also describes the web control system including a cloud server, which, in conjunction with the user device, analyzes and classifies the web content.

Systems and methods to curate notifications from unsubscribed social media accounts
11409824 · 2022-08-09 · ·

Methods and systems for curating notifications from unfollowed accounts are described herein. The system tracks that a first account previously followed a second account and subsequently unfollowed the second account. The system identifies an interest of the first account and monitors the activities of the second account for activity that matches the interest. If there is a match between the interest and an activity of the second account, the system notifies the first account of the activity. These methods and systems provide the user with relevant information from unfollowed accounts.

Systems and methods for dynamic DMARC enforcement

A dynamic Domain-based Message Authentication, Reporting, and Conformance (DMARC) enforcement solution is disclosed. A mail transfer agent (MTA) receives an email and obtains an originating email domain from the email. The MTA queries a dynamic DMARC module (which can be implemented on a domain name system (DNS) infrastructure or the MTA) about any local policy override associated with the originating email domain. DMARC policy overrides can be published from a source system and stored locally to the dynamic DMARC module (e.g., on the DNS infrastructure or the MTA). The MTA receives a response which contains the local policy override published from the source system and dynamically overrides the fact that the email had failed DMARC. In this way, an email which failed DMARC can still be dynamically considered and delivered if a local policy override that is published from a source system indicates that it should be delivered.

Method and system for providing answer message to query message

Provided is a method and system for providing an answer message to a query message. An answer message providing method may include managing a plurality of chatrooms of an instant messaging service; receiving a query message in a preset form from a first user of a first chatroom among the plurality of chatrooms; forwarding the query message to second users through the instant messaging service; receiving an answer message to the query message from at least one of the second users; and providing the received answer message to be displayed through the first chatroom.

User electronic message system

Network site users can be selected to receive a communication based on a network site event, such as incomplete registration. A hybrid user interaction machine learning scheme can select a portion of the selected users based on user interaction estimates and network sampling data. The electronic document sent to the users can have portions that undergo two-pass ranking for ordering of content items to be included in the electronic document, such as an email.

Speech recognition accuracy with natural-language understanding based meta-speech systems for assistant systems

In one embodiment, a method includes receiving, from a client system associated with a first user, a first audio input. The method includes generating multiple transcriptions corresponding to the first audio input based on multiple automatic speech recognition (ASR) engines. Each ASR engine is associated with a respective domain out of multiple domains. The method includes determining, for each transcription, a combination of one or more intents and one or more slots to be associated with the transcription. The method includes selecting, by a meta-speech engine, one or more combinations of intents and slots from the multiple combinations to be associated with the first user input. The method includes generating a response to the first audio input based on the selected combinations and sending, to the client system, instructions for presenting the response to the first audio input.

Personalized dashboard chart for email subscriptions
11418473 · 2022-08-16 · ·

A method for managing a user's email subscriptions has been developed. The method provides a user interface (UI) to the user that allows the user to view and select multiple stand-alone components across multiple dashboard displays for an email subscription to an email address. The user's selections are received via the UI and include one or more stand-alone components from a first dashboard display and one or more stand-alone components from a second dashboard display in the email subscription. The first dashboard display is not the same was the second dashboard display. A display of each of the subscribed stand-alone components is rendered periodically based on the user's preference. The rendered displays are combined into a single email message that is sent to the email address upon completion of the rendering of the displays.

METHOD FOR SECURELY COMMUNICATING EMAIL CONTENT BETWEEN A SENDER AND A RECIPIENT
20220239666 · 2022-07-28 ·

One variation of a method for end-to-end encryption of electronic mail includes: receiving an email encrypted according to a first encryption protocol and designating a recipient within an external domain; verifying encryption protocol supported by the recipient's mail client; in response to a recipient exclusion database identifying the recipient, encrypting the email to a less-robust encryption protocol supported by the recipient mail client and transmitting the email to the recipient; in response to the recipient exclusion database excluding the recipient and the recipient mail client supporting the first encryption protocol, transmitting the email encrypted according to the first encryption protocol to the recipient; and, in response to the recipient exclusion database excluding the recipient and the recipient mail client not supporting the first encryption protocol, generating a notification email including a hyperlink to a secure webpage containing content of the email and transmitting the notification email to the recipient.