H04L51/00

Analysis of message quality in a networked computer system
11392767 · 2022-07-19 · ·

Systems and methods for dynamically assessing and displaying quality features of electronic messages, while composed on client devices, can include one or more processors monitoring the process of composing the electronic message. The one or more processors can retrieve, upon detecting a pause event, data associated with the composed electronic message from a message composing container, and determine a plurality of feature values for a plurality of features of the electronic message based on the retrieved data. The one or more processors can determine, based on the plurality of feature values, a likelihood of receiving a response from a receiving entity once the electronic message is sent to that receiving entity. The one or more processors can provide an indication of the determined likelihood of receiving a response and indications of the plurality of determined feature values for display in association with a message composing window displaying the text received.

METHOD FOR DETECTING FINANCIAL ATTACKS IN EMAILS

A method for detecting financial attacks in emails includes: accessing an email inbound to a recipient address; scanning a body of the email for language signals; correlating a first sequence of words, in the email, with a financial signal; correlating a second sequence of words, in the email, with an action request signal; calculating a risk for the email representing a financial attack based on the financial signal and the action request signal detected in the email; and, in response to the risk exceeding a threshold risk, annotating the first sequence of words in the email according to a first visual highlighting scheme associated with the financial signal, annotating the second sequence of words in the email according to a second visual highlighting scheme—different from the first visual highlighting scheme—associated with the action request signal, and redirecting the email to a quarantine folder.

Using social graph for account recovery

A social networking system performs account recovery for a user with the help of the user's connections (e.g., friends). The social networking system selects connections of the user based on information indicating likelihood of real-world interactions between the user and the selected connections. Access codes are sent to the selected connections and the user instructed to obtain access codes from the selected connections via a communication that is outside the social networking system, for example, via phone. The user provides the access codes obtained from the selected connections to the social networking system. If the access codes provided by the user match the access codes sent to the selected connections, the user is granted access to the account. Real-world interactions between two users are determined based on sharing of devices between the users or information indicating presence of the users in the same place during same time interval.

Shared folder backed integrated workspaces

Disclosed are systems, methods, and non-transitory computer-readable storage media for shared folder backed integrated workspaces. In some implementations, a content management system can provide a graphical user interface (GUI) that integrates communications and content management into a single user interface. The user interface can include mechanisms that allow a user to provide input to generate a new workspace. The user interface can provide a mechanism to allow a user to view conversations related to the workspace and/or content items associated with the workspace. The user interface can present representations of content items associated with the workspace and allow the user to provide input to generate, view, edit, and share content items associated with the workspace.

EMOJI COMMANDED ACTION
20220180336 · 2022-06-09 ·

A system and method for receiving and executing emoji based commands is disclosed. The system and method may include processes such as identifying emojis in a message, determining one or more action based on the emoji, and completing the determined actions.

Devices, Methods, and Graphical User Interfaces for Messaging

An electronic device, in response to receiving a first message from an electronic device that corresponds to another user, displays the first message in a first message region in a conversation transcript. In response to a first input by a contact at a location of the first message in the conversation transcript, the device displays plurality of acknowledgement options in an acknowledgement selection affordance at a location that corresponds to the first message region. In response to a second input by a second contact at a location of a first acknowledgement option in the acknowledgement selection affordance, the device applies the first acknowledgement option to the first message and transmits information that causes the electronic device that correspond to the other user to apply the first acknowledgement option to a corresponding first message in a conversation transcript that corresponds to the messaging session.

SYSTEM AND METHOD FOR REGULATING ELECTRONIC MESSAGE TRANSMISSIONS
20220191161 · 2022-06-16 ·

Systems and methods for regulating electronic messages transmissions. A message delay system is disposed between one or more first entities and a second entity within at least one network. Electronic messages are received from among at least one the first entities and the second entity at one or more message arrival times. A message delay component applies a delay to each received electronic message, based on a predefined delay time common to all of the first entities and a first entity delay offset associated with a first entity that is associated with the received message. The first entity delay offset is based on a geographical origin of the first entity relative to a geographical origin of the second entity. Each delayed message is transmitted to a designated recipient via the network, where the designated recipient is among the second entity and the first entities.

PERSONALIZED GESTURE RECOGNITION FOR USER INTERACTION WITH ASSISTANT SYSTEMS

In one embodiment, a method includes receiving a user request from a first user from a client system associated with a first user, wherein the user request comprise a gesture-input from the first user and a speech-input from the first user, determining an intent corresponding to the user request based on the gesture-input by a personalized gesture-classification model associated with the first user, executing one or more tasks based on the determined intent and the speech-input, and sending instructions for presenting execution results of the one or more tasks to the client system responsive the user request.

Message validation using machine-learned user models

A cloud security service receives an electronic message sent by a purported sending user to a receiving user. The cloud security service retrieves a user model and a user identity associated with the purported sending user, the user identity including a set of feature values describing messages from the purported sending user. The cloud security service applies the user model to the received electronic message to identify a set of feature values describing the electronic message. The cloud security service compares the set of feature values describing the electronic message to the set of feature values describing messages from the purported sending user included in the user identity. The cloud security service determines, based on the comparison, whether the received electronic message was sent by the purported sending user. The cloud security service performs a security action based on the determination.

PRIVATE DATA EXCHANGE METRICS SHARING

Providing access to metrics on a private data exchange is described. An example computer-implemented method can include executing one or more queries against data referenced by a data listing of a data exchange, the data exchange comprising a plurality of data listings provided by one or more data providers, gathering consumer information based on the one or more queries, assigning privileges that grant access to the consumer information to a share object, in response to the share object being added to a list of consumed share objects of a data provider that provided the data listing, generating a database that references the consumer information based on the share object, and granting access to the database to the data provider that provided the data listing.