H04L51/00

Email fraud prevention
11277365 · 2022-03-15 · ·

A mail transfer agent comprises processing circuitry, storage circuitry, and networking circuitry. The storage circuitry holds a database. The networking circuitry is operable to receive, via a network connection, an email message. The processing circuitry is operable to analyze the email message to detect an image present in the email message. The processing circuitry is operable to determine, based on one or more records of the database, that the detected image is associated with a particular brand, and process the email message based on whether one or more characteristics of the email message are associated with the particular brand in the database. The one or more characteristics of the email message may comprise one or more of: sender domain, sender subdomain, and sender IP address.

DOMAIN-BASED ISOLATED MAILBOXES
20220086158 · 2022-03-17 ·

Systems and methods are provided for reducing email spam without wasting network bandwidth. The system contains two groups of boxes. Domboxes and Mailboxes. (a) Domboxes should be used only for non-conversational mails. E.g. website/app mails. Each Dombox has a disposable email address and associated with a primary domain. The primary domain can authorize additional domains in the DNS. We primarily rely on the SPF record for validating Dombox mails. (b) Mailboxes are designed to accept only conversational mails. Conversational Mails can be termed as Human-to-Human, Mailbox-to-Mailbox or MX-to-MX mails. We pull the MX record from the Envelope Domain and verify whether it's really originating from one of the MX servers. Spammer is a Human. Since we accept only MX record verified mails, spammers need registered domains to send spam. Additional checks can be performed with the help of Domain registration date, Spam Filters, Challenge/Response etc.

Evaluation device, evaluation method, evaluation program, and evaluation system
11282040 · 2022-03-22 · ·

An evaluating method can be performed by a computer. The method includes acquiring two-dimensional data represented by a plurality of character types, converting the two-dimensional data to three-dimensional data by classifying the acquired two-dimensional data into a dimension of the plurality of character types, analyzing a feature of the three-dimensional data, and evaluating input data described in the plurality of character types based on the analyzed feature.

Differential privacy for message text content mining

Systems and methods are disclosed for determining whether a message received by a client may be spam, in a computing environment that preserves privacy. The message may be encrypted. A client invokes the methods when a message is received from a sender that is not known to the client. A client can decrypt the message, break the message into chunks, and apply a differentially private algorithm to the set of chunks. The client transmits the differentially private message sketches to an aggregation server. The aggregation server receives a large collection of such message sketches for a large plurality of clients. The aggregation server returns aggregated message chunk (e.g. frequency) information to the client to assist the client in determining whether the message may be spam. The client can process the message based on the determination without disclosing the message content to the server.

METHOD AND DEVICE FOR MANAGING GROUP MEMBER, AND METHOD FOR PROCESSING GROUP MESSAGE
20220103500 · 2022-03-31 ·

The present application relates to a method for managing a group member including: a target group that a client requests to join is determined in response to receiving a group joining request sent by the client, the target group is associated with at least one storage space for storing user information of group members, and each storage space is independent from other storage spaces; user information bound to the client is stored in a storage space associated with the target group.

Selective obfuscation of notifications
11288107 · 2022-03-29 · ·

Methods and systems may help to provide filtered notification content that provides useful information to the intended recipient, but does not provide the same information to an unauthorized viewer. To do so, when an application event occurs, filtered notification content may be generated. The filtered notification content may combine a non-obfuscated portion of the event content and an obfuscated portion of the event content, such that when viewed by an intended recipient, the filtered notification content provides implicit information that the device expects the particular user to understand based on the user's own experience and/or other factors.

Different specific messaging to multiple recipients from a single message
11283745 · 2022-03-22 ·

The present invention allows multiple different messages to different recipients through a single email. The system allows a sender to designate multiple recipients in the subject areas and the composition areas of the email application and send different messages to each recipient.

RNA targeting methods and compositions

Provided herein are CRISPR/Cas methods and compositions for targeting RNA molecules, which can be used to detect, edit, or modify a target RNA.

RNA targeting methods and compositions

Provided herein are CRISPR/Cas methods and compositions for targeting RNA molecules, which can be used to detect, edit, or modify a target RNA.

RNA targeting methods and compositions

Provided herein are CRISPR/Cas methods and compositions for targeting RNA molecules, which can be used to detect, edit, or modify a target RNA.