H04L51/00

Systems and methods for restricting generation and delivery of insights to second data source providers

The present disclosure relates to restricting generation and delivery of insights to data source providers. Electronic activities and record objects may be accessed. Each record object may correspond to a record object type and have one or more object field-value pairs. Node profiles may be maintained. Updates to a node graph or corresponding to a record object may be detected. A number of data source providers having respective electronic activities or record objects from which the update to the node graph or corresponding to the record object can be determined. Provisioning of a content item to a second data source provider may be restricted.

Email encryption system
20220109657 · 2022-04-07 ·

According to an example aspect of the present invention, there is provided a method and a system for using symmetric and asymmetric cryptography to encrypt emails and attachments thereof as well as digitally sign the resulting cryptographic metadata.

Email encryption system
20220109657 · 2022-04-07 ·

According to an example aspect of the present invention, there is provided a method and a system for using symmetric and asymmetric cryptography to encrypt emails and attachments thereof as well as digitally sign the resulting cryptographic metadata.

Name label display method and apparatus

The present disclosure discloses a method and apparatus for displaying a name label. The method includes: obtaining an original group message sent in a group carrying an original name label of a specified user; obtaining a target name label corresponding to the original name label based on a language version of a client of a current recipient in the group; replacing the original name label of the specified user carried in the original group message with the target name label to generate a target group message carrying the target name label; and displaying the target group message to a recipient user on the client of the current recipient.

Computing system with an email privacy filter and related methods
11277366 · 2022-03-15 · ·

A client computing device includes a display, and a processor coupled to the display. The processor is configured to identify sensitive information within an email. In response to identification of sensitive information within the email, the processor determines that the email is to be hidden from view after receipt of the email based on one or more rules, so as to prevent presentation of the sensitive information to an unauthorized viewer via the display.

Chatbot orchestration

Utilizing a computing device executing a master chatbot and one or more modular chatbots to respond to one or more chat messages. A computing device executing the master chatbot receives one or more chat messages. The computing device parses the received one or more chat messages to discover an intent and entities contained within the chat messages. A ranking algorithm is employed to rank the master chatbot and a plurality of modular chatbots, the ranking algorithm scoring the master chatbot and the plurality of modular chatbots based upon the intent and entities contained within the one or more chat messages. The master chatbot responds to the chat message if the ranking algorithm rates the master chatbot highest or forwards automatically the one or more chat messages to a ranked modular chatbot for response if the ranking algorithm rates the ranked modular chatbot highest.

NOTIFICATION AND TASK MANAGEMENT SYSTEM

A method may include receiving, at a listener channel, an event described by a message, determining, using the message, a subscriber of the listener channel, determining, using a delivery preference of the subscriber, an adapter to deliver the message, and dispatching, via the adapter, the message to the subscriber.

Method and apparatus for facilitating turn-based interactions between agents and customers of an enterprise
11301870 · 2022-04-12 · ·

A method and apparatus for facilitating a turn-based interaction between a virtual agent and a customer of an enterprise are disclosed. The method includes receiving a conversational input provided by the customer during a turn-based interaction between the customer and the agent. One or more conversational inputs exchanged between the customer and the agent prior to the customer's conversational input are identified by positioning a virtual bounding box of fixed width over textual representation of the turn-based interaction. The conversational input and the one or more conversational inputs configure a set of conversational inputs. At least one context vector representation is generated based on an encoding of the set of conversational inputs. Each word of a virtual agent reply is predicted based on the at least one context vector representation. The virtual agent reply is provided to the customer in response to the conversational input of the customer.

Systems and methods of generating an engagement profile

The present disclosure relates to systems and methods for determining an engagement profile of a participant by associating electronic activities to a profile. It may generate the engagement profile based on analysis of the electronic activity level. An example implementation may contain the following steps. The system may access for a first record object a plurality of electronic activities linked with the first record object. The system may identify for a participant from the plurality of electronic activities a set of electronic activities including the participant. The system may determine an engagement profile of the participant based on a first number of electronic activities of the set of electronic activities sent by the participant, a second number of the set of electronic activities received by the participant and a temporal distribution of the set of electronic activities. The system may store the engagement profile in one or more data structures.

Systems and methods for classifying electronic activities based on sender and recipient information

The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.