H04L51/00

Group communication organization

A text conversation between at least two users is monitored. A first regarding a first topic is detected. A second message received subsequent to the first message regarding a second topic is detected. A third message received subsequent to the second message regarding the first topic is detected. In response to detecting that the third message regards the first topic of the first message, the third message may be displayed immediately adjacent the first message.

Assisting users with personalized and contextual communication content
11307880 · 2022-04-19 · ·

In one embodiment, a method includes receiving a first user input by a first user at a client system associated with the first user, wherein the first user input is associated with a first language register, selecting a first language-register model from a plurality of language-register models based on the first language register by the client system, wherein the plurality of language-register models are each personalized with respect to the first user, and presenting a personalized first communication content generated based on the selected first language-register model at the client system.

Content agnostic quality estimation and topic modeling

In an example embodiment, a content agnostic approach to quality of assessment of social media posts or other items or content in an online network, such as a social networking service, is utilized. Specifically, information about members contained in member profiles may be used to derive meaningful insights about posts they interact with collectively.

Method for securely communicating email content between a sender and a recipient
11323458 · 2022-05-03 · ·

One variation of a method for end-to-end encryption of electronic mail includes: receiving an email encrypted according to a first encryption protocol and designating a recipient within an external domain; verifying encryption protocol supported by the recipient's mail client; in response to a recipient exclusion database identifying the recipient, encrypting the email to a less-robust encryption protocol supported by the recipient mail client and transmitting the email to the recipient; in response to the recipient exclusion database excluding the recipient and the recipient mail client supporting the first encryption protocol, transmitting the email encrypted according to the first encryption protocol to the recipient; and, in response to the recipient exclusion database excluding the recipient and the recipient mail client not supporting the first encryption protocol, generating a notification email including a hyperlink to a secure webpage containing content of the email and transmitting the notification email to the recipient.

System and method for testing of automated contact center customer response systems
11290400 · 2022-03-29 · ·

A system and method for testing of automated contact center customer response systems using a customer response testing system and a real time conversation engine, wherein the customer response testing system generates simulated human queries using persona profiles, sends test cases containing those queries to a contact center under test, and receives and analyzes the responses to determine whether the contact center's automated response systems understand the queries and respond appropriately.

Using speech and facial bio-metrics to deliver text messages at the appropriate time

Embodiments of the present invention disclose a method, computer program product, and system for delaying the notification of a new message arrival. Receiving a message from a sending computing device and determining a first mood of a user receiving the message. Determining a second mood of the content of the message and comparing the first mood to second mood. Delaying a transmission of a notification when the first mood and the second mood are different, wherein the notification is a sound or pop-up window that indicates the arrival of a message.

Reactive backpressure for east-west messaging in an embedded control cluster
11283744 · 2022-03-22 · ·

According to certain embodiments, a message bus system comprises a first client and a second client. The first client is configured to publish messages associated with a message topic to a message bus, and the second client is configured to receive the messages associated with the message topic from the message bus. The message bus system is configured to unsubscribe the second client from the message topic based at least in part on determining that a demand of the second client for the messages associated with the message topic has fallen below a threshold.

Password protecting selected message content

Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for password protecting selected message content. The program and method provide for receiving selection of a content item shared between a first user and a second user, in association with a messaging application; receiving input indicating that access to the content item requires user authentication by the first user or the second user; and providing for access to the content item based on the user selection and the input.

Selecting an optimal combination of portions of a content item to be presented within a user interface of an online messaging application in association with information identifying a set of message threads
11290406 · 2022-03-29 · ·

A different combination of multiple portions of a content item is selected for display to each of multiple sets of users of an online messaging application. The different combination of portions of the content item is sent for display to the corresponding set of users within a user interface of the online messaging application in association with information identifying a set of message threads in which each user is participating. A request to view the entire content of the content item is then received from a subset of each of the sets of users and a performance metric associated with each combination of portions of the content item is tracked based on the received request. Based on the performance metric, a performance of each portion of the content item is evaluated and used to select an optimal combination of the portions of the content item.

TRUST POLICIES FOR A DATA PROVISIONING LAYER

Techniques for enforcing trust policies for payload data transmitted through a data provisioning layer include: receiving, by a node in the data provisioning layer, payload data to be delivered to a recipient; obtaining, by the node, a trust policy indicating multiple attributes used to determine trustworthiness of payloads; determining, by the node, a set of values of the attributes associated with the payload data; generating, by the node, a trustworthiness opinion based at least on the trust policy and the set of values of the attributes; transmitting, by the node, the payload data and the trustworthiness opinion via the data provisioning layer toward the recipient; computing, by the recipient, a trustworthiness metric associated with the payload data based at least on the trustworthiness opinion; and determining, by the recipient, an action to take with respect to the payload data based at least on the trustworthiness metric.