H04L51/00

External contact connections to authenticate and contextualize entity

A high percentage of received communications are from external entities. In response to receiving a communication from a sender associated with an entity, the entity may be authenticated and contextualized by retrieving and processing contact information for people at the entity that are directly and/or indirectly associated with a recipient of the communication. For example, contact information for people at the entity who have previously communicated with and/or are connected to the recipient or users related to the recipient, for example, may be retrieved from one or more directory services, social networks, and/or professional networks. The contact information may be processed to create corresponding contact objects, and the contact objects may be processed to create an entity object for the entity that comprises one or more connections between the recipient and the people at the entity. The entity object may be provided to the recipient for display.

Method, apparatus, and computer program product for group-based communication interface with email, channeling
11271886 · 2022-03-08 · ·

Methods, systems, apparatuses, and computer program products are provided for executing an email communication import protocol in a selected group-based communication interface within a group-based communication system. The group-based communication system allows for receiving one or more email communication corpus associated with email communication accounts and parsing the email communication corpus to identify email communication account identifiers. The group-based communication system thereafter creates and transmits group-based communication interface invitations to the email communication accounts to allow access to the group-based communication interface. Upon access to the group-based communication interface, content from the email communication corpus may be included in the group-based communication interface.

Audio presentation of conversation threads

In an example, a computing system receives an instruction to initiate audio presentation of electronic communications for a recipient. Responsive to the instruction, the computing system audibly outputs each unreviewed electronic communication in a most-recent conversation thread including a most-recent set of unreviewed, reply-linked electronic communications for the recipient. Each unreviewed electronic communication in the most-recent conversation thread may be audibly output in a chronological-sequential order beginning with an oldest unreviewed electronic communication and continuing to a most-recent unreviewed electronic communication. Responsive to completing audible output of the most-recent unreviewed electronic communication from a conversation thread, the computing device audibly outputs each unreviewed electronic communication in a next-most-recent conversation thread including a next-most-recent set of unreviewed, reply-linked electronic communications for the recipient. Each unreviewed electronic communication in the next-most-recent conversation thread may be audibly output in a chronological-sequential order beginning with an oldest unreviewed electronic communication.

Systems and methods for updating confidence scores of labels based on subsequent electronic activities

The present disclosure relates to methods, systems, and storage media for updating confidence scores of labels based on subsequent electronic activities. Exemplary embodiments may maintain a plurality of node profiles corresponding to a plurality of unique entities; access a plurality of electronic activities transmitted or received via electronic accounts associated with one or more data source providers; identify a first electronic activity to process; assign a tag to the first electronic activity based on the data included in the electronic activity; determine a confidence score of the tag based on the data included in the first electronic activity; identify a second electronic activity to process; and update the confidence score of the tag assigned to the first electronic activity responsive to parsing the second electronic activity.

Systems and methods for detecting events based on updates to node profiles from electronic activities

The present disclosure relates to methods, systems, and storage media for detecting events based on updates to node profiles from electronic activities. Exemplary implementations may access an electronic activity transmitted or received via an electronic account associated with a data source provider; generate a plurality of activity field-value pairs; maintain a plurality of node profiles; identify a first state of a first node profile of the plurality of node profiles; update the first node profile using the electronic activity; identify a second state of the first node profile subsequent to updating the first node profile using the electronic activity; detect a state change of the first node profile based on the first state and the second state; determine that the state change satisfies an event condition; and store an association between the first node profile and an event type corresponding to the event condition.

Methods, apparatuses and computer program products for implementing communication barriers in a group-based communication system

Methods, apparatuses and computer program products for implementing at least one communication barrier in a group-based communication system are described herein. The apparatus is configured to at least receive a first group correlation between a first user identifier and a first group identifier, receive a second group correlation between a second user identifier and a second group identifier, retrieve a communication separation settings set associated with the first group identifier and the second group identifier, and cause rendering a first electronic indication on a group-based communication interface. In some examples, the first user identifier is associated with a first workspace identifier and a first group-based communication channel. In some examples, the first group-based communication channel is associated with the first workspace identifier and a second workspace identifier.

Systems and methods for email attachment routing in a client management system

A method includes defining a database accessible to a plurality of users having respective user IDs and organized to include information for a plurality of matters, respective matters having case numbers, and, for each matter, the database include fields configured to store a name of a client, and fields describing the client, a files location associated with the matter, and a notes location associated with the matter, the database further including reports locations associated with respective users; in response to receiving an email having a subject line, body, and attachment: determining whether the email subject line contains a case number matching a case number in the database and, if so: detaching the attachment from the email and placing the attachment in the files location associated with the matter matching the case number. Other systems and methods are provided.

Private data exchange metrics sharing

Providing access to metrics on a private data exchange is described. An example computer-implemented method can include providing a data exchange by a cloud computing service on behalf of an entity. The data exchange may comprise several data listings provided by one or more data providers. The data listings reference one or more data sets stored in a data storage platform associated with the cloud computing service. The method may also include granting access the data listings, gathering consumer information based queries provided to data associated with the data listings, generating a new share comprising the consumer information, and granting access of the new share to the data provider that provided the data listing.

Executing real-time message monitoring to identify potentially malicious messages and generate instream alerts
11271964 · 2022-03-08 · ·

Aspects of the disclosure relate to identifying potentially malicious messages and generating instream alerts based on real-time message monitoring. A computing platform may monitor a plurality of messages received by a messaging server associated with an operator. Subsequently, the computing platform may detect that a message of the plurality of messages is potentially malicious. In response to detecting that the message of the plurality of messages is potentially malicious, the computing platform may execute one or more protection actions. In executing the one or more protection actions, the computing platform may generate an alert message comprising information indicating that the message of the plurality of messages is potentially malicious. Then, the computing platform may send the alert message to the messaging server, which may cause the messaging server to deliver the alert message to a computing device associated with an intended recipient of the message.

Integration of an email client with hosted applications
11271881 · 2022-03-08 · ·

Disclosed are various embodiments for integrating an email client with hosted applications. An email is received from an email client. An image that is a component of the email is identified and sent to an optical character recognition (OCR) service. Extracted text is received from the OCR service. A request for an action object is then sent to a connector for an application, the action object representing a potential action that could be performed with the application based on the extracted text from the OCR service. The action object is then sent to the email client, which is configured to display a prompt allowing a user to perform the action represented by the action object.