Patent classifications
H04L51/00
Contact list aggregation and display
A technique for contact list aggregation across networks involves logging into low level networks through a high level network. A system constructed according to the technique may include a network interface coupled to the different low level networks. The system may further include a contact aggregation engine coupled to the network interface and a network contacts database. In operation the system logs into one or more of the low level networks (or facilitates login for a user). To the extent that the data in the network contacts database is not current, the contact aggregation engine updates the networks contacts database contact information, then provides an aggregated contact list including the contact information to a display device. A method according to the technique may include logging into a high level network and displaying contacts from the one or more low level networks in an aggregated contact list.
Terminal device for data sharing service using instant messenger
The present invention relates to a data sharing service system, and a method and a device for a data sharing service, and to the data sharing service in a multi-device environment. Particularly, the present invention enables a user to summarize information on content being used or to transmit data on specific content to terminal device of another party by using a messenger, so that the user can gather the contents of interested articles (or books) to manage the contents by compiling statistics and the user can easily notify the other party of the contents of the articles (or books) without requiring the user to write out the interested contents one by one when using the messenger.
Message history display system and method
A technique for message history display includes combining message histories for multiple different messaging services. A system constructed according to the technique may include, for example, a message history database; a history aggregation engine that aggregates message logs for storage in the message history database; and a history provisioning engine that provides an aggregated message log associated with the user from the message history database to a requesting device. A method according to the technique may include, for example, identifying a device in association with a user profile; providing an online platform that receives messages from and sends messages to the device; and creating an aggregated log from messages sent to and from the device.
SYSTEMS AND METHODS FOR MANAGING SERVICE LEVEL AGREEMENTS OF SUPPORT TICKETS USING A CHAT SESSION
Systems and methods of the present disclosure facilitate managing information technology service level agreements. In some embodiments, the system includes a server that accesses a database storing a support ticket in memory. The support ticket can include a creation time and a service level agreement. The service level agreement can include a maximum response time. The server initiates, via the computer network, responsive to input from a computing device, a chat session associated with the computing device and the support ticket. The initiating can be associated with a time stamp. The server can be configured to determine a compliance with the service level agreement. The compliance can be computed as a difference between the time stamp and the creation time being less than the maximum response time. The server can be configured to generate a notification of the compliance with the service level agreement.
DEVICES AND METHODS OF PROVIDING RESPONSE MESSAGE IN THE DEVICES
A device includes a communication unit configured to receive a call request from a calling user; and a control unit configured to control the communication unit to provide a response message including information about a current situation based on information about an application currently being executed to the calling user in response to a rejection regarding the call request.
Network call method and apparatus, terminal, and server
The present disclosure provides a network call method, terminal, and server. The method includes: displaying a scenario interface for a social application group; displaying a first list of user identifiers when an instruction for initiating a specified call is received; determining, according to a selection operation in the first list of user identifiers, identifiers of second users; sending a network call request to a social application server, the network call request comprising an identifier of the first user logging in at the first terminal locally and the identifiers of the second users, so that the social application server creates a virtual group, and adds, to the virtual group, the first terminal and second terminals corresponding to the identifiers of the second users accepting call invitations; and performing a network call in a call interface for the virtual group.
Detection of email spoofing and spear phishing attacks
A computer-implemented method of detecting an email spoofing and spear phishing attack may comprise generating a contact model of a sender of emails; determining, by a hardware processor, a statistical dispersion of the generated contact model that is indicative of a spread of a distribution of data in the generated model and receiving, over a computer network, an email from the sender. If the determined statistical dispersion is lower than a dispersion threshold, the received email may be evaluated in the processor against a plurality of conditions associated with email spoofing and spear phishing attacks, using the generated contact model, to generate a features vector that is constituted of a plurality of numeric values and a plurality of dispersion values between 0 and 1, and using at least the generated features vector to classify with a supervised learning algorithm the received email as a likely legitimate email or as a likely malicious email spear phishing attack; and notifying a recipient of the email when the received email is classified as a likely malicious email spear phishing attack.
3.SUP.RD .party application management
Methods and systems for secure applications running web view applications are disclosed. In some aspects, user data may be secured within a first security domain, that is inaccessible to a web view application running within a second application. The second application accesses the user data via a second security domain, when a request is received from the web view application to display a user interface. The second application then displays a user interface based at least in part, on the user data.
Method, apparatus and product for delivery of electronic messages to electronically un-addressable entities
A system and method for enabling delivering to a receiver of a message addressed to a non-electronically addressable entity ID associated with the receiver employs a database storing a plurality of verified electronically addressable and non-electronically entity IDs associated with the receiver, and a controller that upon receiving a message addressed to non-electronically addressable entity ID identifies the receiver and enables the receiver access to the message.
EMAIL BASED E-COMMERCE WITH SMS AND SOCIAL MEDIA
Methods for email-based e-commerce using SMS and social media and for an e-commerce stock management system are disclosed. A method for email-based e-commerce using SMS includes receiving, via a social media network, a request from a customer to make a payment via email; generating a first email message that includes a mailto hyperlink and solicits payment in a predetermined amount; transmitting the first email message to the customer; and receiving an email message from the customer confirming payment in the predetermined amount. A method for an email-based financial management system includes storing user based settings, based on stock market events and a plurality of predetermined actions; determining when a stock market event occurs; transmitting a confirmation email to a customer requesting confirmation to perform a predetermined action; receiving a confirmation email from the customer to perform the predetermined action; and performing the predetermined action.