Patent classifications
H04L51/00
Notification of potentially problematic textual messages
A processor may determine, using natural language processing, a writing style of content of a composed message written by a composer. The processor may analyze, using natural language processing, a set of previous message written by the composer. The processor may identify, based on the analyzing, writing habits of the composer. The processor may also identify a difference between the writing style of the content and the writing habits of the composer. The processor may display a notification of the difference to the user.
Network control method and apparatus
Embodiments of the present invention provide a network control method and apparatus. The network control method includes: receiving, by a first network controller, a request message of a forwarding plane device, where the request message includes information that is used to indicate a network event and information that is used to instruct to request a processing policy of the network event, and the first network controller is a primary network controller of the forwarding plane device; and if the first network controller determines, according to the request message, that the first network controller cannot provide the processing policy, sending, by the first network controller, the request message to a second network controller, receiving the processing policy sent by the second network controller, and sending the received processing policy to the forwarding plane device.
Managing assets
A method for managing assets including receiving a task across a network to be performed by a set of assets, identifying a subset of assets owned by an owner, transmitting a personalized direct communication across the network to the owner, wherein the personalized direct communication requests approval for use of the subset of assets to execute the task, and responsive to receiving an approval communication across the network from the owner indicating respective approved assets from the subset of assets producing a set of approved assets, automatically transmitting a set of communications across the network to the set of approved assets for execution of the task.
INTAKE UTILITY
Embodiments of the present disclosure are directed to a method for processing computer readable electronic files in an investigation in a computer system including a processor coupled to a display and an electronic storage device coupled to the processor. The method includes the processor accessing the electronic files and related data from a data source. The accessed files and related data are culled by the processor based on predetermined filter criteria. The processor stores the remaining files and related data in a third-party data repository and maps a set of electronic files and related data stored in the third-party data repository into a predetermined database schema. The mapped files and related data are analyzed by the processor, which applies a status decision on them. The analyzed electronic files and related data are submitted to a third-party e-discovery processing application based on the applied status decision.
DETECTING PHISHING ATTEMPTS
Classifying electronic communications includes receiving an electronic message. A watchlist is input comprising at least one entry associated with an authoritative entity. At least one similarity score is computed based on an extent to which the message matches the entry in the watchlist. When the similarity score exceeds that threshold value, an indicator is output of a risk that the message appears to be associated with the authoritative entity. It is determined whether the message was sent from the authoritative entity based on at least one of attempting to verify an email authentication, and comparing an email address of a sender of the message to an email address associated with the authoritative entity. Responsive to determining that the message was sent from the authoritative entity, the message is delivered. Responsive to determining that the message was not sent from the authoritative entity, a security action is performed.
DETECTING PHISHING ATTEMPTS
Classifying electronic communications is disclosed. An electronic communication is received. A first likelihood that a potential recipient of the electronic communication would conclude that the communication was transmitted on behalf of an authoritative entity is determined. An assessment of a second likelihood that the received communication was transmitted with authorization from the purported authoritative entity is performed. The electronic communication is classified based at least in part on the first and second likelihoods.
Managing notifications across multiple devices
Modifying a notification on one client device can trigger the generation and transmission of a silent notification to another client device that is associated with the same user account. The silent notification can include instructions to query for and modify a similar notification, if present, on the other client device. Silent notifications that are undeliverable can be stored in offline storage and delivery can be reattempted at a later point in time.
Network monitoring using selective mirroring
A network element includes multiple interfaces and circuitry. The interfaces are configured to connect to a communication system. The circuitry is configured to monitor a respective buffering parameter of data flows received via an ingress interface and queued while awaiting transmission via respective egress interfaces, to identify, based on the respective buffering parameter, at least one data flow for mirroring, to select one or more packets of the identified data flow for analysis by a network manager, and to send the selected packets to the network manager over the communication system via an egress interface.
Method of two-way information exchange for a system for making friends which display a primary target client and a plurality of false target clients and grants a requesting client the ability to delete at least one of a plurality of false target clients based on a threshold of time
A method of two-way information exchange for a system for making friends is disclosed. With the method, a system can provide a primary target client blended with a plurality of false target clients for a requesting client who seeks making friends. The requesting client is entitled to request the system to delete one of the target clients when communication between both parties reaches a threshold of time. The requesting client does not know which one of the target clients is the real client until all of the false target clients have been deleted, thus reducing preconceptions due to a person's appearance. As such, after a period of communication, both parties may achieve a certain degree of mutual understanding to facilitate a decision on making friends.
Search and notification procedures based on user history information
Identifying notification sent to user devices may provide an optimal approach to identifying data sources and updating a user device with information pertinent to known or identified user interests. One example method of operation may provide parsing notification message content of a notification message, linking a data source to the notification message content to create a hybrid user interface data feed, transmitting the initial hybrid user interface data feed to a number of message recipients, monitoring at least one of the data sources to identify a change to data content of the initial hybrid user interface data feed, and intercepting a change parameter during the monitoring of the data sources, and updating the hybrid user interface data feed based on the intercepted change parameter.