Patent classifications
H04L51/21
MESSAGING SYSTEM WITH CAPABILITY TO EDIT SENT MESSAGES
An example social media messaging system may include a capability for a user to edit messages after the messages have been posted to the messaging system. The capability is implemented in a manner that preserves the immutability of messages that are posted to the messaging system.
MESSAGING SYSTEM
An example electronic device includes a display; a communication circuit; a memory storing one or instructions; and a processor for executing the one or more instructions to configure the processor to control the electronic device to: display, on the display, a message compose screen; receive message compose inputs to the message compose screen for composing a message; receive a message send input for sending the message via the communication circuit; set a timer; and send the message, via the communication circuit, after expiration of the timer.
MESSAGING SYSTEM
An example electronic device includes a display; a communication circuit; a memory storing one or instructions; and a processor for executing the one or more instructions to configure the processor to control the electronic device to: display, on the display, a message compose screen; receive message compose inputs to the message compose screen for composing a message; receive a message send input for sending the message via the communication circuit; set a timer; and send the message, via the communication circuit, after expiration of the timer.
MISDIRECTED EMAIL DATA LOSS PREVENTION
Aspects of the disclosure relate to data loss prevention. A computing platform may detect input of a first target recipient domain into a first email message. The computing platform may identify, in real time and prior to sending the first email message, that the first target recipient domain is an unintended recipient domain instead of an intended recipient domain. The computing platform may identify, in real time and prior to sending the first email message, that the first email message violates one or more data loss prevention rules. Based on identifying the violation, the computing platform may send a notification that the first target recipient domain is flagged as an unintended recipient domain and one or more commands directing a user device of the message sender to display the notification.
MISDIRECTED EMAIL DATA LOSS PREVENTION
Aspects of the disclosure relate to data loss prevention. A computing platform may detect input of a first target recipient domain into a first email message. The computing platform may identify, in real time and prior to sending the first email message, that the first target recipient domain is an unintended recipient domain instead of an intended recipient domain. The computing platform may identify, in real time and prior to sending the first email message, that the first email message violates one or more data loss prevention rules. Based on identifying the violation, the computing platform may send a notification that the first target recipient domain is flagged as an unintended recipient domain and one or more commands directing a user device of the message sender to display the notification.
COMBINING INDIVIDUAL FUNCTIONS INTO SHORTCUTS WITHIN A MESSAGING SYSTEM
Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for combining individual functions into shortcuts. The program and method provide for accessing information for a shortcut for performing with respect to an image captured by a device camera, the shortcut corresponding to a combination of individual functions to apply to the image; causing, based on the accessing, display of an interface with a user-selectable element for performing the shortcut with respect to the image; receiving, via the interface, user selection of the user-selectable element; and applying, in response to the receiving, the combination of the individual functions to the image.
COMBINING INDIVIDUAL FUNCTIONS INTO SHORTCUTS WITHIN A MESSAGING SYSTEM
Aspects of the present disclosure involve a system comprising a computer-readable storage medium storing a program and method for combining individual functions into shortcuts. The program and method provide for accessing information for a shortcut for performing with respect to an image captured by a device camera, the shortcut corresponding to a combination of individual functions to apply to the image; causing, based on the accessing, display of an interface with a user-selectable element for performing the shortcut with respect to the image; receiving, via the interface, user selection of the user-selectable element; and applying, in response to the receiving, the combination of the individual functions to the image.
SYSTEMS AND METHODS FOR GROUP MESSAGING USING BLOCKCHAIN-BASED SECURE KEY EXCHANGE WITH KEY ESCROW FALLBACK
A system described herein may provide for secure group messaging between multiple participant devices, in which two or more of the participant devices support blockchain-based techniques for the secure sharing of keys used to secure the group messaging, and in which one or more of the participant devices (e.g., a third device) do not support such techniques. A key escrow system may maintain keys associated with the third device, and the other devices of the group messaging system may retrieve such keys from the key escrow system. Such other devices may attempt to obtain keys associated with the third device from a blockchain and may retrieve such keys from the key escrow system when the retrieval from the blockchain is unsuccessful. The other devices may additionally share their respective keys to the blockchain and the key escrow system, or the key escrow system may “pull” such keys from the blockchain.
SYSTEMS AND METHODS FOR GROUP MESSAGING USING BLOCKCHAIN-BASED SECURE KEY EXCHANGE WITH KEY ESCROW FALLBACK
A system described herein may provide for secure group messaging between multiple participant devices, in which two or more of the participant devices support blockchain-based techniques for the secure sharing of keys used to secure the group messaging, and in which one or more of the participant devices (e.g., a third device) do not support such techniques. A key escrow system may maintain keys associated with the third device, and the other devices of the group messaging system may retrieve such keys from the key escrow system. Such other devices may attempt to obtain keys associated with the third device from a blockchain and may retrieve such keys from the key escrow system when the retrieval from the blockchain is unsuccessful. The other devices may additionally share their respective keys to the blockchain and the key escrow system, or the key escrow system may “pull” such keys from the blockchain.
DATA STREAM BASED EVENT SEQUENCE ANOMALY DETECTION FOR MOBILITY CUSTOMER FRAUD ANALYSIS
Data stream based event sequence anomaly detection for mobility customer fraud analysis is presented herein. A system obtains a sequence of events comprising respective modalities of communication that correspond to a subscriber identity associated with a communication service—the sequence of events having occurred within a defined period. Based on defined classifiers representing respective fraudulent sequences of events, the system determines, via a group of machine learning models corresponding to respective machine learning processes, whether the sequence of events satisfies a defined condition with respect to likelihood of representing a fraudulent sequence of events of the respective fraudulent sequences of events. In response to the sequence of events being determined to satisfy the defined condition, the system sends, via a user interface of the system, a notification indicating that the sequence of events has been determined to represent the fraudulent sequence of events.