H04L51/42

DETECTION OF UNDESIRED COMPUTER FILES USING DIGITAL CERTIFICATES

Methods and systems for detecting undesirable computer files based on scanning and analysis of information contained within an associated digital certificate chain are provided. According to one embodiment, a file having associated therewith a certificate chain is received. A type and structure of the file are identified. A location of the certificate chain is determined based on the identified type and structure. A signature of the file is formed by extracting a targeted subset of information from the certificate chain. The file is evaluated by comparing the signature with a set signatures having a known desirable or undesirable status. The file is classified based on a result of the evaluating into a category of multiple categories, including one indicative of an associated file being an undesired file or a file suspected of being undesired. The file is handled in accordance with a policy associated with the category.

INTERNET-BASED PROXY SERVICE TO MODIFY INTERNET RESPONSES

A proxy server receives from a client device a request for a network resource that is hosted at an origin server for a domain. The request is received at the proxy server as a result of a DNS request for the domain resolving to the proxy server. The origin server is one of multiple origin servers that belong to different domains that resolve to the proxy server and are owned by different entities. The proxy server retrieves the requested network resource. The proxy server determines that the requested resource is an HTML page. The proxy server scans the HTML page to locate one or more modification tokens that each indicates content that is subject to being modified. For at least one of the located modification tokens, the proxy server automatically modifies at least a portion of the content of the HTML page that corresponds to that modification token. The proxy server then transmits the modified HTML page to the client device.

DIRECTORY DRIVEN MAILBOX MIGRATIONS

An example method for migrating communication data from a source server to a target server includes obtaining, using a computing device, a set of credentials to access the source server, and accessing the source server using the set of credentials. The method also includes requesting, automatically by the computing device, a directory structure associated with communication data from the source server, populating, by the computing device, the target server using the directory structure, requesting the communication data from the source server, and populating the target server with the communication data.

CALENDAR EVENT SCHEDULING FROM EMAIL
20180004398 · 2018-01-04 ·

An electronic mail (email) system generates an email user interface display, that allows the user to enter message content. A context-sensitive calendar preview can be triggered and displayed on the email user interface display. The email system detects a user drag and drop input dragging at least a portion of the message content onto the calendar preview, and automatically generates a calendar event based upon the detected drag and drop input, and the particular portion of the message content dragged onto the context-sensitive calendar preview.

EXPOSING TASK INFORMATION TO ONLINE SERVICE PROVIDERS

Task information is exposed to providers of online services. A dataset that includes one or more electronic messages is received. Then, one or more task intents in the dataset are identified, where each of the identified task intents is a specific task that is to be completed. Then, for each of the identified task intents, one or more service providers each of whom offers one or more online services that are capable of assisting in the fulfillment of the identified task intent are identified, and information associated with the identified task intent is exposed to each of the identified service providers.

Email rewrite and reorganization

Commercial emails are rewritten to aid user understanding and usability. A commercial email is identified from a set of email messages received by an email client for a user. The content of the commercial email is analyzed to identify salient facts associated with the terms of a sale specified by the content. A simplified subject line for the commercial email is generated based on the salient facts and used to replace the original subject line. Priority scores can also be computed based on user transaction history, time, or other factors. The priority scores can then be utilized to organize commercial emails. Further, commercial emails can be segmented from other emails, such as personal or work emails.

Email rewrite and reorganization

Commercial emails are rewritten to aid user understanding and usability. A commercial email is identified from a set of email messages received by an email client for a user. The content of the commercial email is analyzed to identify salient facts associated with the terms of a sale specified by the content. A simplified subject line for the commercial email is generated based on the salient facts and used to replace the original subject line. Priority scores can also be computed based on user transaction history, time, or other factors. The priority scores can then be utilized to organize commercial emails. Further, commercial emails can be segmented from other emails, such as personal or work emails.

Graph embedding already-collected but not yet connected data

Systems and methods for graph embedding already-collected but not yet connected data are disclosed. A method includes extracting a first set of actor-related data, a second set of object-related data, and a third set of temporal data from a set of the already-collected but not yet connected data representative of a unit-level contribution to the target activity. The method further includes generating graph data for at least one graph having a plurality of nodes and a plurality of edges using the set of the already-collected but not yet connected data, where each of the plurality of nodes corresponds to the actor or the object, and where an attribute associated with each of the plurality of edges corresponds to a measurement associated with the target activity during a temporal dimension of interest. The method further includes converting the graph data into metric space data using a graph embedding process.

Graph embedding already-collected but not yet connected data

Systems and methods for graph embedding already-collected but not yet connected data are disclosed. A method includes extracting a first set of actor-related data, a second set of object-related data, and a third set of temporal data from a set of the already-collected but not yet connected data representative of a unit-level contribution to the target activity. The method further includes generating graph data for at least one graph having a plurality of nodes and a plurality of edges using the set of the already-collected but not yet connected data, where each of the plurality of nodes corresponds to the actor or the object, and where an attribute associated with each of the plurality of edges corresponds to a measurement associated with the target activity during a temporal dimension of interest. The method further includes converting the graph data into metric space data using a graph embedding process.

Smart Mailbox Device
20180008076 · 2018-01-11 ·

A smart mailbox system capable of electronically communicating the receipt of mail and the collection of mail to an end user. User authentication allows the mailbox to communicate the identity of the user who collects the mail. The mailbox also images the mail so as to provide a record of the receipt of specific pieces of mail and to permit the user to visually see the collected mail without having to go to the mailbox. The identity of the sender and recipient are made available through the system. The system is also networkable so as to join multiple mailboxes within the same network.