Patent classifications
H04L51/42
Mobile device selection of preferred content
A user of a mobile device can specify particular news, weather, traffic, or other perishable content received on a particular Internet radio station or other media channel received by the mobile device. The user can customize the station so that wherever the user is currently located, they can receive on their mobile device perishable content related to a preferred geographic location or other category. In some embodiments, a user can specify that a customized station plays local news from one city at the top of the hour, traffic from another city at 10 minutes past the hour, and music or other content at other times. The user can also customize original content from the personal libraries of specified users. Thus, a user can customize not only the genre of content or select a particular local station, but can also modify the perishable content provided by the customized station.
Tracking electronic mail messages in a separate computing system
Content items found in a designated folder within an e-mail system are obtained by a separate computing system. The content items are converted into entities within the separate computing system, and associated with one or more other entities within the separate computing system, based on a set of mapping rules. The content items can then be surfaced, in context, in the separate computing system.
Tracking electronic mail messages in a separate computing system
Content items found in a designated folder within an e-mail system are obtained by a separate computing system. The content items are converted into entities within the separate computing system, and associated with one or more other entities within the separate computing system, based on a set of mapping rules. The content items can then be surfaced, in context, in the separate computing system.
Method for configuring operating time period for mailbox content and instant messaging content in system
A method for setting an operation time range of mailbox content and instant messaging content in a system is disclosed in the present invention, wherein a method for setting an operation time of mailbox content includes: selecting a role, a user or an employee as a mailbox user; setting a permission time range for each mailbox user, wherein said permission time range includes one or more of the following types: a time range from a time point, which is determined by going backwards from a current time for a fixed time length, to the current time, a time range from a start time to a current time, a time range from a deadline to a system initial time, and a time range from a start time to a deadline; and the content within the permission time range of the mailbox user in a mailbox account used by the mailbox user being operated by said mailbox user. In the present invention, by setting a permission time range, only the content set within the permission time range in the mailbox account or the instant messaging account can be operated, thus improving the security of data information in the mailbox account and the instant messaging account.
STORAGE SPACE OPTIMIZATION FOR EMAILS
In some implementations, a storage optimization system may receive a plurality of emails. Accordingly, the system may identify at least one email associated with a limited capacity in the plurality of emails. The system may further scan, from the at least one email, one or more hyperlinks to determine a website associated with the at least one email and an identifier associated with an event. The system may determine, using a database, a traversal path and at least one application programming interface (API) call associated with the website. Accordingly, the system may traverse the website using the traversal path and the at least one API using the identifier to determine that the limited capacity is filled. The system may delete the at least one email associated with the limited capacity based on determining that the limited capacity is filled.
STORAGE SPACE OPTIMIZATION FOR EMAILS
In some implementations, a storage optimization system may receive a plurality of emails. Accordingly, the system may identify at least one email associated with a limited capacity in the plurality of emails. The system may further scan, from the at least one email, one or more hyperlinks to determine a website associated with the at least one email and an identifier associated with an event. The system may determine, using a database, a traversal path and at least one application programming interface (API) call associated with the website. Accordingly, the system may traverse the website using the traversal path and the at least one API using the identifier to determine that the limited capacity is filled. The system may delete the at least one email associated with the limited capacity based on determining that the limited capacity is filled.
Multi-channel engagement platform converter
Conversion of communications from a first device over a firsts communication channel to a second communication channel that is utilized by a second communication device such that an enterprise employee can interface with and communication with a customer using the customer's preferred channel or application for communication.
Multi-channel engagement platform converter
Conversion of communications from a first device over a firsts communication channel to a second communication channel that is utilized by a second communication device such that an enterprise employee can interface with and communication with a customer using the customer's preferred channel or application for communication.
Systems and methods for retrieving relevant information content while typing
Methods, systems, and apparatus, including computer programs stored on computer-readable media, for retrieving relevant information content while typing are disclosed. Upon identifying text being entered by a user into a text field of a typing-enabled application, one or more keywords may be determined that match the text. The matching keywords may be presented for selection. Upon receiving a selection of a keyword, an information card related to the selected keyword may be retrieved and presented. In addition to presenting the information card, information content associated with the information card may be inserted into the text field of the typing-enabled application.
System and method for email account takeover detection and remediation utilizing AI models
A new approach is proposed to support account takeover (ATO) detection based on login attempts by users. The approach relies on assessing fraudulence confidence level of login IP addresses to classify the login attempts by the users. A plurality of attributes/features in one or more user login data logs are extracted and used to build a labeled dataset for training a machine learning (ML) model that relies on statistics of the login attempts to classify and detect fraudulent logins. These attributes make it possible to ascertain if a login attempt or instance by a user is suspicious based on the ML model. In some embodiments, the ML model is trained using anonymized user login data to preserve privacy of the users and a proper level of data anonymization is determined based on the ML model's accuracy in detecting the ATO attacks when trained with different versions of the anonymized data.