Patent classifications
H04L51/42
Automated electronic package transmission method selection
A first email message is received. The first email message has a first recipient email address and a first payload. The first recipient email address has a first username portion and a first domain name portion. If a user account is associated with the first username portion, then the first payload is transmitted to an email address associated with that user account. Otherwise, the first payload is transmitted, via a fax transmission method, to a first destination specified by a first destination identifier based on the first username portion of the first recipient email address.
Activity-based message management
A method can include obtaining a limit value. The limit value can correspond to a number of times an email account having a set of email messages is accessed. The method can further include identifying a first email message of the set of email messages. The first email message can have an unread status. The method can further include obtaining, for the first email message, a count of one or more sessions. The first email message can have the unread status both during the one or more sessions and after the one or more sessions. The method can further include comparing the limit value to the count. The method can further include determining, based on the comparing, that a threshold is met. The method can further include modifying the first email message in response to the determining that the threshold is met.
Telecommunication and multimedia management method and apparatus
A telecommunication and multimedia management apparatus and method that supports voice and other media communications and that enables users to: (i) participate in multiple conversation modes, including live phone calls, conference calls, instant voice messaging or tactical communications; (ii) review the messages of conversations in either a live mode or a time-shifted mode and to seamlessly transition back and forth between the two modes; (iii) participate in multiple conversations either concurrently or simultaneously; (iv) archive the messages of conversations for later review or processing; and (v) persistently store media either created or received on the communication devices of users. The latter feature enables users to generate or review media when either disconnected from the network or network conditions are poor and to optimize the delivery of media over the network based on network conditions and the intention of the users participating in conversations.
Determining when to partition real time text content and display the partitioned content within separate conversation bubbles
A first user equipment (UE)—during a real time text (RTT) communication session with a second UE—may make a control function available to a local user of the first UE, who may invoke the control function to break up his/her RTT content within organized conversation bubbles. In an example process, after displaying first text character(s)—which was input by the local user—within a first conversation bubble designated for the first UE (or the local user thereof), the first UE may detect an invocation of the control function, followed by additional user input requesting to type one or more second text characters. Invocation of the control function prior to the additional user input requesting to type the second text character(s) may cause the first UE to display the second text character(s) within a second conversation bubble designated for the first UE, rather than the first conversation bubble.
System architecture for message transportation management
A message transportation management system can be configured to receive a message directed to a plurality of target message recipients. The system can determine a plurality of levels of activity, each corresponding to one of the plurality of target message recipients. The system can receive a level of activity threshold associated with each of the plurality of target message recipients. The system can determine that the first subgroup of target message recipients qualifies as priority target message recipients. The system can transmit, via a priority transfer location, the message to the first subgroup of target message recipients and transmit, via a default transfer location different from the priority transfer location, the message to a second subgroup of target message recipients.
System architecture for message transportation management
A message transportation management system can be configured to receive a message directed to a plurality of target message recipients. The system can determine a plurality of levels of activity, each corresponding to one of the plurality of target message recipients. The system can receive a level of activity threshold associated with each of the plurality of target message recipients. The system can determine that the first subgroup of target message recipients qualifies as priority target message recipients. The system can transmit, via a priority transfer location, the message to the first subgroup of target message recipients and transmit, via a default transfer location different from the priority transfer location, the message to a second subgroup of target message recipients.
Privacy-safe connection recommendations
When a messaging system generates connection recommendations for a new user, who first registers with the messaging system, the signals available for generation of recommendations may be limited to the user's contact book matches. Using just this limited signal poses a concern associated with leaking information about users represented by the recommendations. The technical problem of generating connection recommendations for a user at registration time in a privacy-safe manner is addressed by a recommendation methodology that obscures the connection source and the connection distance of the recommended profiles.
Privacy-safe connection recommendations
When a messaging system generates connection recommendations for a new user, who first registers with the messaging system, the signals available for generation of recommendations may be limited to the user's contact book matches. Using just this limited signal poses a concern associated with leaking information about users represented by the recommendations. The technical problem of generating connection recommendations for a user at registration time in a privacy-safe manner is addressed by a recommendation methodology that obscures the connection source and the connection distance of the recommended profiles.
DISPLAYING A DATABASE RECORD IN A CHAT PLATFORM
Provided herein are system, apparatus, device, method and/or computer program product embodiments, and/or combinations and sub-combinations thereof for displaying a database record in a chat platform. In a given embodiment, a server may detect a request to launch a search window, including an input field. The server may cause the display of the search window, including the input field, in response to detecting the request to launch the search window. The server may receive a string via the input field. The server may query a database for a database record matching the string. The server may receive a selection of the database record from the chat participant. The server may cause display of a subset of fields of the database record in the chat session.
Systems and methods for performing a simulated phishing attack
Systems and methods for performing a simulated phishing attack are provided. A simulated attack server can send a simulated attack email including a unique identifier to a target. The simulated attack server can receive a reply email including the unique identifier from the target. The simulated attack server can extract the unique identifier from the reply email. The simulated attack server can determine a match between the unique identifier and an identity of the target. The simulated attack server can record a target failure, responsive to determining the match between the unique identifier and the identity of the target.