H04W4/12

Facilitating cross-organization communications

Techniques are described for expediting a generation of a means of communication between two people associated with different organizations. A first person associated with a communication platform may submit a request to the communication platform to generate an invitation to communicate via the communication platform. The first person may provide the invitation to a second person directly or via the communication platform. Responsive to receiving an indication that the second person has accepted the invitation, the communication platform may generate the means of communication between the first person and the second person. The communication platform may update respective user interfaces to include the means of communication. The communication platform may process messages and/or data between the first person and the second person that is input on the respective user interface and sent via the means of communication.

Facilitating cross-organization communications

Techniques are described for expediting a generation of a means of communication between two people associated with different organizations. A first person associated with a communication platform may submit a request to the communication platform to generate an invitation to communicate via the communication platform. The first person may provide the invitation to a second person directly or via the communication platform. Responsive to receiving an indication that the second person has accepted the invitation, the communication platform may generate the means of communication between the first person and the second person. The communication platform may update respective user interfaces to include the means of communication. The communication platform may process messages and/or data between the first person and the second person that is input on the respective user interface and sent via the means of communication.

Information search method, terminal, network device, and system
11582179 · 2023-02-14 · ·

In an example information search method, if a first terminal performs a first search based on a first keyword, and does not obtain a result, the first terminal generates a request for performing a second search, and sends, to a network device, the request for performing the second search. The network device sends a second request to a second terminal. The second terminal performs the second search based on the first keyword, obtains a second search result, and sends the second search result to the first terminal. Through this technique, it can be effectively ensured that a user finds a search result corresponding to the first keyword, and that user privacy is also ensured.

Vehicle and control method thereof

A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.

Vehicle and control method thereof

A personal mobility sharing system includes: a personal mobility, a server, an owner terminal and a member terminal connected through a network, and the server is configured to register a device information of the personal mobility, receive a sharing setting information from the owner terminal, set a sharing mode of the personal mobility based on the sharing setting information, receive an authentication request from the member terminal and transmit an unlock signal to the personal mobility when the authentication request includes pre-registered authentication information.

Communications method, apparatus, and system

A communications method includes determining, by a first platoon member, at least one second platoon member, where the first platoon member and the at least one second platoon member belong to a same platoon, and signal quality of a communication link from the first platoon member to each second platoon member is less than a first preset quality threshold, determining, by the first platoon member, a target communications node, where signal quality of a communication link from the target communications node to each second platoon member is greater than or equal to the first preset quality threshold, and sending, by the first platoon member, to-be-sent data to each second platoon member through the target communications node.

Anti-cyberbullying systems and methods

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

Anti-cyberbullying systems and methods

Some embodiments use text and/or image processing methods to determine whether a user of an electronic messaging platform is subject to an online threat such as cyberbullying, sexual grooming, and identity theft, among others. In some embodiments, a text content of electronic messages is automatically harvested and aggregated into conversations. Conversation data are then analyzed to extract various threat indicators. A result of a text analysis may be combined with a result of an analysis of an image transmitted as part of the respective conversation. When a threat is detected, some embodiments automatically send a notification to a third party (e.g., parent, teacher, etc.)

METHODS AND DEVICES FOR ELECTRONIC COMMUNICATION ENHANCED WITH METADATA

There are disclosed devices, methods, and systems for electronic communication enhanced with visual indicators of metadata. Metadata is received from a plurality of disparate sources, the metadata reflective of at least one of location, social connectedness, biomechanics, mood, and health and wellness states of an individual with whom a user is engaging in electronic communication. A visual representation of the metadata is generated, the visual representation including a plurality of visual indicators of the states. A user interface for electronic communication with the individual is presented, the user interface including the visual representation of the metadata. While the user is engaging in electronic communication with the individual, updated metadata from at least one of the disparate sources is received, and the user interface is updated to reflect the updated metadata.

ACCESS AND MESSAGING IN A MULTI CLIENT NETWORK

A messaging system for exchanging messages between nodes in a network via a broker that uses a publish-subscribe message protocol, which nodes have object identifications (IDs). Messages between the nodes are routed using the object IDs of the nodes. Secure communication is provided using authentication according to digital certificates being used as first and second tiers by a commissioning broker and a data broker, respectively, in which the second tier certificate used by the data broker has a shorter lived expiration time.