H04L51/063

SYSTEM AND METHOD FOR DEEP MESSAGE EDITING IN A CHAT COMMUNICATION ENVIRONMENT

A method includes detecting a modification to one chat message that forms a modified one chat message. Subsequent chat messages that are posted after the one chat message has been posted are processed. The method includes automatically identifying a chat message from the subsequent chat messages that has a dependency on the one chat message. The method also includes automatically determining whether a content of the chat message from the subsequent chat messages is impacted by the modified one chat message.

SYSTEM AND METHOD FOR DEEP MESSAGE EDITING IN A CHAT COMMUNICATION ENVIRONMENT

A method includes detecting a modification to one chat message that forms a modified one chat message. Subsequent chat messages that are posted after the one chat message has been posted are processed. The method includes automatically identifying a chat message from the subsequent chat messages that has a dependency on the one chat message. The method also includes automatically determining whether a content of the chat message from the subsequent chat messages is impacted by the modified one chat message.

Transitioning between private and non-private state
11695716 · 2023-07-04 · ·

This specification is generally directed to techniques for automatically transitioning applications—especially those that enable exchange of messages between users—into and/or out of a private state based on a variety of signals associated with the messages and/or the participants themselves. In various implementations, an ongoing message exchange thread between two or more participants operating two or more respective message exchange clients may be examined. Based at least in part on the examining, a likelihood may be determined that message(s) directed by one of the participants to another of the participants as part of the ongoing message exchange thread would be deemed private by at least a given participant of the two or more participants. A determination may be made of whether the determined likelihood satisfies one or more thresholds, and in response, one or more of the message exchange clients may be transitioned into a private state.

Transitioning between private and non-private state
11695716 · 2023-07-04 · ·

This specification is generally directed to techniques for automatically transitioning applications—especially those that enable exchange of messages between users—into and/or out of a private state based on a variety of signals associated with the messages and/or the participants themselves. In various implementations, an ongoing message exchange thread between two or more participants operating two or more respective message exchange clients may be examined. Based at least in part on the examining, a likelihood may be determined that message(s) directed by one of the participants to another of the participants as part of the ongoing message exchange thread would be deemed private by at least a given participant of the two or more participants. A determination may be made of whether the determined likelihood satisfies one or more thresholds, and in response, one or more of the message exchange clients may be transitioned into a private state.

SYSTEM AND METHOD OF RECEIVING, MANAGING, CONTROLLING, SAVING AND SHARING INFORMATION CONTENT OF SOCIAL MEDIA PLATFORMS AND OTHER APPLICATIONS
20230006964 · 2023-01-05 ·

A system and method for aggregating content, social sharing and instant messaging of saved electronic content to a memory location includes an administrator for controlling and allocating storage quota, based on a subscription type of one or more users. The user receives the electronic content on his computing device by selecting a text from the electronic content or the user can select the document by pressing the copy menu, which causes a pop-up user interface. The user can save the electronic content in one click directly on the user device or to a server as well as collaborate on the instant messaging platform to chat or share electronic content with other users.

SYSTEM AND METHOD OF RECEIVING, MANAGING, CONTROLLING, SAVING AND SHARING INFORMATION CONTENT OF SOCIAL MEDIA PLATFORMS AND OTHER APPLICATIONS
20230006964 · 2023-01-05 ·

A system and method for aggregating content, social sharing and instant messaging of saved electronic content to a memory location includes an administrator for controlling and allocating storage quota, based on a subscription type of one or more users. The user receives the electronic content on his computing device by selecting a text from the electronic content or the user can select the document by pressing the copy menu, which causes a pop-up user interface. The user can save the electronic content in one click directly on the user device or to a server as well as collaborate on the instant messaging platform to chat or share electronic content with other users.

A METHOD AND SYSTEM FOR DETERMINING AND ACTING ON AN EMAIL CYBER THREAT CAMPAIGN

A cyber security appliance (CSA) configurable to protect a computer system from email cyber threat campaigns is disclosed. The CSA may comprise: an email module configured to process all incoming emails and log data and metadata; a cyber threat module coupled configured to assess a severity level of a cyber threat using one or more Artificial Intelligence (AI) models; an AI classifier configured to determine the likelihood of an email cyber threat campaign; an autonomous response module configured to act against emails determined to be threats; and a user interface module configured to generate a report, present data on a display, and show a graphical display of the system indicating the details of a cyber threat campaign.

SYSTEMS AND METHODS FOR MITIGATING THE SPREAD OF OFFENSIVE CONTENT AND/OR BEHAVIOR
20220417194 · 2022-12-29 ·

Methods, systems, and computer programs for identifying offensive content. A method can include for each particular responsive message received in response to an initial message: providing the particular responsive message as an input to a machine learning model trained to predict a likelihood that an initial message includes offensive content based on processing of a responsive message received responsive to the initial message, processing the content of the particular responsive message through the machine learning model to generate output data indicating a likelihood that the initial message includes offensive content, and storing the generated output data. The method can further include determining, based on the stored output date for each of the responsive messages, whether the initial message likely includes offensive content, and based on a determination that the output data for each of the responsive messages indicates that the initial message likely includes offensive content, performing a remedial operation.

SYSTEMS AND METHODS FOR MITIGATING THE SPREAD OF OFFENSIVE CONTENT AND/OR BEHAVIOR
20220417194 · 2022-12-29 ·

Methods, systems, and computer programs for identifying offensive content. A method can include for each particular responsive message received in response to an initial message: providing the particular responsive message as an input to a machine learning model trained to predict a likelihood that an initial message includes offensive content based on processing of a responsive message received responsive to the initial message, processing the content of the particular responsive message through the machine learning model to generate output data indicating a likelihood that the initial message includes offensive content, and storing the generated output data. The method can further include determining, based on the stored output date for each of the responsive messages, whether the initial message likely includes offensive content, and based on a determination that the output data for each of the responsive messages indicates that the initial message likely includes offensive content, performing a remedial operation.

Computerized tools to enhance speed and propagation of content in electronic messages among a system of networked computing devices

Various embodiments relate generally to data science and data analysis, computer software and systems, and control systems to provide a platform to facilitate implementation of an interface, and, more specifically, to a computing and data storage platform that implements specialized logic to enhance speed and distribution of content in electronic messages as a function, for example, modifiable portions of the content. In some examples, a method may include identifying a performance metric values assigned to one or more portions of an electronic message, determining an equivalent to a portion of the electronic message to enhance a performance metric value, substituting the equivalent in place of the portion to form an adapted electronic message, and receiving data to set, for example, a time at which the adapted electronic message is to be published.