H04L51/08

Dynamic credit report obfuscation

A method for creating a customized and redacted credit report may include transmitting a user request to generate a customized credit report, receiving a copy of a stored credit report, analyzing the copy of the stored credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a customized credit report. A user device for configuring a customized credit report may include a processor, a display in communication with the processor, and a non-transitory memory storing instructions that, when executed by the processor, cause the processor to perform processing including transmitting a user request to generate a customized credit report, displaying one or more information fields and one or more selectable user interface elements, transmitting a credit report redaction list, and receiving a shareable credit report link associated with a customized credit report.

Classification engine instance informing parsing of emails received by an email client instance executed by a mobile device
11568368 · 2023-01-31 · ·

A system in which existing email protocols are leveraged to exchange information between two or more client devices. In some examples, a trained classifier can be leveraged to apply a label or classification to a received email. Based on the classification of the email, one or more parsers can be selected which can output data to be displayed in a dedicated portion of a graphical user interface.

EMAIL WIDGETS

A system includes a processing device and memory device configured to receive a widget insertion request associated with an email message. The processing device is further configured to customize one or more options of the widget based on one or more user selections. The processing device can also insert the widget into a body of the email message. The widget provides one or more interactive services to a recipient of the email message based on the one or more options. The processing device is configured to send the email message with the widget to the recipient to allow the recipient to interact with the widget upon receiving the email message.

Protecting information using policies and encryption
11563735 · 2023-01-24 · ·

A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.

Protecting information using policies and encryption
11563735 · 2023-01-24 · ·

A technique and system protects documents at rest and in motion using declarative policies and encryption. Encryption in the system is provided transparently and can work in conjunction with policy enforcers installed at a system. A system can protect information or documents from: (i) insider theft; (ii) ensure confidentiality; and (iii) prevent data loss, while enabling collaboration both inside and outside of a company.

Changing visual aspects of a graphical user interface to bring focus to a message

This disclosure describes a system that enables a user to efficiently view messages of a conversation that are more relevant to the user. The system is configured to display content of a first application within an application user interface (UI) and to determine that a message of a second application being monitored includes a trigger feature that comprises a piece of information or an interaction from another user that is worthy of the user's attention. The system can then generate a visual notification for the trigger feature. The visual notification can be displayed in association with a graphical element of the application UI. Upon receiving an indication of a selection of the visual notification, the system can switch from displaying the content of the first application to displaying the message of the second application and trigger feature and/or change visual characteristics associated with the message to bring focus to the message.

Using keyboard app to encrypt e-mail and other digital data
11563725 · 2023-01-24 ·

A system uses a keyboard application to encrypt and decrypt e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.

Using keyboard app to encrypt e-mail and other digital data
11563725 · 2023-01-24 ·

A system uses a keyboard application to encrypt and decrypt e-mail, messages, and other digital data. By using quantum random number generators, the system has improved data security. Using a quantum random number, an agent (at a sender side) generates an encryption key which is used to automatically encrypt a message. The encryption key is stored at a key server. The encrypted message will be sent by an application using its standard transmission means such as SMTP, SMS, and others. The encrypted message can be automatically unencrypted by using an agent (at a recipient side) and retrieving the key from the key server. The system also provides an optional double encryption, where the message is encrypted with a user-generated password before being encrypted using the encryption key.

AUGMENTING AUDIENCE MEMBER EMOTES IN LARGE-SCALE ELECTRONIC PRESENTATION
20230231730 · 2023-07-20 ·

A presentation service generates an audience interface for an electronic presentation. The audience interface may simulate an in-person presentation, including features such as a central presenter and seat locations for audience members. The audience members may select emotes which may be displayed in the audience interface. The emotes may indicate the audience members' opinion of the content being presented. The presentation service may enable chats between multiple audience members, grouping of audience members private rooms, and other virtual simulations of functions corresponding to in-person presentations.

AUGMENTING AUDIENCE MEMBER EMOTES IN LARGE-SCALE ELECTRONIC PRESENTATION
20230231730 · 2023-07-20 ·

A presentation service generates an audience interface for an electronic presentation. The audience interface may simulate an in-person presentation, including features such as a central presenter and seat locations for audience members. The audience members may select emotes which may be displayed in the audience interface. The emotes may indicate the audience members' opinion of the content being presented. The presentation service may enable chats between multiple audience members, grouping of audience members private rooms, and other virtual simulations of functions corresponding to in-person presentations.