H04L51/212

SURFACING ATTACHMENTS IN EMAIL SEARCH SUGGESTION DROPDOWN

Presenting search suggestions within a messaging application that include attachments without searching messages for the attachments is provided. Messages are received at a computer and managed by a messaging application. A query for suggestions is received via the messaging application. The query is performed by the messaging application without querying the messages that have been received through the messaging application. Suggested search results are provided by the messaging application. The suggestions include attachments that were received via a message through the messaging application. In one or more aspects, the suggested search results also provide other attachments that were received by other than the messaging application.

SURFACING ATTACHMENTS IN EMAIL SEARCH SUGGESTION DROPDOWN

Presenting search suggestions within a messaging application that include attachments without searching messages for the attachments is provided. Messages are received at a computer and managed by a messaging application. A query for suggestions is received via the messaging application. The query is performed by the messaging application without querying the messages that have been received through the messaging application. Suggested search results are provided by the messaging application. The suggestions include attachments that were received via a message through the messaging application. In one or more aspects, the suggested search results also provide other attachments that were received by other than the messaging application.

SYSTEM AND METHOD FOR TEXT ANALYSIS AND ROUTING OF OUTGOING MESSAGES
20230004724 · 2023-01-05 · ·

The present invention allows text analysis and routing of an outgoing message. The system intercepts outgoing messages for analysis by a TAS software module. The module assigns an analytical score to the message, then compares the score to a threshold. If the score is below the threshold, the message is transmitted to its ultimate destination. If not, the message may be routed for correction by the message's composer or quality assurance staff. After such correction, the message new analytical score is generated and compared, and, if necessary, the process repeats again.

SYSTEM AND METHOD FOR TEXT ANALYSIS AND ROUTING OF OUTGOING MESSAGES
20230004724 · 2023-01-05 · ·

The present invention allows text analysis and routing of an outgoing message. The system intercepts outgoing messages for analysis by a TAS software module. The module assigns an analytical score to the message, then compares the score to a threshold. If the score is below the threshold, the message is transmitted to its ultimate destination. If not, the message may be routed for correction by the message's composer or quality assurance staff. After such correction, the message new analytical score is generated and compared, and, if necessary, the process repeats again.

SYSTEMS AND METHODS FOR PRESENTING EVENT NOTIFICATIONS, BASED ON TRENDING COMMUNICATIONS, ON DEVICES NOTWITHSTANDING A USER INSTRUCTION TO DISABLE EVENT NOTIFICATIONS
20230006954 · 2023-01-05 ·

Systems and methods are provided for generating for presentation information about an event on a device that is in a mode of operation that prevents presentation of information about events. This may be accomplished by a media guidance application that receives a command, on a user device associated with a first user, to place the user device in a do not disturb mode. The media guidance application receives, while the user device is in the do not disturb mode, information about an event and determines whether the event is relevant to the user. The media guidance application then determines whether the event is trending among a plurality of users associated with the user and, if trending, displays, while the user device is in the do not disturb mode, a notification about the event to the user on the user device.

SYSTEMS AND METHODS FOR PRESENTING EVENT NOTIFICATIONS, BASED ON TRENDING COMMUNICATIONS, ON DEVICES NOTWITHSTANDING A USER INSTRUCTION TO DISABLE EVENT NOTIFICATIONS
20230006954 · 2023-01-05 ·

Systems and methods are provided for generating for presentation information about an event on a device that is in a mode of operation that prevents presentation of information about events. This may be accomplished by a media guidance application that receives a command, on a user device associated with a first user, to place the user device in a do not disturb mode. The media guidance application receives, while the user device is in the do not disturb mode, information about an event and determines whether the event is relevant to the user. The media guidance application then determines whether the event is trending among a plurality of users associated with the user and, if trending, displays, while the user device is in the do not disturb mode, a notification about the event to the user on the user device.

METHOD AND SYSTEM FOR MANAGING IMPERSONATED, FORGED/TAMPERED EMAIL
20230007011 · 2023-01-05 · ·

The present invention relates to a method and system for managing an impersonated or forged/tampered email. To this end, the present invention provides a method and a system for managing an impersonated or forged/tampered email, the method comprising: a step in which, when an email is received at an email account of a recipient email server through a network, a system for managing an impersonated or forged/tampered email, positioned between the network and the recipient email server, generates verification request information including details of the received email and a sender email address and transmits same to the sender email address of the received email; a step in which, when the verification request information is provided, a sender email server of the sender email address checks if the sender email address included in the verification request information is valid, and returns an error code to the system for managing the impersonated or forged/tampered email when the sender mail address is not valid; and a step in which, when the error code is returned, system for managing the impersonated or forged/tampered email blocks the received email.

SYSTEMS AND METHODS TO CURATE NOTIFICATIONS FROM UNSUBSCRIBED SOCIAL MEDIA ACCOUNTS
20230004611 · 2023-01-05 ·

Methods and systems for curating notifications from unfollowed accounts are described herein. The system tracks that a first account previously followed a second account and subsequently unfollowed the second account. The system identifies an interest of the first account and monitors the activities of the second account for activity that matches the interest. If there is a match between the interest and an activity of the second account, the system notifies the first account of the activity. These methods and systems provide the user with relevant information from unfollowed accounts.

SYSTEMS AND METHODS TO CURATE NOTIFICATIONS FROM UNSUBSCRIBED SOCIAL MEDIA ACCOUNTS
20230004611 · 2023-01-05 ·

Methods and systems for curating notifications from unfollowed accounts are described herein. The system tracks that a first account previously followed a second account and subsequently unfollowed the second account. The system identifies an interest of the first account and monitors the activities of the second account for activity that matches the interest. If there is a match between the interest and an activity of the second account, the system notifies the first account of the activity. These methods and systems provide the user with relevant information from unfollowed accounts.

Dynamically Controlling Access to Linked Content in Electronic Communications

Aspects of the disclosure relate to dynamically controlling access to linked content in electronic communications. A computing platform may receive, from a user computing device, a request for a uniform resource locator associated with an email message and may evaluate the request using one or more isolation criteria. Based on evaluating the request, the computing platform may identify that the request meets at least one isolation condition associated with the one or more isolation criteria. In response to identifying that the request meets the at least one isolation condition associated with the one or more isolation criteria, the computing platform may initiate a browser mirroring session with the user computing device to provide the user computing device with limited access to a resource corresponding to the uniform resource locator associated with the email message.