Patent classifications
H04L51/212
STORAGE SPACE OPTIMIZATION FOR EMAILS
In some implementations, a storage optimization system may receive a plurality of emails. Accordingly, the system may identify at least one email associated with a limited capacity in the plurality of emails. The system may further scan, from the at least one email, one or more hyperlinks to determine a website associated with the at least one email and an identifier associated with an event. The system may determine, using a database, a traversal path and at least one application programming interface (API) call associated with the website. Accordingly, the system may traverse the website using the traversal path and the at least one API using the identifier to determine that the limited capacity is filled. The system may delete the at least one email associated with the limited capacity based on determining that the limited capacity is filled.
COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC ADAPTIVE CONTENT-BASED PROCESSING OF ELECTRONIC MESSAGES AND METHODS OF USE THEREOF
Systems and methods of the present disclosure enable improved content filtering by determining a profile state of the user profile based at least in part on at least one attribute of the user profile and determining a user profile criterion associated with the user profile based on the profile state including a threshold value to trigger a filter parameter associated with the profile objective, where the filter parameter comprises a content type to be processed so as to facilitate achieving the profile objective. The filter parameter is determined based on the profile state surpassing the user profile criterion. A content recognition model is used to identify a message content of each message. An electronic message that matches the content type is identified and filtered at the electronic messaging client to prevent the content from being presented.
COMPUTER-BASED SYSTEMS PROGRAMMED FOR AUTOMATIC ADAPTIVE CONTENT-BASED PROCESSING OF ELECTRONIC MESSAGES AND METHODS OF USE THEREOF
Systems and methods of the present disclosure enable improved content filtering by determining a profile state of the user profile based at least in part on at least one attribute of the user profile and determining a user profile criterion associated with the user profile based on the profile state including a threshold value to trigger a filter parameter associated with the profile objective, where the filter parameter comprises a content type to be processed so as to facilitate achieving the profile objective. The filter parameter is determined based on the profile state surpassing the user profile criterion. A content recognition model is used to identify a message content of each message. An electronic message that matches the content type is identified and filtered at the electronic messaging client to prevent the content from being presented.
MANAGING VERSION SHARING IN A DATA EXCHANGE
Systems and methods for managing membership in a private data exchange are provided herein. In one embodiment, the method includes generating a plurality of listings in a data exchange, each of the plurality of listings comprising version metadata and referencing a data set within a database. The method further includes receiving a request for access to a first listing of the plurality of listings and, in response to the request, accessing a first version of the data set that is compatible with first version metadata of the first listing.
Electronic mail delivery negotiation and rejection using sender specified acceptance criteria values
Processing electronic mail can include receiving, within an electronic mail server, an electronic mail from a sender client system, sending acceptance criteria for a recipient of the electronic mail to the sender client system responsive to receiving the electronic mail, and receiving, within the electronic mail server, acceptance criteria values from the sender client system in response to the acceptance criteria for the recipient. Using a processor of the electronic mail server, a determination is made whether the acceptance criteria values comply with the acceptance criteria. Responsive to determining that the acceptance criteria values are non-compliant with the acceptance criteria, the electronic mail server rejects the electronic mail, wherein the electronic mail is not delivered to the recipient, and providing, to the sender client system, an indication of rejection of the electronic mail including a reason for non-compliance.
Electronic mail delivery negotiation and rejection using sender specified acceptance criteria values
Processing electronic mail can include receiving, within an electronic mail server, an electronic mail from a sender client system, sending acceptance criteria for a recipient of the electronic mail to the sender client system responsive to receiving the electronic mail, and receiving, within the electronic mail server, acceptance criteria values from the sender client system in response to the acceptance criteria for the recipient. Using a processor of the electronic mail server, a determination is made whether the acceptance criteria values comply with the acceptance criteria. Responsive to determining that the acceptance criteria values are non-compliant with the acceptance criteria, the electronic mail server rejects the electronic mail, wherein the electronic mail is not delivered to the recipient, and providing, to the sender client system, an indication of rejection of the electronic mail including a reason for non-compliance.
Machine learning and validation of account names, addresses, and/or identifiers
Systems and methods are disclosed for determining if an account identifier is computer-generated. One method includes receiving the account identifier, dividing the account identifier into a plurality of fragments, and determining one or more features of at least one of the fragments. The method further includes determining the commonness of at least one of the fragments, and determining if the account identifier is computer-generated based on the features of at least one of the fragments, and the commonness of at least one of the fragments.
Machine learning and validation of account names, addresses, and/or identifiers
Systems and methods are disclosed for determining if an account identifier is computer-generated. One method includes receiving the account identifier, dividing the account identifier into a plurality of fragments, and determining one or more features of at least one of the fragments. The method further includes determining the commonness of at least one of the fragments, and determining if the account identifier is computer-generated based on the features of at least one of the fragments, and the commonness of at least one of the fragments.
System and method for email account takeover detection and remediation utilizing AI models
A new approach is proposed to support account takeover (ATO) detection based on login attempts by users. The approach relies on assessing fraudulence confidence level of login IP addresses to classify the login attempts by the users. A plurality of attributes/features in one or more user login data logs are extracted and used to build a labeled dataset for training a machine learning (ML) model that relies on statistics of the login attempts to classify and detect fraudulent logins. These attributes make it possible to ascertain if a login attempt or instance by a user is suspicious based on the ML model. In some embodiments, the ML model is trained using anonymized user login data to preserve privacy of the users and a proper level of data anonymization is determined based on the ML model's accuracy in detecting the ATO attacks when trained with different versions of the anonymized data.
RNA targeting methods and compositions
Provided herein are CRISPR/Cas methods and compositions for targeting RNA molecules, which can be used to detect, edit, or modify a target RNA.