Patent classifications
H04L51/212
DELEGATED DOMAIN NAME SYSTEM RESPONDER FOR EMAILS
A DNS server receives from a receiving email system, a DNS query for an email domain stored at the DNS server, the DNS query including identifying information of a sender of an email. The DNS server extracts the identifying information of the email sender from the DNS query and identifies one of a plurality of delivering organizations from the information. The DNS server determines whether the identified delivering organization is authorized to deliver email on behalf of the email domain. In response to determining that the identified delivering organization is authorized to deliver email on behalf of the email domain, the DNS server generates a target validation record based on the identity of the authorized delivering organization and the email domain, the target validation record including one or more rules indicating to the receiving email system whether the delivering organization is an authorized sender of email for the email domain.
LOCATION BASED CONTENT SYSTEM FOR MOBILE APPLICATIONS
Disclosed are systems and methods for improving interactions with and between computers in content searching, hosting and/or providing systems supported by or configured with devices, servers and/or platforms. The disclosed systems and methods provide a novel framework for providing users with electronic retrieval capabilities that are activated upon the users' determined locations respective to real-world locations associated with a message providing entity. The disclosed technology combines the previously separate systems of mail extraction, geo-fencing and content delivery (e.g., notification) into a single system that efficiently manages a user's inbox in order to provide the user with content the user has expressly indicated is of interest to that user. The disclosed systems and methods effectively realize a location-aware mail experience that provides functionality for delivering location (and timing) specific content to a user when the user is actually capable of acting on/interacting with the content in real-time.
System and method for securing information provided via a social network application
A system and method allows users of a social network system to view different types of information based on rights and privileges associated with the information and attributes and characteristics of each user.
Method and apparatus for autonomous identification of similar and adjacent attacks based on detected attacks
A new approach is proposed to support autonomous similar and adjacent attack identification. First, an incident is created for a detected suspicious electronic message-borne attack at one user account with one tenant on an electronic communication platform. A plurality of insight events for similar or adjacent attacks are then generated automatically based on the detected attack and inserted into an insights queue. For each of the insight events in the insights queue, a search is conducted in a repository to identify a set of un-remediated attacks against user accounts of the same or different tenants on the electronic communication platform, wherein the set of un-remediated attacks are similar or adjacent to the detected attack. Insights on the identified un-remediated attacks against the user accounts in the same or different tenants that are similar or adjacent to the detected attack are automatically generated for an administrator and are remediated accordingly.
Method and apparatus for autonomous identification of similar and adjacent attacks based on detected attacks
A new approach is proposed to support autonomous similar and adjacent attack identification. First, an incident is created for a detected suspicious electronic message-borne attack at one user account with one tenant on an electronic communication platform. A plurality of insight events for similar or adjacent attacks are then generated automatically based on the detected attack and inserted into an insights queue. For each of the insight events in the insights queue, a search is conducted in a repository to identify a set of un-remediated attacks against user accounts of the same or different tenants on the electronic communication platform, wherein the set of un-remediated attacks are similar or adjacent to the detected attack. Insights on the identified un-remediated attacks against the user accounts in the same or different tenants that are similar or adjacent to the detected attack are automatically generated for an administrator and are remediated accordingly.
VERIFICATION OF SELECTED INBOUND ELECTRONIC MAIL MESSAGES
An email verification system is described. The email verification system stores names and associated email addresses. An email is received that has a sender name and a sender email address. If the email verification system determines that the sender name matches a stored name but the sender email address does not match with an email address associated with the stored name, the email is prevented from being transmitted to its recipient unless the email is verified as being legitimate. The email verification system transmits a request to verify the email via a configured verification method. If a response is received that verifies the email as legitimate, the email is delivered; otherwise the email is blocked.
VERIFICATION OF SELECTED INBOUND ELECTRONIC MAIL MESSAGES
An email verification system is described. The email verification system stores names and associated email addresses. An email is received that has a sender name and a sender email address. If the email verification system determines that the sender name matches a stored name but the sender email address does not match with an email address associated with the stored name, the email is prevented from being transmitted to its recipient unless the email is verified as being legitimate. The email verification system transmits a request to verify the email via a configured verification method. If a response is received that verifies the email as legitimate, the email is delivered; otherwise the email is blocked.
DEVICE AND METHOD TO DYNAMICALLY CONTROL UNAUTHORIZED TRANSMISSION OF MESSAGING IN A MESSAGING PLATFORM
Disclosed is a method for controlling the unauthorized transmission of a messaging thread in a messaging platform. The method includes the step of receiving first user addresses of intended recipients through an address module. The method then includes the step of initiating a messaging thread by entering textual information and/or attaching a media file through a messaging module or both. Further, the method includes the step of pre-storing second user addresses intended to be removed from the messaging thread through a listing module. The method then includes the step of matching the first user addresses of intended recipients with the second user addresses stored in the listing module through a matching module. The method includes the step of preventing transmission of the messaging thread to the matched second user addresses pre-stored in the listing module through a filter module.
DEVICE AND METHOD TO DYNAMICALLY CONTROL UNAUTHORIZED TRANSMISSION OF MESSAGING IN A MESSAGING PLATFORM
Disclosed is a method for controlling the unauthorized transmission of a messaging thread in a messaging platform. The method includes the step of receiving first user addresses of intended recipients through an address module. The method then includes the step of initiating a messaging thread by entering textual information and/or attaching a media file through a messaging module or both. Further, the method includes the step of pre-storing second user addresses intended to be removed from the messaging thread through a listing module. The method then includes the step of matching the first user addresses of intended recipients with the second user addresses stored in the listing module through a matching module. The method includes the step of preventing transmission of the messaging thread to the matched second user addresses pre-stored in the listing module through a filter module.
Rule-based annotation service in a cloud platform
Systems and methods are disclosed for subscribing to messages generated from a plurality of edge devices. One method comprises receiving, at a cloud platform from a plurality of edge devices, a plurality of messages that comply with a common schema and receiving, at the cloud platform from a custom application, an annotation stream request to generate at least one annotation stream and an annotation filter request to generate one or more annotation filters. The at least one annotation stream and the one or more annotation filters are then generated by the cloud platform. Based on the one or more filters, one or more of the plurality of messages are published, by the cloud platform, to the at least one annotation stream.