Patent classifications
H04L51/23
PHONE NUMBER BASED APPLICATION AUTHENTICATION
Systems and methods are provided for registering with a given application. The systems and methods include operations for receiving, with a messaging application, a request to authenticate a phone number from the given application, the phone number being input by a user to register an account with the given application; determining that the phone number received in the request matches a user phone number stored in a user account associated with the messaging application; in response to determining that the phone number received in the request matches the user phone number stored in the user account, transmitting a communication from the messaging application to the given application indicating that the phone number has been authenticated; and causing the given application to register the account for the user to enable the user to log into the given application.
Systems and methods for an artificial intelligence driven smart template
The present disclosure describes systems and methods for using a template for a simulated phishing campaign, A database includes a plurality of templates for simulated phishing campaigns, each template of the plurality of templates identifying a list of a plurality of types of simulated phishing communications and at least a portion of content for the simulated phishing communications. A campaign controller selects a template from the plurality of templates for a simulated phishing campaign directed to a user of a plurality of users; and communicates, to one or more devices of the user a first type of simulated phishing communication of the plurality of types of simulated phishing communications with at least the portion of content identified by the template.
Security verification of communications to tenants of a shared system
In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database service. These mechanisms and methods for security verification of communications to tenants of an on-demand database service can enable embodiments to allow tenants to selectively implement security measures with respect to inbound communications, etc. The ability of embodiments to provide such feature may allow tenants to efficiently and effectively implement security measures for in-bound emails.
Security verification of communications to tenants of a shared system
In accordance with embodiments, there are provided mechanisms and methods for security verification of communications to tenants of an on-demand database service. These mechanisms and methods for security verification of communications to tenants of an on-demand database service can enable embodiments to allow tenants to selectively implement security measures with respect to inbound communications, etc. The ability of embodiments to provide such feature may allow tenants to efficiently and effectively implement security measures for in-bound emails.
Interface, method and computer program product for controlling the transfer of electronic messages
Methods and switches are provided for communicating electronic messages between financial institutions. One example method includes receiving, at a first switch of a plurality of switches, an electronic message for a transaction, where the electronic message includes a unique identifier for the transaction, and identifying, by the first switch, one of the plurality of switches to process the electronic message based on the unique identifier. The method also includes, in response to the first switch being the identified one of the plurality of switches, processing, by the first switch, the electronic message and, in response to a second switch of the plurality of switches being the identified one of the plurality of switches, forwarding, by the first switch, the electronic message to the second switch for processing.
Interface, method and computer program product for controlling the transfer of electronic messages
Methods and switches are provided for communicating electronic messages between financial institutions. One example method includes receiving, at a first switch of a plurality of switches, an electronic message for a transaction, where the electronic message includes a unique identifier for the transaction, and identifying, by the first switch, one of the plurality of switches to process the electronic message based on the unique identifier. The method also includes, in response to the first switch being the identified one of the plurality of switches, processing, by the first switch, the electronic message and, in response to a second switch of the plurality of switches being the identified one of the plurality of switches, forwarding, by the first switch, the electronic message to the second switch for processing.
Communications and analysis system
An electronic communications method includes sending, by a user device, an electronic communication to a device. The electronic communications method further includes receiving, by the user device, an electronic confirmation message. The electronic communications method further includes sending, by the user device, electronic information. The electronic communications message further includes receiving, by the user device, a value. The value is based on electronically analyzing simultaneous electronic information being sent to the device. The electronic communications message further includes receiving, by the user device, an electronic recommendation message. The electronic recommendation message includes a recommended schedule of communications based on the score. The electronic communications method further includes sending, by the user device, an electronic request message based on the value and the electronic recommendation message.
Communications and analysis system
An electronic communications method includes sending, by a user device, an electronic communication to a device. The electronic communications method further includes receiving, by the user device, an electronic confirmation message. The electronic communications method further includes sending, by the user device, electronic information. The electronic communications message further includes receiving, by the user device, a value. The value is based on electronically analyzing simultaneous electronic information being sent to the device. The electronic communications message further includes receiving, by the user device, an electronic recommendation message. The electronic recommendation message includes a recommended schedule of communications based on the score. The electronic communications method further includes sending, by the user device, an electronic request message based on the value and the electronic recommendation message.
SYSTEMS AND METHODS FOR ALERT SERVICES
Embodiments relate to systems, processes and devices for an information delivery platform or data hub with an alert processor that can be configured to receive a request to generate an alert configuration at the data hub, the request indicating a target unit; generate and store an alert rule corresponding to the alert configuration, the alert rule having a trigger and an action; detect an event at the data hub based on a set of data of the data stored at the data hub, the event having event data; convert the event data to an alert trigger at the data hub based on the trigger of the alert rule; generate an alert notification for the alert trigger based on the action of the alert rule; and transmit the alert notification to the target unit.
DETECT AND ALERT USER WHEN SENDING MESSAGE TO INCORRECT RECIPIENT OR SENDING INAPPROPRIATE CONTENT TO A RECIPIENT
A device may analyze the content of a communication input via the device and verify a recipient associated with the communication based on the analysis. A machine learning network associated with the device may analyze the content and generate a probability score and a confidence score indicating an association between the communication and the recipient. Based on the probability score or confidence score provided by the machine learning network, the device may verify whether the content of the communication matches profile information associated with the recipient. In some cases, the device may refrain from transmitting the message to the recipient or output a notification suggesting a different recipient for the message. The device may output a notification to modify content of the communication, modify recipients for the communication, select a different messaging window for the communication, or select a different application for the communication.