Patent classifications
H04L2101/37
System, Method, and Apparatus for Dispatching Help
A system for providing help includes a smartphone having a cellular transceiver and a global positioning subsystem. A call center server computer system has a plurality of agent computers. Software running on the smartphone is configured to recognize a preprogrammed specific utterance and to connect with the call center server computer system. After the preprogrammed specific utterance is detected, the software running on the smartphone initiates a call to the call center server computer system. When the call center server computer system receives the call, the call center server computer system retrieves a data record associated with the smartphone using a caller-id of the call and the call center server computer system assigns an agent computer. At least part of the data record is displayed on a display of that agent computer and an audio connection is made between that agent computer and the smartphone.
PRIVACY-PRESERVING LEARNING OF WEB TRAFFIC
A method by one or more network devices communicatively coupled to a web application layer proxy for profiling parameters of web application layer requests received by the web application layer proxy while preserving privacy. The method includes obtaining masked parameter values associated with a parameter in the web application layer requests, where the masked parameter values associated with the parameter are generated by the web application layer proxy based on masking parameter values associated with the parameter while preserving lengths of the parameter values associated with the parameter and character types of characters in the parameter values associated with the parameter, generating the profile of the parameter based on analyzing the masked parameter values associated with the parameter, and providing the profile of the parameter to the web application layer proxy.
AUTOMATED INTERNET PROTOCOL (IP) WARMING
A method, apparatus, and system for internet protocol (IP) warming is described. Some systems may send large volumes of communication messages from a single IP address. If the IP address does not have a strong sender reputation, these emails may be sent to spam folders or blocked, and the IP address may be blacklisted. To build a strong sender reputation, a user may implement an IP warming plan for the IP address. To support automated IP warming, an application may identify a target number of communication messages to transmit from the IP address, retrieve communication information for a target set of devices, generate, for the IP address, a set of transmission thresholds corresponding to a set of time durations for transmitting communication messages based on the target number of communication messages and the communication information, and transmit a set of communication messages based on the set of transmission thresholds.
SMART INTEGRATION WITH EMAIL PARSER
Systems and methods for modifying electronic mail having receipt data for interception by mail transport agents. An invoice email sent by an email server is received when a transport agent of the email server detects a pattern within content of an inbound email. The invoice email is parsed to extract receipt data and an email address that identifies a recipient of the inbound email. The receipt data is pushed to an expense management system associated with the recipient for further processing.
Systems and methods for updating email addresses based on email generation patterns
The present disclosure relates to systems and methods for updating email addresses based on email generation patterns. The method includes accessing a plurality of electronic activities used to update a plurality of member node profiles. The method includes determining that the plurality of member node profiles is linked to a group node profile of a group entity. The methods includes identifying, for each of the plurality of member node profiles, a first field-value pair of the member node profile corresponding to an email address. The method includes determining, for each member node profile, a correlation between the email address, a second field-value pair corresponding to a first name and a third field-value pair corresponding to a last name. The method includes determining, based on the determined correlation, an electronic account identifier pattern. The method includes storing an association between the group node and the electronic account identifier pattern.
CLIENT MANAGER AND ROUTER
A method for managing and routing client queries within an entity is provided. The method may include receiving a client query including origination identification data associated with a sender of the client query. In response to searching in a database for history correlating to the origination identification data, determining that no relevant history exists with respect to the origination identification data. The method may include identifying the sender by identifying, within the query, a first character string identical to a first keyword stored in a classification model within a database, using the first keyword to identify a second character string that includes the first keyword in addition to other characters, identifying, from a list of sub-entities, a sub-entity associated with the first keyword and using a combination of the first keyword, the sub-entity and one or more attributes to identify the sender as an existing client.
CYBER THREAT DEFENSE SYSTEM PROTECTING EMAIL NETWORKS WITH MACHINE LEARNING MODELS USING A RANGE OF METADATA FROM OBSERVED EMAIL COMMUNICATIONS
A cyber-threat defense system for a network including its email domain protects this network from cyber threats. Modules utilize machine learning models as well communicate with a cyber threat module. Modules analyze the wide range of metadata from the observed email communications. The cyber threat module analyzes with the machine learning models trained on a normal behavior of email activity and user activity associated with the network and in its email domain in order to determine when a deviation from the normal behavior of email activity and user activity is occurring. A mass email association detector determines a similarity between highly similar emails being i) sent from or ii) received by a collection of two or more individual users in the email domain in a substantially simultaneous time frame. Mathematical models can be used to determine similarity weighing in order to derive a similarity score between compared emails.
CUSTOMIZABLE VOICE-BASED USER AUTHENTICATION IN A MULTI-TENANT SYSTEM
A system authenticates users using voice-based conversations. The system allows the authentication process to be customized using an authentication plan. For example, the system may be a multi-tenant system that allows customization of the authentication process for each tenant. The authentication plan is represented as an expression of phrase types, each phrase type associated with a phrase verification method. The system authenticates a user by executing the expression of an authentication plan for that user in response to a request from the user. The system performs a conversation with the user according to the authentication plan. The system determines whether to allow or deny the user request based on the result of evaluation of the expression of the authentication plan.
PRINTING DEVICE AND SERVER
A printing device may include: a printing unit configured to print an image, a communication interface; an input unit to which user information is inputted; a memory; and a controller configured to access a table in which user information and an e-mail address are registered in association with each other. The controller may be configured to: receive an e-mail to which attached data is attached; in a case where the e-mail is received, determine whether a sender e-mail address of the e-mail is in the table; in a case where it is determined that the sender e-mail address is in the table, obtain user information associated with the sender e-mail address from the table and store the attached data in the memory; authenticate the user information; and cause the printing unit to print the attached data.
Asset Search and Discovery System Using Graph Data Structures
In a search and database system, a graph generator builds a graph, comprising nodes and edges, and stores that graph in a database or other data structure and uses a repeated extending and culling process to build the graph. From that storage, the graph can be used to generate displays for users interested in learning about the graph and/or for performing queries and the like on that graph data.