H04L2101/37

SYSTEMS AND METHODS FOR SCREENING ELECTRONIC COMMUNICATIONS

According to certain aspects of the disclosure, a computer-implemented method computer-implemented method may be used for screening electronic communications. The method may comprise analyzing contents of an electronic communication to determine whether the contents include sensitive information. A recipient list of the electronic communication may be compared to a screening list. Based on the analyzing and the comparing, it may be determined whether the contents are permitted to be transmitted to the recipient list. Upon determining that the contents are not permitted to be transmitted to at least one party of the recipient list, a notification may be provided to an author of the electronic communication indicating that contents are not permitted to be transmitted to the at least one party of the recipient list.

Systems and methods for restricting electronic activities from being linked with record objects

The present disclosure relates to restricting electronic activities from being linked with record objects. According to at least one aspect of the disclosure, a method can include accessing, by one or more processors, a plurality of electronic activities, accessing a plurality of record objects of one or more systems of record, identifying an electronic activity of the plurality of electronic activities to match to one or more record objects, determining a data source provider associated with providing access to the electronic activity, and identifying a system of record corresponding to the determined data source provider. The system of record can include a plurality of candidate record objects to which to match the electronic activity. The method can include restricting the electronic activity from being linked with the at least one record object.

PRIVATE SERVER IMPLEMENTATION OF POLICY FOR PRINTING SYSTEM

A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server receives requests from the printing device to process a print job of a document in the private domain. The private server processes the requests using the policy and a ledger to determine whether to allow the print job to the printing device.

SERVER, NON-TRANSITORY COMPUTER-READABLE RECORDING MEDIUM STORING COMPUTER READABLE INSTRUCTIONS FOR THE SERVER, COMMUNICATION DEVICE, AND COMMUNICATION SYSTEM
20200412886 · 2020-12-31 ·

A server may store first device identification information identifying a first device. The server may, in a case where alert information is received, store restriction information in the memory in association with the first device identification information; receive second sending information from the first device; and in a case where the second sending information is received from the first device in a state where the restriction information is not stored in association with the first device identification information, send a second email with a first email address as a destination stored in association with the first device identification information, wherein in a case where the second sending information is received from the first device in a state where the restriction information is stored in association with the first device identification information, the sending of the second email is restricted.

Systems and methods for generating group node profiles based on member nodes

The present disclosure relates to a method for generating a group node profile based on member nodes. Member node profiles may be maintained. A subset of member node profiles may be identified. Each member node profile of the subset may correspond to a group entity. A set of member node fields to populate values for a group node profile of the group entity may be identified. A corresponding group node field of the group node profile may be updated in accordance with a group node population policy. A field value of the member node field to the group node field may be added. An entry to a value data structure of the field value of the group node field may be added.

Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
10880326 · 2020-12-29 · ·

Methods and systems for carrying out a simulated penetration testing campaign of a networked system for identifying a specific way for an attacker to compromise a networked system, where the specific way includes a step of poisoning the specific network node by the specific network node receiving a poisoned email body, or a poisoned email attachment, which includes malicious code.

SYSTEMS AND METHODS FOR REMOVING ELECTRONIC ACTIVITIES FROM SYSTEMS OF RECORDS BASED ON FILTERING POLICIES

The present disclosure relates to systems and methods for removing electronic activities from systems of record based on filtering policies. The method includes accessing record objects of one or more systems of record. The method includes identifying a plurality of electronic activities stored in a record object of one of the systems of record. The method includes parsing the plurality of electronic activities. The method includes determining that one of the electronic activities is associated with an electronic account corresponding to a data source provider. The method includes selecting one or more filtering policies associated with the electronic account. The method includes applying the selected one or more filtering policies to the plurality of electronic activities to identify a subset of electronic activities. The method includes initiating a process to cause removal of at least one electronic activity of the subset of electronic activities from the system of record.

Systems and methods for matching electronic activities directly to record objects of systems of record with node profiles

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.

SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
20200394176 · 2020-12-17 ·

The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or smart contracts), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.

SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
20200396072 · 2020-12-17 ·

The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or smart contracts), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.