H04L2101/37

System And Method Of Operating An Email Service For Mobile Telephones
20200396195 · 2020-12-17 ·

For email communication, an APP downloaded onto a smartphone and email accounts are automatically provided through an associated server system. Each email account is uniquely related the APP and includes a key associated with the telephone number.

Systems and methods for identifying node hierarchies and connections using electronic activities

The present disclosure relates to methods, systems, and storage media for identifying node hierarchies and connections using electronic activities. The method may include maintaining node profiles corresponding to unique entities; selecting electronic activities linked to both a first node profile and a second node profile of the plurality of node profiles; generating for each electronic activity of the plurality of electronic activities, a relevancy score based on a respective time at which the electronic activity was transmitted or received; generating a connection profile for a connection between the first node profile and the second node profile based on the respective relevancy score of each electronic activity and storing in a data structure, an association between the connection profile, the first node profile, and the second node profile.

COMPLIANCE DETECTION OF GRATITUDE-BASED MESSAGE
20200387911 · 2020-12-10 ·

Provided are systems and methods for detecting whether an electronic gift violates compliance of the sender or the recipient. The system may rely on company-specific compliance rules. In addition, the system may enrich or compensate for missing company-specific rules with general industry compliance rules. In one example, the method may include identifying a domain name of a message associated with a transfer of value from a sender to a recipient, detecting one or more requirements that are associated with the domain name identified from the message, determining that the transfer of value is a possible violation of a requirement from among the one or more requirements that are associated with the domain name based on content of the requirement, and displaying information about the requirement.

Session initiation protocol (SIP) based user initiated handoff

Method and apparatus for providing a solution to the handoff problem includes negotiation of new media codes (coders/decoders) for utilization in cases where the two devices involved in the handoff are incompatible. Although mobile IP (MIP) is presently utilized to perform handoff procedures, this technique lacks a trigger mechanism to initiate handoff between two different devices which communicate with two different networks or one common network. In addition, MIP does not address the issue of compatibilities between media types, codes and supported bit rate. The handoff utilizes a session protocol (SIP) message for handoff.

Provisioning of credentials on an electronic device using passwords communicated over verified channels

Systems, methods, and computer-readable media for provisioning credentials on an electronic device are provided. In one example embodiment, a secure platform system may be in communication with an electronic device and a financial institution subsystem. The secure platform system may be configured to, inter alia, detect a selection of a particular commerce credential, access communication mechanism data indicative of at least one communication mechanism of the device, where the at least one mechanism is configured to receive a communication on the device, transmit information to the financial subsystem, where the information includes the mechanism data and the selection of the particular commerce credential, and instruct the financial subsystem to provision the particular commerce credential in a disabled state on the device and communicate credential enablement data to the device using a particular communication mechanism of the at least one communication mechanism indicated by the communication mechanism data.

Systems and methods for inferring a time zone of a node profile using electronic activities

The present disclosure relates to inferring a time zone of a node profile using electronic activities. A method can include accessing a plurality of electronic activities transmitted or received via a plurality of electronic accounts. The method can include identifying, for a node profile, a set of electronic activities sent from or received by an electronic account of the plurality of electronic accounts linked to the node profile within a time period. The method can include identifying, for each electronic activity of the set of electronic activities, a timestamp at which the electronic activity was sent or received. The method can include generating, for each of a plurality of time intervals within the time period, a temporal distribution of electronic activity based on respective timestamps of each electronic activity. The method can include determining a time zone of the node profile based on the temporal distribution.

Systems and methods for maintaining an electronic activity derived member node network
10860794 · 2020-12-08 · ·

The present disclosure relates to maintaining an electronic activity derived member node network. Exemplary implementations may: generate a plurality of node profiles; generate a node graph generated from the plurality of node profiles; identify a second electronic activity identifying a pair of electronic accounts; identify using the node graph, a pair of participant node profiles corresponding to the pair of electronic accounts identified by the second electronic activity; identify, using the node graph, an edge between a pair of nodes corresponding to the pair of participant node profiles; determine a relevancy score for the second electronic activity corresponding to the pair of the participant node profiles based on context of the second electronic activity; and update the node graph by modifying the connection corresponding to the edge between the pair of participant node profiles based on the relevancy score determined for the second electronic activity.

EMAIL ADDRESS WITH IDENTITY STRING AND METHODS OF USE
20200382501 · 2020-12-03 ·

A system for authentication having an authentication protocol to communicate with the hardware device, the authentication protocol having an encryption function having a hardware key and a software key, a private and a public key pair, the key pair generated from the hardware key and the software key, used to encrypt the communication between the server and the client, an identity authentication service to assign a user of the hardware device to an identity string, and creates a unique user email address based on the identity string and an authentic email server domain, and a target service having a user identity data and comparing the user identity data to the email string, and if the user identity data and the email string match, then the target service accepts the unique user email address to send a service event communication to the hardware device.

Split keys for wallet recovery
11870898 · 2024-01-09 · ·

A system for split keys for wallet recovery includes an interface configured to receive a request to recover a user private key, and a processor configured to provide a request to a credential issuing authority for a first encrypted recovery key share, wherein the request includes a first identification credential, receive the first encrypted recovery key share from the credential issuing authority, provide a request to a trusted organization for a second encrypted recovery key share, wherein the request includes a second identification credential, receive the second encrypted recovery key share from the trusted organization, combine the first encrypted recovery key share and the second encrypted recovery key share to determine a recovered encryption key, and determine the user private key using the recovered encryption key.

DOMAIN AND INVITE MANAGEMENT IN A GROUP-BASED COMMUNICATION SYSTEM

Methods, systems, apparatuses, devices, and computer program products are described. A group-based communication system may support domain and invite management, for example, for a group-based communication channel. A first user may create a channel invite and may add an email address for a second user to the invite. The second user may have multiple accounts in the group-based communication system. The system may determine that the domain of the second user's email address has an organization configured as the primary organization for the domain, and the system may automatically configure the invite to correspond to an account for the second user that is associated with the domain's primary organization. The system may route the invite to the account associated with the primary organization and may send the invite (e.g., a channel invite to the group-based communication channel) to a second user device associated with the second user.