Patent classifications
H04L2101/37
AUTOMATED INTERNET PROTOCOL (IP) WARMING
A method, apparatus, and system for internet protocol (IP) warming is described. Some systems may send large volumes of communication messages from a single IP address. If the IP address does not have a strong sender reputation, these emails may be sent to spam folders or blocked, and the IP address may be blacklisted. To build a strong sender reputation, a user may implement an IP warming plan for the IP address. To support automated IP warming, an application may identify a target number of communication messages to transmit from the IP address, retrieve communication information for a target set of devices, generate, for the IP address, a set of transmission thresholds corresponding to a set of time durations for transmitting communication messages based on the target number of communication messages and the communication information, and transmit a set of communication messages based on the set of transmission thresholds.
Mobile device implemented logistics functionality based on semantic analysis
The invention relates to a method and system for booking reservations in a booking system and synchronizing bookings among several booking systems. The system comprises at least one booking system; at least one service provider; a mediator service; a client, and at least one client terminal device that can be a mobile device and that includes a dialogue. The client uses the dialogue to enter information into the system and the mediator receives inquiries and answers from the at least one booking system, the at least one service provider, and the at least one client. The mediator transfers and adapts information between them. The method and system are particularly suited for use with mobile phone users by Small Message Service messages.
SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES
The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.
INFERRING ADDITIONAL EMAIL ADDRESSES TO MATCH EMAIL ADDRESSES IN A DIGEST LIST
An online system receives third party hashes for a plurality of targeted users and generates local hashes for one or more local users of the online system. The online system identifies as matched users those local users with local hashes that match those of the third party hashes. The online system generates one or more inferred identifiers for each of the one or more local users, the inferred identifiers being of the same type as the local unique identifiers, and the inferred identifiers generated based on characteristics of each corresponding local user. The online system identifies as inferred matched users at least one of the local users that have local hashes of corresponding inferred identifiers that match a third party hash of a third party unique identifier. The online system provides, to a third party system, a selection including the matched users and a selection including the inferred matched users.
Privacy-preserving learning of web traffic
A method by one or more network devices communicatively coupled to a web application layer proxy for profiling parameters of web application layer requests received by the web application layer proxy while preserving privacy. The method includes obtaining masked parameter values associated with a parameter in the web application layer requests, where the masked parameter values associated with the parameter are generated by the web application layer proxy based on masking parameter values associated with the parameter while preserving lengths of the parameter values associated with the parameter and character types of characters in the parameter values associated with the parameter, generating the profile of the parameter based on analyzing the masked parameter values associated with the parameter, and providing the profile of the parameter to the web application layer proxy.
Systems, methods, and devices for digital advertising ecosystems implementing content delivery networks utilizing edge computing
Disclosed herein are systems and techniques for using a content delivery network to perform various functions within a digital advertising ecosystem, in ways that yield technological benefits such as improved security, efficiency, and speed (for example, reduction in publisher load times). As one specific example, a content delivery network can be used for the creation of electronic tokens for user identity protection between demand side platforms, supply side platforms, content creators (for example, advertisers), and publishers.
Private server implementation of policy for printing system
A policy-based printing system is implemented to allow access to a private domain to print using a public domain. The private domain includes private servers that store documents. The public domain includes servers and a printing device. A public policy server uses a domain list and a protocol connection with a private authentication server to validate a user and identify which private domain to access. The public policy server receives requests from the printing device to process a print job of a document in the private domain. The private server processes the requests using the policy and a ledger to determine whether to allow the print job to the printing device.
Dynamic authorization rule stacking and routing across multiple systems
A system includes a hardware processor that executes a software code to receive an authorization request on behalf of a user for a stacked resource including resources offered separately by multiple resource providers, determine resource provider computers associated with the stacked resource, and send a look-up request including an electronic identity of the user to those computers, where the electronic identity is used as a look-up key for determining user attribute(s) of the user. The software code further receives the user attribute(s) from the resource provider computers, generates an accumulated access profile of the user based on the user attribute(s), applies the profile to a rules engine to determine a stacked access result, and routes the authorization request and the stacked access result to one of the resource provider computers, where that computer completes an authorization process for access to the stacked resource based on the stacked access result.
Automated lightweight database access protocol secure/multipurpose internet mail extensions key server
A Secure/Multipurpose Internet Mail Extensions (S/MIME) key material publication system that converts cryptographic material extracted from digitally signed and validated S/MIME messages it receives into key material formats suitable for populating email address books. Publication of the address book contents both internal and external to an organization is done using the standard address book lightweight database access protocol (LDAP). The wide availability and coordination of such automated address books distributing key material across the Internet allows the large installed base of S/MIME email clients to immediately send secure encrypted email across organizational boundaries. The system serves the role of public key server thus removing a barrier to ubiquitous secure encrypted email by simplifying global key management.
Booking method and system
The invention relates to a method and system for booking reservations in a booking system and synchronizing bookings among several booking systems. The system comprises at least one booking system; at least one service provider; a mediator service; a client, and at least one client terminal device that can be a mobile device and that includes a dialogue. The client uses the dialogue to enter information into the system and the mediator receives inquiries and answers from the at least one booking system, the at least one service provider, and the at least one client. The mediator transfers and adapts information between them. The method and system are particularly suited for use with mobile phone users by Small Message Service messages.