Patent classifications
H04L2101/37
SYSTEMS AND METHODS FOR CLASSIFYNG ELECTRONIC ACTIVITIES BASED ON SENDER AND RECEPIENT INFORMATION
The system and methods described herein can classify electronic activities based on sender and recipient information. The system can determine a relationship between a sender of an electronic activity and at least one recipient of the electronic activity using a sender node profile and a recipient node profile. The system can assign a tag to the electronic activity based on the relationship between the sender and one or more recipients of the electronic activity. The system can process the electronic activity based on the assigned tag.
Method and system for advanced alias domain routing
A method and system for advanced alias domain routing are disclosed. According to one embodiment, a computer implemented method comprises receiving an incoming message from a first unified communications server, the incoming message comprising source address data, destination address data, and digital content. A real address of a destination address is computed by using the source address data, and an alias address of a source address is computed by using the destination address data. The incoming message is processed, wherein processing the incoming message includes enforcing policies. An outgoing message is generated comprising the digital content, the real address and the alias address. The outgoing message is transmitted to a second unified communications server.
EMAIL SECURITY PLATFORM
A server can include a detection module for monitoring an electronic account and detecting irregular or fraudulent activities. The detection module can be a machine learning model configured to detect activities or patterns indicative of an account being compromised, hacked or accessed by unauthorized users. Upon detection of the irregular activities or patterns, the detection module can transmit a notification or signal to a trigger module which can implement remedial actions. The trigger module can receive the signal from the detection module and execute an action in accordance with a trigger plan. The trigger plan can include various information and a range of actions, which can be selected and/or executed based on the information included in the signal.
ADAPTIVE AUTOMATIC EMAIL DOMAIN NAME CORRECTION
A system and methods for correcting domain names in invalid email addresses are described herein. The method includes receiving email failure information including a bad domain name. The bad domain name is compared to valid domain names in a valid domain name database and a match distance of the bad domain name to valid domain names in the valid domain name database is evaluated. Confidence scores for the valid domain names are prepared based on the match distance. Valid domain names having confidence scores exceeding a domain match threshold are identified. A valid domain name with a confidence score exceeding the domain match threshold is selected. The method involves heuristics and machine learning. System administrator intervention may be received to assist in the selecting. An email note is sent to the corrected domain name.
METHOD AND SYSTEM FOR EXCHANGING DATA BETWEEN USERS OF A VEHICLE
This disclosure relates to a method and system for exchanging data between users of a vehicle, including a main user equipped with a first personal electronic device and a secondary user equipped with a second personal electronic device. The method includes a preparatory phase and a transmission phase, which comprise the following steps: the application installed on the first personal electronic device sends data to a remote server including the second email address of the secondary user and instructions for the transfer of information regarding the vehicle; the remote server sends data to an information cloud including the mobile identifier assigned to the application installed on the second device and information regarding the vehicle, and the cloud sends information regarding the vehicle to the application installed on the second personal electronic device.
TECHNIQUES FOR INVITE ENFORCEMENT AND DOMAIN CAPTURE
Techniques for invite enforcement and domain capture. In one embodiment, for example, a method performed in an online service computing environment comprises the operations of: storing, in a database, an association between a team of one or more user accounts and a domain name service domain; receiving a request to invite an e-mail address belonging to the domain name service domain to join the team; creating, in a database, a placeholder user account that is a member of the team; associating, in a database, the e-mail address with the placeholder user account; and after an invitation for the e-mail address to join the team is accepted, converting, in a database, the individual user account to a team account that is (a) a member of the team and (b) associated with the e-mail address.
Method and device to update contacts
Methods, devices and program products are provided to track communications event (CE) identifiers associated with the communications events for a device. The method determines whether communications events are associated with a common CE identifier, and performs a contact update utilizing content from at least one communications event associated with the common CE identifier to update a contact. The device comprises a processor, a user interface, and a local storage medium. The device determines whether communications events are associated with a common CE identifier and performs a contact update utilizing content from at least one of the communications events associated with the common CE identifier to update the contact. The computer program product comprises a non-signal computer readable storage medium comprising computer executable code to track CE identifiers associated with the communications events for a device and a contact update.
SYSTEMS AND METHODS FOR IDENTIFYING A SEQUENCE OF EVENTS AND PARTICIPANTS FOR RECORD OBJECTS
Methods, systems, and storage media for identifying a sequence of events and participants for record objects are disclosed. Exemplary implementations may: access record objects of a system of record; identify a subset of record objects associated with a group entity and having a first record object status; identify one or more electronic activities linked to the record objects; determine an event-participant pattern based on the electronic activities linked to the record object; identify electronic activities linked with a second record object; determine that a first event is performed by the a participant type and a second event is not yet performed by a second participant type; generate a content item identifying an action to trigger a performance of the second event; and transmit the content item to a device of a participant of at least one electronic activity linked with the second record object.
Intelligent agent adding ease of use and security for mobile device for facilitating and payment for multiple mode transportation
The invention relates to a method and system for booking reservations in a booking system and synchronizing bookings among several booking systems. The system comprises at least one booking system; at least one service provider; a mediator service; a client, and at least one client terminal device that can be a mobile device and that includes a dialogue. The client uses the dialogue to enter information into the system and the mediator receives inquiries and answers from the at least one booking system, the at least one service provider, and the at least one client. The mediator transfers and adapts information between them. The method and system are particularly suited for use with mobile phone users by Small Message Service messages.
SCALABLE, SECURE, EFFICIENT, AND ADAPTABLE DISTRIBUTED DIGITAL LEDGER TRANSACTION NETWORK
The present disclosure relates to systems, methods, and non-transitory computer readable storage media for implementing a scalable, secure, efficient, and adaptable distributed digital ledger transaction network. Indeed, the disclosed systems can reduce storage and processing requirements, improve security of implementing computing devices and underlying digital assets, accommodate a wide variety of different digital programs (or “smart contracts”), and scale to accommodate billions of users and associated digital transactions. For example, the disclosed systems can utilize a host of features that improve storage, account/address management, digital transaction execution, consensus, and synchronization processes. The disclosed systems can also utilize a new programming language that improves efficiency and security of the distributed digital ledger transaction network.