H04M15/755

SYSTEMS AND METHODS FOR DETECTING EVENTS BASED ON UPDATES TO NODE PROFILES FROM ELECTRONIC ACTIVITIES

The present disclosure relates to methods, systems, and storage media for detecting events based on updates to node profiles from electronic activities. Exemplary implementations may access an electronic activity transmitted or received via an electronic account associated with a data source provider; generate a plurality of activity field-value pairs; maintain a plurality of node profiles; identify a first state of a first node profile of the plurality of node profiles; update the first node profile using the electronic activity; identify a second state of the first node profile subsequent to updating the first node profile using the electronic activity; detect a state change of the first node profile based on the first state and the second state; determine that the state change satisfies an event condition; and store an association between the first node profile and an event type corresponding to the event condition.

SYSTEMS AND METHODS OF GENERATING AN ENGAGEMENT PROFILE

The present disclosure relates to systems and methods for determining an engagement profile of a participant by associating electronic activities to a profile. It may generate the engagement profile based on analysis of the electronic activity level. An example implementation may contain the following steps. The system may access for a first record object a plurality of electronic activities linked with the first record object. The system may identify for a participant from the plurality of electronic activities a set of electronic activities including the participant. The system may determine an engagement profile of the participant based on a first number of electronic activities of the set of electronic activities sent by the participant, a second number of the set of electronic activities received by the participant and a temporal distribution of the set of electronic activities. The system may store the engagement profile in one or more data structures.

Systems and methods for generating node profiles using electronic activity information

The present disclosure relates to systems and methods for generating new node profiles using information from electronic activities. The system is configured to maintain node profiles corresponding to unique entities; access electronic activities transmitted or received via electronic accounts associated with data source providers; identify a first email address of a sender and second email addresses of respective recipients of an electronic activity; identify that the first email address matches a value of a field of a first node profile; link the electronic activity to the first node profile; determine that a second email address of a respective recipient of the electronic activity cannot be matched to any node profile associated with the respective participant; and generate, responsive to determining that the electronic activity cannot be matched to any node profile of the plurality of node profiles, a new node profile including the second email address of the respective recipient.

Systems and methods for updating email addresses based on email generation patterns

The present disclosure relates to systems and methods for updating email addresses based on email generation patterns. The method includes accessing a plurality of electronic activities used to update a plurality of member node profiles. The method includes determining that the plurality of member node profiles is linked to a group node profile of a group entity. The methods includes identifying, for each of the plurality of member node profiles, a first field-value pair of the member node profile corresponding to an email address. The method includes determining, for each member node profile, a correlation between the email address, a second field-value pair corresponding to a first name and a third field-value pair corresponding to a last name. The method includes determining, based on the determined correlation, an electronic account identifier pattern. The method includes storing an association between the group node and the electronic account identifier pattern.

Systems and methods for controlling secure persistent electronic communication account servicing with an intelligent assistant

The disclosed technology includes systems and methods for controlling enrollment and secure persistent SMS texting account servicing communications. A method is provided that includes receiving, at an enrollment web portal, enrollment data including: enrollment credentials identifying a user for authentication, a phone number of a mobile device associated with the user, and consent by the user to persistently interact with an account servicing system via SMS texting. The method includes: processing the received enrollment data, authenticating the user responsive to processing the received enrollment data, storing the phone number of the mobile device associated with the user in a phone number data storage, and generating, responsive to the authenticating, a revocable token for persistent access to a natural dialogue module via a SMS texting gateway for the mobile device identified by the phone number.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES DIRECTLY TO RECORD OBJECTS OF SYSTEMS OF RECORD WITH NODE PROFILES

The system described herein can automatically match, link, or otherwise associate electronic activities with one or more record objects. For an electronic activity that is eligible or qualifies to be matched with one or more record objects, the system can identify one or more set of rules or rule sets. Using the rule sets, the system can identify candidate record objects. The system can then rank the identified candidate record objects to select one or more record objects with which to associate the electronic activity. The system can then store an association between the electronic activity and the selected one or more record objects.

SYSTEMS AND METHODS FOR MAINTAINING AN ELECTRONIC ACTIVITY DERIVED MEMBER NODE NETWORK
20210117455 · 2021-04-22 · ·

The present disclosure relates to maintaining an electronic activity derived member node network. Exemplary implementations may: generate a plurality of node profiles; generate a node graph generated from the plurality of node profiles; identify a second electronic activity identifying a pair of electronic accounts; identify using the node graph, a pair of participant node profiles corresponding to the pair of electronic accounts identified by the second electronic activity; identify, using the node graph, an edge between a pair of nodes corresponding to the pair of participant node profiles; determine a relevancy score for the second electronic activity corresponding to the pair of the participant node profiles based on context of the second electronic activity; and update the node graph by modifying the connection corresponding to the edge between the pair of participant node profiles based on the relevancy score determined for the second electronic activity.

SYSTEMS AND METHODS FOR RESTRICTING ELECTRONIC ACTIVITIES FROM BEING LINKED WITH RECORD OBJECTS

The present disclosure relates to restricting electronic activities from being linked with record objects. According to at least one aspect of the disclosure, a method can include accessing, by one or more processors, a plurality of electronic activities, accessing a plurality of record objects of one or more systems of record, identifying an electronic activity of the plurality of electronic activities to match to one or more record objects, determining a data source provider associated with providing access to the electronic activity, and identifying a system of record corresponding to the determined data source provider. The system of record can include a plurality of candidate record objects to which to match the electronic activity. The method can include restricting the electronic activity from being linked with the at least one record object.

SYSTEM AND METHOD FOR SECURING IDENTITY IDENTIFIERS FOR DATA ENGINEERING PROCESSING
20210124841 · 2021-04-29 · ·

Aspects of the subject disclosure may include, for example, a processing system including a processor with a memory that stores executable instructions that, when executed by the processing system, facilitate performance of operations, the operations including: receiving an identity bridge file comprising records from a service provider, wherein each record includes one or more encrypted service identifiers for a customer, a customer location code of the customer, and an address location code of the customer; determining whether a tokenized identifier exists in a cross-reference table; responsive to a determination that the tokenized identifier does not exist in the cross-reference table: a) generating a new tokenized identifier; and b) adding a record to the cross-reference table comprising the new tokenized identifier, the customer location code, the address location code, and the one or more encrypted service identifiers; securing a usage record of a data usage log, wherein the usage record includes a unique usage identifier, wherein the securing comprises replacing the unique usage identifier with a matching tokenized identifier from the cross-reference table, resulting in secured usage records; and providing the secured usage records to data engineering. Other embodiments are disclosed.

Synchronous interfacing with unaffiliated networked systems to alter functionality of sets of electronic assets
10992606 · 2021-04-27 · ·

Systems and methods for managing a set of electronic assets from a single location are disclosed. The method includes providing a portal with a network security access control. The method includes determining that login credentials input to the access control are associated with a set of electronic assets corresponding to a plurality of third-party computing systems with application programming interface (API) gateways configured to accept an API call directed to changes in functionality of the electronic assets. The method includes presenting, via the portal, a virtual icon to identify a coordinated action with respect to the set of electronic assets and, in response to a selection of the virtual icon, executing a set of API calls that include an asset-specific API call to each third-party computing system in the plurality of third-party computing systems to implement the coordinated action on all electronic assets in the set of electronic assets.