Patent classifications
H04L67/565
EFFICIENT HANDLING OF BI-DIRECTIONAL DATA
A tool for standardized layout transformations of BIDI data exchanged between legacy and modern systems is provided. The tool retrieves client connection information from a client request for data. The tool determines, based, at least in part, on the client connection information, a client application's operating system. The tool determines whether the data requested in the client request is BIDI data. Responsive to a determination that the data requested is BIDI data, the tool initiates a layout transformation of the data requested at a single point within the database server. The tool returns transformed BIDI data to the client application.
System, method, and computer program product for improved embedded application data management
Embodiments of the present disclosure provide for improved interoperable data management between a user-accessed software application and an embedded software application. In some contexts, a user-accessed application provides both its own functionality as well as enabling access to functionality of an embedded application. The embedded application is accessed via a data-driven connection that provides several technical advantages and addresses various data interoperability and persistence problems. In some embodiments, a user-accessed application may be configured to provide functionality of multiple embedded applications consistent with the innovations herein described.
System, method, and computer program product for improved embedded application data management
Embodiments of the present disclosure provide for improved interoperable data management between a user-accessed software application and an embedded software application. In some contexts, a user-accessed application provides both its own functionality as well as enabling access to functionality of an embedded application. The embedded application is accessed via a data-driven connection that provides several technical advantages and addresses various data interoperability and persistence problems. In some embodiments, a user-accessed application may be configured to provide functionality of multiple embedded applications consistent with the innovations herein described.
Registered encrypted electronic message and redacted reply system
A method and system for processing an email having redacted content, and/or where the message content has been encrypted and recorded as encrypted, is provided.
METHOD AND APPARATUS FOR MANAGING COMMUNICATION INQUIRIES
A system that incorporates teachings of the present disclosure may include, for example, a processing system that analyses, without user intervention, content of a first message directed from equipment of a sending user to equipment of a receiving user, to identify a task. The processing system determines that the receiving user is unable to perform the task according to biometric data of the receiving user. The biometric data is selected from one of heart rate, blood pressure, respiratory rate, and combinations thereof. According to the content of the first message and the biometric data obtained from the receiving user, the processing system determines that the task should be delegated to another user, and responsive thereto, provides a second message associated with the task to equipment of the other user. Other embodiments are disclosed.
TITLE PROVISIONING FOR EVENT NOTIFICATION ON A MOBILE DEVICE
A technique for user notification involves receiving an event notification related to an event associated with user notification by a user; providing the event notification from a stored array to a process executed by a processor; using the event notification as a first title used for the process; providing a second title from the stored array to the process; and using the second title to identify the process to the user.
TITLE PROVISIONING FOR EVENT NOTIFICATION ON A MOBILE DEVICE
A technique for user notification involves receiving an event notification related to an event associated with user notification by a user; providing the event notification from a stored array to a process executed by a processor; using the event notification as a first title used for the process; providing a second title from the stored array to the process; and using the second title to identify the process to the user.
INFORMATION SHARING METHOD, DEVICE AND NON-TRANSITORY COMPUTER READABLE STORAGE MEDIUM THEREOF
Disclosed is an information sharing method including: obtaining information to be shared that a sending terminal wants to share to a receiving terminal; detecting whether the information to be shared meets a preset rule, the preset rule including: the information meeting a first preset condition, and/or, the receiving terminal and/or the sending terminal meeting a second preset condition; and in determining that the information to be shared meets the preset rule, sending the information according to a preset strategy. The application also discloses other related information sharing methods, devices, and non-volatile computer-readable storage medium. The purpose of intelligently sharing information is realized.
CLOUD-BASED MANAGEMENT SERVICE DEVICE REGISTRATION USING INTERMEDIATE CLOUD STORAGE
Techniques are described herein that are capable of registering a user device with a cloud-based management service using an intermediate cloud storage. For instance, the intermediate cloud storage may store an encrypted data blob including information that identifies the user device. The intermediate cloud storage or a registration system may decrypt the encrypted data blob so that the registration system may use the decrypted data blob to register the user device with the cloud-based management service. For instance, the registration system may retrieve the encrypted or decrypted data blob from the intermediate cloud storage by providing a requisite secret to the intermediate cloud storage. The requisite secret may be provided to the registration system by the user device (e.g., via a matrix barcode, such as a QR code).
Proxy system for bot connectivity to communication channels
A proxy apparatus acts as an intermediary between one or more bot apparatuses and one or more communication channels. The proxy apparatus connects a communication channel to a bot apparatus for the exchange of messages. A user can interact with the bot apparatus through the communication channel. The proxy apparatus is configured to perform one or more operations or services. Example operations include, but are not limited to, registration, authentication and authorization, the recordation of telemetry data, schema transformation, and identity transformation.