G06Q10/107

VISUALIZATION OF CHAT TASK RECORD, LINKING MESSAGING, AND RECORD KEEPING
20230049030 · 2023-02-16 ·

A system is provided for displaying information related to a task in a chronological chat format. The system may include a memory, a processor configured to execute instructions stored within the memory, a network interface communicatively coupled to a network, a task database having records for a plurality of tasks, and a display that allows selection of a task record from the plurality of tasks. The display displays chat information obtained from the task record along with task-related data, such as customer data, received over the network interface in real time. The display may also allow selection of other individuals related to the task to participate in a chat session. The task-related data includes both textual data and attached file information.

REPRESENTATIVE TASK GENERATION AND CURATION

Systems and methods for automatically providing templates for the creation of projects and tasks based on messages exchanged between members and assigned representatives are provided. A system receives, in real-time, a set of messages between a member and a representative as the set of messages are being exchanged. The system, based on these messages, automatically identifies issue. The system can further identify one or more templates for defining a task that is performable to address the issue. The system can present the one or more templates such that, when a template is selected and used to define a task, the task can be performed to address the issue.

SYSTEMS AND METHODS FOR MATCHING ELECTRONIC ACTIVITIES WITH RECORD OBJECTS BASED ON ENTITY RELATIONSHIPS

The present disclosure relates to systems and methods for matching electronic activities with record objects based on entity relationships. The method can include accessing a plurality of electronic activities, identifying an electronic activity, identifying a first participant associated with a first entity and a second participant associated with a second entity, determining whether a record object identifier is included in the electronic activity, identifying a first record object of the system of record that includes an instance of the record object identifier, and storing an association between the electronic activity and the first record object. The method can include determining a second record object corresponding to the second entity, identifying, using a matching policy, a third record object linked to the second record object and identifying a third entity, and storing, by the one or more processors, an association between the electronic activity and the third record object.

METHODS, SYSTEMS, AND MEDIA FOR MODIFYING THE PRESENTATION OF CONTEXTUALLY RELEVANT DOCUMENTS IN BROWSER WINDOWS OF A BROWSING APPLICATION
20230048846 · 2023-02-16 ·

Methods, systems, and media for presenting contextually relevant information are provided. In some implementations, the method includes: receiving information associated with a user of a user device from multiple data sources, where the user device comprises a display; identifying, without user intervention, a relevant document based on the received information associated with the user of the user device; determining that a new browser window or a new browser tab has been opened by a browser application being executed by the user device; and causing, without user intervention, the relevant document to be presented using the new browser window or new browser tab.

SYSTEM AND METHOD FOR MULTI-TASK LIFELONG LEARNING ON PERSONAL DEVICE WITH IMPROVED USER EXPERIENCE

This disclosure relates to recommendations made to users based on learned behavior patterns. User behavior data is collected and grouped according labels. The grouped user behavior data is labeled and used to train a machine learning model based on features and tasks associated with the classification. User behavior is then predicted by applying the trained machine learning model to the collected user behavior data, and a task is recommended to the user.

Creating Dynamic Data-Bound Container Hosted Views and Editable Forms
20230047090 · 2023-02-16 · ·

A method for using a user-fillable form in a host container includes receiving, at a host container, a user-fillable form bound to dynamic data from an underlying data source where the user-fillable form has a data structure generated by prepopulated coding. The method further includes translating the user-fillable form into a hostable format for the host container. The method also includes rendering, using the hostable format for the host container, the user-fillable form in a user interface. The method further includes receiving, at the user interface of the host container, from a user of the host container, a data entry for input to the user-fillable form and updating, by the host container, the dynamic data from the underlying data source by persisting data from the data entry in a data store associated with the underlying data source.

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

Detecting security breaches with watchdog transaction accounts

Disclosed are various embodiments for detecting security breaches using watchdog transaction accounts. A security agent can initiate a purchase with a first electronic commerce system and provide a watchdog transaction account as payment for the purchase. The security agent can then store a record of the purchase which includes a merchant identifier for the merchant and the watchdog transaction account. Subsequently, a transaction authorization system can determine that authorization for a transaction with second electronic commerce system failed. If the transaction authorization system determines that the account used in the transaction with the second electronic commerce system, then the transaction authorization system can determine that the first electronic commerce system has suffered a security breach.

System for sending e-mail and/or files securely
11582205 · 2023-02-14 · ·

A system and method for facilitating secure transfer of encrypted files and/or messages can facilitate the secure transfer of encrypted files to a receiving user. The system can include: a computer program for facilitating sending of an e-mail message to a receiving user, the e-mail message including at least a web address of a trusted provider and instructions about how to securely download encrypted files without the receiving user setting up an account or a password, the transfer of encrypted files being facilitated by a code sent to a telephone of the receiving user.

System for sending e-mail and/or files securely
11582205 · 2023-02-14 · ·

A system and method for facilitating secure transfer of encrypted files and/or messages can facilitate the secure transfer of encrypted files to a receiving user. The system can include: a computer program for facilitating sending of an e-mail message to a receiving user, the e-mail message including at least a web address of a trusted provider and instructions about how to securely download encrypted files without the receiving user setting up an account or a password, the transfer of encrypted files being facilitated by a code sent to a telephone of the receiving user.