H04L51/18

Systems and methods for enhanced networking, conversion tracking, and conversion attribution

The present disclosure provides systems and methods for electronically providing each of a plurality of content distributors with access to a library of content items, facilitating the selection of a combination of the content items, creating a unique set of links for each recipient-distributor combination, and distributing the selected content and unique links via one or more distribution channels to a plurality of recipients. As each link is associated with both a recipient and a distributor, conversion actions stemming from the selection of a link by a recipient are attributed to the proper distributor. Distributors can create content distribution approaches that can be shared with other distributors.

Facilitating cross-organization communications

Techniques are described for expediting a generation of a means of communication between two people associated with different organizations. A first person associated with a communication platform may submit a request to the communication platform to generate an invitation to communicate via the communication platform. The first person may provide the invitation to a second person directly or via the communication platform. Responsive to receiving an indication that the second person has accepted the invitation, the communication platform may generate the means of communication between the first person and the second person. The communication platform may update respective user interfaces to include the means of communication. The communication platform may process messages and/or data between the first person and the second person that is input on the respective user interface and sent via the means of communication.

Facilitating cross-organization communications

Techniques are described for expediting a generation of a means of communication between two people associated with different organizations. A first person associated with a communication platform may submit a request to the communication platform to generate an invitation to communicate via the communication platform. The first person may provide the invitation to a second person directly or via the communication platform. Responsive to receiving an indication that the second person has accepted the invitation, the communication platform may generate the means of communication between the first person and the second person. The communication platform may update respective user interfaces to include the means of communication. The communication platform may process messages and/or data between the first person and the second person that is input on the respective user interface and sent via the means of communication.

Electronic message processing systems and methods
11582190 · 2023-02-14 · ·

A message-hold decision maker system used with an electronic mail processing system that processes electronic messages for a protected computer network improves the electronic mail processing system's performance by increasing the throughput performance of the system. The improvements are achieved by providing an electronic mail processing gateway with additional logic that makes fast and intelligent decisions on whether to hold, block, allow, or sandbox electronic messages in view of potential threats such as viruses or URL-based threats. A message hold decision maker uses current and stored information from a plurality of specialized classification engines to quickly make the decisions. In some examples, the message hold decision maker will instruct an email gateway to hold an electronic mail message while the classification engines perform further analysis.

Reservation management for polling requests in a communication system

Techniques for committing back end computing resources to an online stream of requests for data from client devices are described herein. A polling schedule server (e.g., a reservation management system), may receive polling reservation requests from a plurality of client devices, may evaluate each client device's need for “fresh” data based on a number of input signals, and may assign the client device a polling slot (e.g., a reservation for a future polling time). The polling scheduler server may subsequently receive a polling request from a client device and, upon validating a token received from the client device as well as a difference between an assigned polling time and the polling request timestamp, may grant the polling request by transmitting a request to one or more communication system servers, receiving data from the communication system servers, and providing the data to the client device.

Contactless message transmission

A system and method uses one or more repurposed data fields in a payment transaction message to pass the merchant consumable data from a mobile device to the merchant system using an existing channel. The merchant consumable data relate to loyalty or rewards.

Phishing attempt search interface

Systems, methods, and media are used to identify phishing attacks. A notification of a phishing attempt with a parameter associated with a recipient of the phishing attempt is received at a security management node. In response, an indication of the phishing attempt is presented in a phishing attempt search interface. The phishing attempt search interface may be used to search for additional recipients, identify which recipients have been successfully targeted, and provide a summary of the recipients. Using this information, appropriate security measures in response to the phishing attempt for the recipients may be performed.

Systems and methods for context development

Disclosed are methods, systems, and non-transitory computer-readable medium for context development. For instance, a first method may include obtaining first micro-application actor information associated with a first micro-application actor. The first micro-application actor information may include information for workflow rules, and the workflow rules may include data set rules, extract, transform, load (ETL) rules, and functional expressions. The first method may further include obtaining data from data sources based on the data set rules; applying the ETL rules to the obtained data to generate processed data; applying the functional expressions to the processed data to obtain an output; and performing at least one processing action based on the output. A second method may include generating a system component corresponding to a blueprint based on a user request; associating the system component with a domain of a user account; and performing processes associated the system component.

Systems and methods for context development

Disclosed are methods, systems, and non-transitory computer-readable medium for context development. For instance, a first method may include obtaining first micro-application actor information associated with a first micro-application actor. The first micro-application actor information may include information for workflow rules, and the workflow rules may include data set rules, extract, transform, load (ETL) rules, and functional expressions. The first method may further include obtaining data from data sources based on the data set rules; applying the ETL rules to the obtained data to generate processed data; applying the functional expressions to the processed data to obtain an output; and performing at least one processing action based on the output. A second method may include generating a system component corresponding to a blueprint based on a user request; associating the system component with a domain of a user account; and performing processes associated the system component.

Computer-implemented methods, systems comprising computer-readable media, and electronic devices for team-sourced anomaly vetting via automatically-delegated role definition

A computer-implemented method for team-sourced anomaly vetting via automatically-delegated role definition. The method may include automatically determining that an event of the computing system corresponding to activity of an end user is anomalous. Based on the anomalous event, a permission store of the computing system may automatically be edited to include an access restriction on the end user, and a notification may be automatically generated and transmitted to one or both of the end user and another end user. The notification may provide access to an executable statement including code configured to be executed to remove the access restriction. A call to the executable statement by the other end user may be automatically received. Further, the permission store may be automatically edited to remove the access restriction on the end user.