ELECTRONIC MAIL AUTHENTICATION AND TRACKING IN DATABASE SYSTEM

    公开(公告)号:US20230053692A1

    公开(公告)日:2023-02-23

    申请号:US17408265

    申请日:2021-08-20

    Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for tracking inbound email messages in association with database records. A first electronic mail message received via a network from a first client device is processed, where the first electronic mail message has a header including a message identifier. The message identifier is obtained from the header and parsed such that an encrypted portion and one or more unencrypted portions are obtained, where a first unencrypted portion of the unencrypted portions includes an entity identifier associated with a first database record of a database. A secret key associated with the first electronic mail message is obtained and the first electronic mail message is authenticated using the secret key, the encrypted portion of the message identifier, and at least one unencrypted portion of the unencrypted portions of the message identifier. The first electronic mail message is stored in association with the first database record according to a result of authenticating the first electronic mail message.

    Automated encryption degradation detection, reporting and remediation

    公开(公告)号:US11588840B2

    公开(公告)日:2023-02-21

    申请号:US16778325

    申请日:2020-01-31

    Inventor: Ramesh Ramani

    Abstract: Communication security is an ongoing problem. Over time, various protocols have been used and then replaced due to insufficient protection. For example, some client/server web communication used to rely on Secure Socket Layers (SSL) to protect communication, but was replaced with a more secure Transport Layer Security (TLS) protocol. TLS itself has undergone several revisions, and TLS 1.0 is now considered not secure. TLS and other protocols provide backwards compatibility, so while a higher security level is desired, communication may fallback to an undesirable level, e.g., TLS 1.0, if required by either communication endpoint. An intermediary to communication with an organization may capture data to facilitate analyzing it to determine what caused a fallback, and to decide if and how to remediate it. Remediation may vary depending on, for example, whether the cause was from within the organization, or external, such as from a client.

    Methods and systems for automated, intelligent application process development that recommend how to modify applications based on usage patterns of end users

    公开(公告)号:US11586945B2

    公开(公告)日:2023-02-21

    申请号:US16554474

    申请日:2019-08-28

    Inventor: Axella Novotny

    Abstract: Methods and systems are provided for modifying an application provided by a cloud-based computing system. The application is used by end users of an organization that is part of the cloud-based computing system. A clickstream monitoring module monitors a clickstream generated by each end user as that end user interacts with the application to generate a set of clickstream data for that particular end user. Each set of clickstream data indicates a path of interaction with features of the application by a particular end user. The sets of clickstream data can then be processed at an analytics engine to extract usage patterns that indicate how end users interact with different features of the application during usage of the application. The extracted usage patterns indicate which features the end users interact with and in what order. An artificial intelligence engine can then generate, based on the extracted usage patterns, at least one recommendation for modifying one or more features of the application to tailor the application for use by the end users in view of the extracted usage patterns.

    Cross platform application flow orchestration by transmitting the application flow including a transition rule to a plurality of computation layers

    公开(公告)号:US11579929B2

    公开(公告)日:2023-02-14

    申请号:US16803424

    申请日:2020-02-27

    Abstract: Disclosed herein are system, method, and computer program product embodiments for configuring a dynamic reassignment of an application flow across different computation layers based on various conditions. An embodiment operates by assigning a first rule of an application flow to a first computation layer of a plurality of computation layers. The embodiment assigns a second rule of the application flow to a second computation layer of the plurality of computation layers. The embodiment assigns a transition rule of the application flow to the first computation layer. The transition rule includes an action that causes the first rule of the application flow to be executed in the second computation layer of the plurality of computation layers based on a condition. The embodiment then transmits the application flow to the plurality of computation layers thereby causing the application flow to be configured for execution.

    Methods of providing an integrated interface that includes a virtual mobile device

    公开(公告)号:US11573808B2

    公开(公告)日:2023-02-07

    申请号:US16919152

    申请日:2020-07-02

    Inventor: Eugene Lee Lew

    Abstract: Implementations of the disclosed subject matter provide outputting an integrated interface to be displayed in a browser including a text-based interface of an application and an interface for a virtual mobile device separate from the text-based interface, where the virtual mobile device emulates operations and a user interface of a specific type of hardware mobile device. An indication of a communication may be received from a mobile device. A customer name associated with the mobile device may be obtained based on at least one of a certificate that includes the customer name retrieved by the server from a third party server, and a database record that includes the customer name that is retrieved by the server from a database. The obtained customer name may be displayed on the virtual mobile device portion of the integrated interface in association with the communication from the mobile device of the customer.

    CERTIFICATE REVOCATION AT DATACENTERS

    公开(公告)号:US20230032867A1

    公开(公告)日:2023-02-02

    申请号:US17387033

    申请日:2021-07-28

    Abstract: Methods, systems, and devices supporting data processing are described. In some systems, a first service executing on a datacenter may receive a request to establish a secure connection and a certificate from a second service. The datacenter may be provisioned with an indication of certificates that have been revoked by a certificate authority (CA). The first service may validate a certificate chain for the certificate from the second service based on the certificates that have been revoked by the CA. If a certificate of the certificate chain has been revoked, the first service may not establish the connection with the second service. If the certificates of the certificate chain have not been revoked, the first service may establish a secure connection with the second service. The services may communicate in accordance with validating the certificate chain.

Patent Agency Ranking