2018
Responding to an electronic message communicated to a large audience
Koumpan Elezaveta, Li Jenny S, Nanavati Amit A
computer network, computer science
Abstract
A first electronic message being widely disseminated can be identified. First content of the first electronic message can be analyzed and a determination can be made as to whether the first content satisfies at least a first criterion. Responsive to determining that the first content satisfies at least the first criterion, a second electronic message including second content can be automatically generated. Communication of the second electronic message to a first set of people can be initiated, and responses by the first set of people to the second electronic message can be monitored. A determination can be made as to whether the responses satisfy at least a second criterion. Responsive to determining that the responses satisfy at least the second criterion, the second electronic message can be communicated to at least a second set of people.
CREATING SERVICE AGREEMENTS VIA BLOCKCHAIN SMART CONTRACTS
Amanda E. Chessell, Elezaveta Koumpan
smart contract, service provider, user profile, ledger, computer security, computer science, blockchain, user device
Abstract
A blockchain of transactions may be used for various purposes and may be later accessed by interested parties for ledger verification. One example method of operation may include one or more of receiving a request from a user device for a new agreement at a service provider server, identifying a type of service requested, retrieving service history information stored in a user profile associated with the user device, evaluating the service history information to create a smart contract defining a new service agreement, and storing the smart contract in a blockchain.
2016
Caller relationship and risk assessment
Cindy E. Compert, Elezaveta Koumpan, Jenny S. Li, Naghmana Majed
risk assessment, database, computer science, risk indicator
Abstract
The method includes identifying, by one or more computer processors, incoming data related to a source. The method further includes identifying, by one or more computer processors, data related to a recipient of incoming data from the source. The method further includes determining, by one or more computer processes, a relationship between the source and the recipient of the incoming data from the source. The method further includes calculating, by one or more computer processors, a risk indicator associated with the incoming data from the source based upon the identified data related to the source, the identified data related to the recipient and the determined relationship between the source and the recipient. The method further includes sending, by one or more computer processors, a notification to the recipient, wherein the notification includes at least the calculated risk indicator.