Abstract:
A system and method for generating separations between jobs in a batch of scanned pages are provided. The method includes, for each of a set of jobs, capturing an image of a representative page of the job. Thereafter, the method includes scanning the set of jobs as a batch to generate a set of scanned pages. The captured images are compared with scanned pages in the set of scanned pages to identify, for at least one captured image, a respective scanned page which matches the captured image. At least one separator is generated for separating the set of scanned pages based on a location of the matching scanned page(s).
Abstract:
A system and method for generating separations between jobs in a batch of scanned pages are provided. The method includes, for each of a set of jobs, capturing an image of a representative page of the job. Thereafter, the method includes scanning the set of jobs as a batch to generate a set of scanned pages. The captured images are compared with scanned pages in the set of scanned pages to identify, for at least one captured image, a respective scanned page which matches the captured image. At least one separator is generated for separating the set of scanned pages based on a location of the matching scanned page(s).
Abstract:
A computer implemented electronic out-of-office message analysis system and method are disclosed. The method includes, for each of a plurality of users, receiving a user-generated electronic out-of-office message in a natural language in which a time window of absence and at least one alternate named contact are expressed and, based on the out-of-office message, generating a structured representation of the out-of-office message which links the alternate contact to a normalized representation of the time window. The structured representation of the out-of-office message is stored in a database. From the database it can be determined whether a current user's out-of-office message conflicts with another user's out-of-office message. If a conflict is detected, the current user can be notified.
Abstract:
A method for detection of phishing attempts in received electronic mail messages includes retrieving the source code, displayed text, and a list of all specified addresses contained within the source code of a received electronic message. Visual character normalization is applied to each specified address to develop all possible address combinations and to form a normalized address list. The specified addresses are removed from the normalized address list to create a revised address list, upon which comparison tests are performed to determine if each address in the revised address list is from a valid source. The recipient of the electronic message is informed of any message found to be from an invalid source.
Abstract:
A textual representation of a voice message is provided to a communication device, such as a mobile phone, for example, when the mobile phone is operating in a silent mode. The voice message is input by a caller and the voice message converted to phonemes. A text representation of the voice message is transmitted to the mobile phone. The representation includes characters based on the phonemes with well known words being represented in an easily understood shorthand format.
Abstract:
A computer implemented electronic out-of-office message analysis system and method are disclosed. The method includes, for each of a plurality of users, receiving a user-generated electronic out-of-office message in a natural language in which a time window of absence and at least one alternate named contact are expressed and, based on the out-of-office message, generating a structured representation of the out-of-office message which links the alternate contact to a normalized representation of the time window. The structured representation of the out-of-office message is stored in a database. From the database it can be determined whether a current user's out-of-office message conflicts with another user's out-of-office message. If a conflict is detected, the current user can be notified.
Abstract:
A method for detection of phishing attempts in received electronic mail messages includes retrieving the source code, displayed text, and a list of all specified addresses contained within the source code of a received electronic message. Visual character normalization is applied to each specified address to develop all possible address combinations and to form a normalized address list. The specified addresses are removed from the normalized address list to create a revised address list, upon which comparison tests are performed to determine if each address in the revised address list is from a valid source. The recipient of the electronic message is informed of any message found to be from an invalid source.