Abstract: The disclosed embodiments can be used to automate the acquisition and management of user consents for one or more campaigns, thus reducing the possibility of unintended violations of consent requirements as compared with existing systems. In accordance with the disclosed embodiments, each user consent may be associated with at least three different values. The consent management system may be configured to filter consent values for various users and send user-consent requests to certain users based on their filtered user-consent values. In some disclosed embodiments, a user may provide consent to allow communications of the user's information to certain “connected parties.” The connected parties, moreover, may need to separately provide user consent(s) as necessary to effectuate communications for a campaign in compliance with one or more laws, rules, or regulations.
Type:
Application
Filed:
December 23, 2020
Publication date:
June 23, 2022
Applicant:
Rhinogram, LLC
Inventors:
Keith Dressler, Stanley Dressler, Shannon Hastings, Kathy Ford
Abstract: The disclosed embodiments can be used to manage access to a plurality of secure records, thus rendering access to the secure records more efficient and secure. In accordance with certain disclosed embodiments, the secure records access management system may be configured to grant and revoke access to secure records upon the occurrence of certain events. In some disclosed embodiments, a secure record may comprise a third-party mention to indicate to the system that a third party should be granted access to the secure record. After detecting such a third-party mention, the system may grant the third party temporary access to information in the secure record, where such temporary access comprises the same access permissions as other users having access to the same secure record. The system may revoke the third party's access to the secure record.
Type:
Grant
Filed:
December 23, 2020
Date of Patent:
December 28, 2021
Assignee:
Rhinogram, LLC
Inventors:
Keith Dressler, Stanley Dressler, Shannon Hastings, Kathy Ford
Abstract: A method of communicating through a less secure messaging system provides an option of masking messages sent from a second party to a first party so that they are unreadable when received by the first party. For some embodiments, it may be that they are visible, but unreadable, other embodiments, not visible. In either case, an authorization may be provided by the first party to make the masked messages readable messages, for many embodiments until a session rule makes the readable message a masked message again.
Abstract: A method of communicating through a less secure messaging system provides an option of masking messages sent from a second party to a first party so that they are unreadable when received by the first party. For some embodiments, it may be that they are visible, but unreadable, other embodiments, not visible. In either case, an authorization may be provided by the first party to make the masked messages readable messages, for many embodiments until a session rule makes the readable message a masked message again.