Abstract: A method for providing interoperability between a plurality of security services and target applications by an interoperability service. The method includes receiving a request from one of the plurality of security services to perform a task on a target application, preparing a unified data model for interaction with the target application, determining and organizing data connections to perform the task on the target application, generating a set of requests using the unified data model based on the task and utilizing business logic of the interoperability service for the data connections with the target application, transforming the set of requests into commands and data structures specific to the target application, and sending the set of requests on respective data connections with the target application.
Type:
Application
Filed:
March 17, 2021
Publication date:
September 22, 2022
Applicant:
salesforce.com, inc.
Inventors:
Scott Glaser, Abhinav Bagul, Kerry Fleming, Matthew R. Kunkel, Derek Spiner
Abstract: Disclosed herein are system, method, and computer program product embodiments for generating a unit test for an API or integration of an application by recording a flow of an input through a plurality of message processors of the application. A developer can then view an outline of the recorded flow in a menu, from which the developer can select an individual processor within the recorded flow. By selecting an individual processor, options particular to that processor can be presented to the developer to allow them to control behaviors of the unit test or to validate results.
Type:
Application
Filed:
January 28, 2022
Publication date:
September 22, 2022
Applicant:
salesforce.com, inc.
Inventors:
Sanjna VERMA, Matias PENTREATH, Leandro Emmanue REINA KIPERMAN, Julian PASCUAL, Fernando THEA, Facundo Ezequiel POBLETE, Diego Martin STRUBOLINI, Pablo Damian LA GRECA
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for generating and implementing computational graphs that facilitate concurrent computation on data streams. A computational graph includes a plurality of nodes, where each node has one or more stages associated therewith. Each stage may be associated with a corresponding operation that is to be performed on data associated with that stage.
Abstract: Systems, methods, and apparatuses for implementing super community and community sidechains with consent management for distributed ledger technologies in a cloud based computing environment are described herein.
Abstract: Techniques are disclosed relating to automating permission requests, e.g., in the context of multi-factor authorization. A mobile device may allow a user to automate responses to future permission requests for multi-factor authorization procedures. The mobile device may automatically respond to subsequent permission requests based on one or more automation criteria. Authorized actions may include login, transaction approval, physical access, vehicle ignition, account recovery, etc. The automation criteria may include location, acceleration, velocity, wireless connectivity, proximity to another device, temperature, lighting, noise, time, biometrics, altitude, pressure, image characteristics, etc. Disclosed techniques may increase authorization security while reducing user interaction for multi-factor authorization, in some embodiments.
Abstract: Systems and methods are described for generating metrics from log data items, automatically inferring one or more schemas based at least in part on analyzing samples of the log data items, validating samples of the log data items against the one or more schemas to detect log data item errors, and analyzing the log data item errors according to metrics analytics rules to determine an effect of the log data item errors on a quality measurement of the metrics.
Type:
Grant
Filed:
January 22, 2021
Date of Patent:
September 20, 2022
Assignee:
Salesforce.com, Inc.
Inventors:
Sahibdeep Singh, Linda Wei, Ahmet Bugdayci, Mario Sergio Rodriguez
Abstract: Described herein are systems, apparatus, methods and computer program products for implementing dynamic API cost models. The dynamic API cost models may determine the cost of usage of a specific API based on a plurality of factors, such as the value of the API to the client as well as the usage of computational resources and other factors.
Type:
Grant
Filed:
January 24, 2020
Date of Patent:
September 20, 2022
Assignee:
salesforce.com, inc.
Inventors:
Dinesh Weerapurage, Lahiru Pileththuwasan Gallege, Kenneth Cavagnolo, Chris Groer, Abraham Reyes
Abstract: A method for replicating a set of parent resources from an administrator namespace to a set of tenant namespaces is described. The method includes receiving, by the administrator namespace, a global object that includes a set of object fields that reference (1) a set of parent resources and (2) the set of tenant namespaces; monitoring, by an operator controller of the administrator namespace, the global object to determine whether a change has been made to the global object; and replicating, by the operator controller, the set of parent resources to the set of tenant namespaces as child resources based on the global object in response to detecting a change to the global object.
Type:
Grant
Filed:
December 22, 2020
Date of Patent:
September 13, 2022
Assignee:
salesforce.com, inc.
Inventors:
Savithru Mallikarjuna Durga Lokanath, Arpeet Kale
Abstract: Computing systems, database systems, and related conversational updating methods are provided for dynamically updating graphical user interfaces responsive to conversational user inputs received via a chatbot or other conversational interactions with a user.
Type:
Grant
Filed:
June 16, 2021
Date of Patent:
September 13, 2022
Assignee:
salesforce.com, inc.
Inventors:
Alan Cardel Molina, Carlos Enrique Mogollan Jimenez, Chaitanya Malla
Abstract: Techniques are disclosed relating to installing and operating applications in a server-based application workspace. A computer system, while operating the server-based application workspace, may store subscription information indicating a user that is a developer for a particular application package, and one or more users that are subscribers for the particular application package. The computer system may further store lock data for the particular application package that indicates user permissions to edit at least one application component for the particular application package. Based on the lock data, the computer system may permit the developer to edit the at least one application component of the particular application package, and deny requests from the one or more users to edit the at least one application component.
Type:
Grant
Filed:
January 31, 2018
Date of Patent:
September 13, 2022
Assignee:
salesforce.com, inc.
Inventors:
Jeffrey Michael Bartolotta, Avrom Irwin Roy-Faderman, James B. Wunderlich, Dileep Burki
Abstract: A self-managing database system includes a metrics collector to collect metrics data from one or more databases of a computing system and an anomaly detector to analyze the metrics data and detect one or more anomalies. The system includes a causal inference engine to mark one or more nodes in a knowledge representation corresponding to the metrics data for the one or more anomalies and to determine a root cause with a highest probability of causing the one or more anomalies using the knowledge representation. The system includes a self-healing engine, to take at least one remedial action for the one or more databases in response to determination of the root cause.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating offering generic integrated development environments (IDE) extension in an on-demand services environment according to one embodiment. In one embodiment and by way of example, a method includes identifying a plurality of design systems and a plurality of components associated with the plurality of design systems, where at least one component of the plurality of components is identified for each of the plurality of design systems; integrating the plurality of components into a single structure of components. The method further includes generating a set of protocols based on the single structure of components, and associating the set of protocols to one or more IDEs such that set of protocols serves as a generic IDE extension to the one or more IDEs and is compatible with the plurality of design systems.
Abstract: In a method for communicating information about a service or product, a record can be retrieved from a database storing records of communications related to a second entity. The record can include information related to an identity of a first entity. The first entity can be defined, at a processor and based upon content of the record, as a member of a set designated to be sent the information about the product or service. The first entity can have previously engaged in a first communication related to the second entity. The second entity can be associated with the product or service. A second communication, which can include the information related to the identity of the first identity, can be sent from the processor to an advertising platform. A third communication, which can include the information about the product or service, can be sent from the processor to the advertising platform.
Type:
Grant
Filed:
August 24, 2015
Date of Patent:
September 6, 2022
Assignee:
salesforce.com, inc.
Inventors:
Byron Pitney, Jeffrey S. Cunning, Gabriel Joynt, Adam Fletcher, Srikant Rao
Abstract: A method for natural language processing includes receiving, by one or more processors, an unstructured text input. An entity classifier is used to identify entities in the unstructured text input. The identifying the entities includes generating, using a plurality of sub-classifiers of a hierarchical neural network classifier of the entity classifier, a plurality of lower-level entity identifications associated with the unstructured text input. The identifying the entities further includes generating, using a combiner of the hierarchical neural network classifier, a plurality of higher-level entity identifications associated with the unstructured text input based on the plurality of lower-level entity identifications. Identified entities are provided based on the plurality of higher-level entity identifications.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for facilitating criteria-based cost-efficient routing and deployment of metadata packages in an on-demand services environment according to one embodiment. In one embodiment and by way of example, a method comprises analyzing, by a metadata costing server computing device, characteristics of a metadata package awaiting deployment, where analyzing includes matching the characteristics with predefined criteria associated with deployment of metadata packages. The method may further include routing, by the metadata server, the metadata package for real-time deployment if the characteristics satisfy the criteria, where the real-time deployment allows for bypassing of message queues associated with standard deployment.
Type:
Application
Filed:
January 7, 2022
Publication date:
September 1, 2022
Applicant:
salesforce.com, inc.
Inventors:
Peter S. WISNOVSKY, Scott MUSSER, Zhijie GUAN, Carl WATTERSON MONTGOMERY
Abstract: In a cloud computing environment, a configurable transaction status interface of an enterprise computing platform enables application developers to customize applications efficiently. The configurable transaction status interface includes a global variable that is populated using a method for implementing a configurable status map that maps a transaction result to the global variable without having to customize the application. The configurable transaction status interface allows third party vendors of transaction gateways to use the configurable status map to map one or more of their gateway-specific transaction results to a generic status defined in the global variable. The vendors manage the configurable status map in their own namespace independently of the application with which they are interfacing.
Abstract: Techniques are disclosed relating multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system compares the current contextual information with prior contextual information for database requests and then selects a security level from the different security levels. The computer system then initiates verification of a subset of authentication factors corresponding to the selected security level.
Abstract: A method of operating a privacy management system for managing personal data includes receiving a first input indicative of a first user activity in accessing personal data stored within a memory element. The method also includes creating an activity model based on the first input. The activity model is indicative of typical activity in accessing personal data stored in the memory element. The method further includes receiving a second input indicative of a second user activity in accessing personal data stored within the memory element. Also, the method includes recognizing, according to the activity model, the second user activity as being anomalous to the typical activity in accessing personal data stored in the memory element. Moreover, the method includes generating, as a result of recognizing the second user activity as being anomalous, a command that causes at least one of the client devices to perform an anomaly corrective action.
Abstract: A method is performed by a system of a host organization for managing read access of data in a blockchain, the system providing a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization. The method includes receiving a transaction to be stored to the blockchain via the blockchain interface, encrypting transaction data using a key generated by the blockchain interface, dividing the key into a set of shared secrets corresponding to each node in the blockchain network, receiving a request to access the transaction data by the blockchain interface, receiving at least one of the shared secrets from a node in the blockchain network indicating consensus, and decrypting the transaction data in response to receiving the shared secrets.