Abstract: Computing systems, database systems, and related methods are provided for guiding a user defining a quote for a product. One method involves a server obtaining one or more values for one or more attributes of a quote from a client device coupled to the server over a network, obtaining an expected pricing model for the quote from a database, determining expected pricing information for the quote based on the one or more values for the one or more attributes using the model, and providing a graphical indication of the expected pricing information on the client device. The expected pricing model is determined based on historical relationships between quote attributes and price for previously-closed quotes.
Type:
Application
Filed:
October 31, 2018
Publication date:
April 30, 2020
Applicant:
salesforce.com, inc.
Inventors:
Daniel Boren, Shrestha Basu Mallick, Glenn Dearing, Robert DeSisto, Arun Kumar Jagota
Abstract: Systems, methods, and apparatuses for implementing consumer data validation, matching, and merging across tenants with optional verification prompts utilizing blockchain technologies in conjunction with a cloud based computing environment are described herein.
Abstract: In an example, a network traffic analysis system including a network based logging host may include a transport module, an event parser, and one or more consumer modules. The transport module may collect one or more messages including one or more event logs from one or more remote hosts, respectively. The event parser may generate normalized events consumable by the network logging host from the collected messages. The consumer modules may host process metadata of the event out to file for analysis. Other embodiments may be disclosed and/or claimed.
Abstract: Among other things, embodiments of the present disclosure help identify anomalous web browser session behavior. Other embodiments may be described and/or claimed.
Abstract: Some embodiments of the present invention include a system and method for validating state change requests and include generating one or more permission tokens based on a user's session identification (ID), each of the permission tokens associated with a record ID of a record, the one or more permission tokens and corresponding associated record IDs communicated to an application associated with the user. The system receives a state change request from the application, the state change request includes a first permission token from the one or more permission tokens and a record ID associated with the first permission token. In response to receiving the state change request, the system generates a second permission token based on the session ID and the record ID included in the state change request. The system then validates the state change request based on the first permission token matching the second permission token.
Abstract: Customization objects stored in a mobile database may be used to customize webpages and applications rendered in, or executed by a mobile application implemented by a mobile device. Upon authenticating the mobile application, a service provider may determine whether any customization objects have been updated since a previous authentication of the mobile application, and may update the mobile database with the updated customization objects. This way, the mobile device does not have to obtain customization objects from remote storage of the service provider each time a webpage is requested thereby reducing signaling overhead and decreasing webpage rendering time.
Abstract: In a computing environment having multiple application servers each having at least one connection agent and at least one pause agent and a database node, detecting an error condition between a first application server from the multiple application servers and the database node. Indicating that the database node is unavailable to stop attempts to access the database node by a first application server. The attempts to access the database node are paused without an indication of the database node being unavailable to a source of the attempt to access the database node. Checking periodically, with the first application server, availability of the database node. Indicating that the database node is available in response to a pre-selected number of successful attempts to contact the database node with the first application server.
Abstract: Embodiments regard transparent sharding of traffic across messaging brokers. An embodiment of a method of sharding message traffic across messaging brokers includes providing a message sharding service for message sharding among a plurality of registered message brokers, wherein providing the message sharding service includes applying a current message sharding strategy; and sharding messages among the registered message brokers according to the current message sharding strategy, including registering the message brokers and assigning message queues to registered message brokers according to the current message sharding strategy; wherein the current message sharding strategy is one of a plurality of message sharding strategies.
Abstract: In a computing system, methods for secure OS level login authentication for internal users to access servers. Some or all servers in a group each utilize a local ID Service for generating and validating a challenge responsive to an OS login request. The challenge is processed in a centralized secure server HSM. Rather than copying individual user public keys to each host in the data center, we need only copy the public key of the HSM to each host in the group. When a user attempts OS level login to a host, it encrypts the challenge using the public key of the HSM and forwards the request for processing in the HSM. There, it decrypts the challenge using the private key in the HSM and re-encrypts the challenge with the public key of the individual user. The user's mobile device, previously registered, is required to complete the authentication process.
Abstract: A method by a computing device to allocate computing resources for processing items in a queue using a list of computing resource allocation steps. The method includes determining a total amount of computing resources that are to be allocated for processing items in the queue based on a current number of items in the queue and the list of computing resource allocation steps, where the list of computing resource allocation steps specifies a plurality of ordered steps. Each step in the plurality of ordered steps defines a rate at which additional computing resources are allocated for processing items in the queue when the number of items in the queue is within a particular range. The method further includes adjusting an amount of computing resources allocated for processing items in the queue to match the determined total amount.
Abstract: A method for browser-based chat messaging is provided. The method presents browser-based presentation interfaces, including a master and at least one slave, and including a chat messaging interface for the master; establishes a single communication session with a server system, by the master; receives chat data, by the chat messaging interface of the master via the single communication session, including rich content comprising graphical elements, enhanced formatting, and interactive functionality; stores the chat data including the rich content in session storage for the master; renders the chat data including the rich content, by the chat messaging interface of the master; provides updated chat data including the rich content to the slaves, by the master via a broadcast pipeline for the browser application; and presents the updated chat data by re-rendering the chat data including the rich content, via secondary chat messaging interfaces corresponding to the slaves.
Abstract: As part of providing the services to users, an online system stores multiple records that are accessible by users of the online system. When a user provides a search query, the online system extracts morphological and dictionary features from the query. The online system provides the extracted features to a machine learning model as an input. The machine learning model outputs a score for each potential entity type that indicates a likelihood that the search query is for a record associated with the entity type. The output from the machine learning model is used by the online system to select one or more entity types that the user is likely searching for. The online system searches the stored records based on the search query but limits the searching to records associated with at least one of the selected entity types.
Type:
Grant
Filed:
April 6, 2017
Date of Patent:
April 21, 2020
Assignee:
salesforce.com, inc.
Inventors:
Naren M. Chittar, Jayesh Govindarajan, Edgar Gerardo Velasco, Anuprit Kale, Francisco Borges, Guillaume Kempf, Marc Brette
Abstract: The system tokenizes values stored by records' fields, creates trie from tokenized values, each branch labeled with tokenized value, each node storing count indicating number of records associated with tokenized value sequence beginning from trie root. The system tokenizes value stored by record field, identifies nodes, beginning from trie root, corresponding to token value sequence associated with tokenized value, until node is identified that stores count that is less than node threshold. The system identifies branch sequence comprising each identified node as record's key, and associates key with node storing count less than node threshold, and record with key. The system tokenizes prospective value stored by prospective record's field, identifies nodes, beginning from trie root, corresponding to another token value sequence associated with tokenized prospective value, until another node is identified that stores another count that is less than node threshold.
Abstract: Systems and techniques for managing data in a relational database environment and a non-relational database environment. Data in the relational database environment that is static and to be maintained beyond a preselected threshold length of time is identified. The data is copied from the relational database and stored in the data the non-relational database. Access to the data is provided from the non-relational database via a user interface that accesses both the relational database and the non-relational database.
Type:
Grant
Filed:
November 14, 2014
Date of Patent:
April 21, 2020
Assignee:
salesforce.com, inc.
Inventors:
Jonathan Mark Bruce, Eli Levine, Simon Toens, Ian Varley
Abstract: In accordance with embodiments, there are provided mechanisms and methods for dynamically suggesting answers to questions submitted to a portal of an online service. These mechanisms and methods for dynamically suggesting answers to questions submitted to a portal of an online service can enable embodiments to provide help document suggestions with limited user input. The ability of embodiments to provide help document search term suggestions with limited user input can enable users to quickly and efficiently find useful help documents.
Type:
Grant
Filed:
October 20, 2015
Date of Patent:
April 21, 2020
Assignee:
salesforce.com, inc.
Inventors:
Patrick McFarlane, Ganesh Mathrubootham, Shuchun Yang
Abstract: Application security assessment is described. A system identifies a first security configuration and a second security configuration associated with an application. The system calculates a security score based on a comparison of the first security configuration to a first baseline security setting and a comparison of the second security configuration to a second baseline security setting. The system generates a security report associated with the application that includes the security score and outputs the security report.
Abstract: In accordance with embodiments, there are provided mechanisms and methods for performing a synchronization of data. These mechanisms and methods for performing a synchronization of data can enable a more efficient synchronization, time and resource savings, an enhanced user experience, etc.
Type:
Grant
Filed:
October 20, 2017
Date of Patent:
April 21, 2020
Assignee:
salesforce.com, inc.
Inventors:
Didier Prophete, Ronald F. Fischer, Sönke Rohde
Abstract: Systems and methods for providing a custom action for an information post are described. In one embodiment, data for generating a user interface component for display at a client machine may be transmitted from a server to the client machine. The user interface component displaying one or more information posts may be capable of being generated in accordance with first computing programming language instructions provided by a first entity. Each information post may include information relating to a record stored on a storage medium accessible to the server. Selected ones of the information posts may have associated therewith a custom action activation mechanism for activating a custom action relating to the associated information post. The custom action activation mechanism may be capable of being generated in accordance with second computer programming language instructions provided by a second entity.