Abstract: Disclosed herein are system, method, and computer program product embodiments for performing external change detection without copying data from an external system. An embodiment operates by transmitting a registration request comprising data selection criteria to a data service at an external system. The external system generates a tracking token representing a transaction state of a data object satisfying the data selection criteria. The embodiment receives the tracking token. The embodiment detects a change to the data object in the external system using the tracking token. The embodiment receives the change to the data object from the external system based on the detecting. The embodiment then processes the change to the data object.
Abstract: The technology disclosed determines which field values in a set of unique field values for a particular field in a fielded dataset are anomalous using six similarity measures. A factor vector is generated per similarity measure and combined to form an input matrix. A convolutional neural network processes the input matrix to generate evaluation vectors. A fully-connected network evaluates the evaluation vectors to generate an anomaly scalar for a particular unique field value. Thresholding is applied to anomaly scalar to determine whether the particular unique field value is anomalous.
Abstract: An online system receives a search query from a user. In response to the request, the online system obtains search results matching the search query and identifies a set of attributes describing a context of the search query. The online system generates a data structure that includes a plurality of search coefficients. The search coefficients are selected based on the identified set of attributes. Some of the search coefficients have conflicting values. The online system traverses the data structure to identify the search coefficients having conflicting values. For each search coefficient having conflicting values, the online system resolves conflicts and determines a value of the search coefficient. The online system ranks search results based on the resolved values of the search coefficients.
Type:
Grant
Filed:
October 10, 2017
Date of Patent:
August 17, 2021
Assignee:
salesforce.com, inc.
Inventors:
Jayesh Govindarajan, Nicholas Beng Tek Geh, Ammar Haris
Abstract: A request may be received to migrate an organization from a first computing pod to a second computing pod located within an on-demand computing services organization configured to provide computing services. A migration resource utilization profile may be determined for the first computing pod. The migration resource utilization profile may identify one or more computing resources involved in transferring organizations from the first computing pod during one or more time windows. A migration time window for performing the requested migration may be selected based at least in part on the migration resource utilization profile.
Abstract: A staging table created in a database system may store a snapshot of live database table captured prior to an unintended change to the live database table. One or more entries in the staging table may be updated to incorporate one or more intended changes to the live database table that occurred after the unintended change. The live database table may be updated by merging each of the updated entries from the staging table to the live database table. The updated database table may eliminate the unintended change.
Abstract: Techniques and structures to facilitate identification, authentication, authorization and accounting of a computing device is disclosed. A set of supported algorithms for transmission during a secure shell (SSH) clear packet exchange is received and a cryptographic hash is performed on the set of algorithms to generate a unique fingerprint.
Type:
Grant
Filed:
September 24, 2018
Date of Patent:
August 17, 2021
Assignee:
salesforce.com, inc.
Inventors:
Benjamin Reardon, Adel Karimishiraz, Jeffery Atkinson, John Althouse
Abstract: Techniques are disclosed relating to user authentication using multi-party computation and public key cryptography. In some embodiments, a client system may receive, from a server system, an authentication challenge that includes a first partial signature value. The client system may access key-pair information that includes, for a server key-pair, a server public key and a second component of a server private key, where the server system has access to a first component of the server private key. The client system may then generate a second partial signature value using the second component of the server private key but not an entirety of the server private key, and may generate a final signature value based on the first and second partial signature values. Using the final signature value, the client system may then determine whether the authentication challenge was sent by the server system.
Abstract: Disclosed are systems, apparatus, methods and computer-readable media for updating information stored in a database system over a network. In some implementations, first contact data is retrieved from a first virtual portion of a database system, where the first contact data provides first contact information associated with at least one entity. In some instances, the first contact data is compared with second contact data, where the second contact data provides second contact information associated with the at least one entity. In some instances, at least some of the second contact information is retrieved from a social networking system. In various implementations, at least one difference between the first contact data and the second contact data is identified, where the at least one difference is capable of being presented in a user interface displayed at a computer system. In some instances, a selection identifying contact data to store is received.
Abstract: A method of collecting data from multiple sources in a multi-tenant system is provided. The method includes obtaining data corresponding to a first tenant in the multi-tenant system and a second tenant in the multi-tenant system from a first source, obtaining data corresponding to the first tenant in the multi-tenant system and the second tenant in the multi-tenant system from a second source, and aggregating the data obtained from the first and second sources into a single database and associating each entry of the obtained data with at least one of the tenants of the multi-tenant system.
Abstract: Disclosed are database systems, computing devices, methods, and computer program products for identifying recurring sequences of user interactions with an application. In some implementations, a server of a database system provides a user interface of the application for display at a computing device. The database system stores data objects identifying a first plurality of user interactions with the application. The server receives information representing a second plurality of user interactions with the application. The server updates the database system to further identify the second user interactions. The server identifies a recurring sequence of user interactions from the first and second user interactions as resulting in a first target state of the application. The server updates the database system to associate the recurring sequence of user interactions with the first target state of the application.
Abstract: A system may include multiple personal data sources and a machine-implemented data extractor and correlator configured to retrieve personal data from at least one of the personal data sources. The data extractor and correlator may extract information from unstructured data within the retrieved personal data and correlate the extracted information with previously stored structured data to generate additional structured data. The system may also include a storage device configured to store the previously stored structured data and the additional structured data. A natural language query module may be configured to receive a natural language query from a user and provide a response to the natural language query based at least in part on one or both of the previously stored structured data and the additional structured data.
Type:
Grant
Filed:
October 19, 2018
Date of Patent:
August 17, 2021
Assignee:
SALESFORCE.COM, INC.
Inventors:
Thierry Donneau-Golencer, Rajan Singh, Madhu Yarlagadda, Corey Hulen, Kenneth C. Nitz, William Scott Mark
Abstract: An automated self-healing database system is provided that includes a primary database, an application server that writes data to the primary database and reads data from the primary database when it is available, a standby database that is a replica of the primary database, and a self-healing module (SHM). The SHM can automatically detect unavailability of the primary database, and if the standby database is available, the SHM can automatically enable the standby database as readable and writable, assign the standby database the role of primary database at the primary site to start replicating data to other standby databases, and use a pre-established connection between the application server and the standby database to allow the application server to read data from the standby database and to write data to the standby database resulting in the standby database assuming role of the primary database at the primary site.
Type:
Grant
Filed:
June 13, 2019
Date of Patent:
August 17, 2021
Assignee:
salesforce.com, inc.
Inventors:
Bohan Chen, Donald Tam, Jesse Collins, Sheng Qiao, Ted Liu, Youngjin Yu
Abstract: Computing systems, database systems, and related conversational updating methods are provided for dynamically updating graphical user interfaces responsive to conversational user inputs received via a chatbot or other conversational interactions with a user.
Type:
Application
Filed:
April 26, 2021
Publication date:
August 12, 2021
Applicant:
salesforce.com, inc.
Inventors:
Alan Molina, Carlos Jimenez, Chaitanya Malla
Abstract: The technology disclosed determines one or more field values in a set of field values for a particular field in a fielded dataset that are similar to an input value using six similarity measures. A factor vector is generated per similarity measure and combined to form an input matrix. A convolutional neural network processes the input matrix to generate evaluation vectors. A fully-connected network evaluates the evaluation vectors to generate suggestion scalars for similarity to a particular input value. Thresholding is applied to suggestions scalars to determine one or more suggestion candidates for the particular input value.
Abstract: A method is provided for generating regular expressions. In some embodiments, the method includes partitioning a first plurality of text strings into a plurality of substrings, each text string of the first plurality being malignant or benign. The method also includes generating a population list including a second plurality of text strings, each text string of the second plurality including at least one token. The method further includes creating subsequent iterations of the population list. Each iteration may include calculating a score for one or more text strings in the population list and removing one or more text strings from the population list. The method further includes in response to a determination to not update the population list, selecting, based on the one or more calculated scores, a third text string as a regular expression from a final iteration of the population list.
Abstract: Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies the electronic device. Subsequent accesses to the resource during the session are monitored to determine whether changes occur to the information. A security action is taken in response to a change in the information.
Abstract: Disclosed are examples of systems, apparatus, methods and computer program products for deleting data of an object within a multi-tenant database. Described is a mechanism for performing operations such as an efficient delete operation by introducing a new delete operation (or method) that is configured to allow a data structure such as an object to identify one or more records to be deleted. In order to ensure that the operation is efficient, the mechanism may determine characteristics of a data store and determine whether the information provided within the data structure provides an efficient identification of the data to be deleted. Upon a successful validation, an initial delete request may be translated to an appropriate delete operation for the underlying database.
Type:
Grant
Filed:
April 23, 2018
Date of Patent:
August 10, 2021
Assignee:
salesforce.com, inc.
Inventors:
Jan Asita Fernando, Cody Marcel, Sahil Ramrakhyani, Samarpan Jain, Brian Esserlieu, James Ferguson, Saikiran Perumala, Charles Fineman, Jay Hurst, Seshank Kalvala
Abstract: The technology disclosed herein relates to method, system, and computer program product (computer-readable storage device) embodiments for managing resource allocation in a stream processing framework. An embodiment operates by configuring an allocation of a task sequence and machine resources to a container, and by running the task sequence, wherein the task sequence is configured to be run continuously as a plurality of units of work corresponding to the task sequence. Some embodiments further include changing the allocation responsive to a determination of an increase in data volume. A query may be taken from the task sequence and processed. Responsive to the query, a real-time result may be returned. Query processing may involve continuously applying a rule to the data stream, in real time or near real time. The rule may be set via a query language. Additionally, the data stream may be partitioned into batches for parallel processing.