Abstract: Embodiments described herein adopts a k nearest neighbor (kNN) mechanism over a model's hidden representations to identify training examples closest to a given test example. Specifically, a training set of sequences and a test sequence are received, each of which is mapped to a respective hidden representation vector using a base model. A set of indices for each sequence index that minimizes a distance between the respective hidden state vector and a test hidden state vector is then determined A weighted k-nearest neighbor probability score can then be computed from the set of indices to generate a probability distribution over labels for the test sequence.
Abstract: System and method for fine granularity control of data access and usage for across multi-tenant systems. A user makes a request to access a particular set of data from a particular remote data source for a specific purpose. The system authorizes the user to validate whether the user is qualified to make the request. The data source is checked to see if the particular data has been granted access for that particular purpose. A cloud neutral token is created and converted into a cloud specific token upon reaching the remote data source. The cloud specific token is used to create a temporary IAM role and IAM policy with a predetermined time to live. After the time to live expires, the IAM role and IAM policy are deleted.
Type:
Application
Filed:
January 31, 2024
Publication date:
March 27, 2025
Applicant:
Salesforce, Inc.
Inventors:
Chi Wang, Eugene Wayne Becker, Nidhi Chaudhary, Kishore Chaganti, Prasad Nimmakayala, Qingbo Cai, Linwei Zhu, Hsiang-Yun Lee, Amit Zohar, Raghu Setty, Bhavesh Doshi
Abstract: System and method for fine granularity control of data access and usage for across multi-tenant systems. A user makes a request to access a particular set of data from a particular remote data source for a specific purpose. The system authorizes the user to validate whether the user is qualified to make the request. The data source is checked to see if the particular data has been granted access for that particular purpose. A cloud neutral token is created and converted into a cloud specific token upon reaching the remote data source. The cloud specific token is used to create a temporary IAM role and IAM policy with a predetermined time to live. After the time to live expires, the IAM role and IAM policy are deleted.
Type:
Application
Filed:
January 31, 2024
Publication date:
March 27, 2025
Applicant:
Salesforce, Inc.
Inventors:
Chi Wang, Eugene Wayne Becker, Nidhi Chaudhary, Kishore Chaganti, Prasad Nimmakayala, Qingbo Cai, Linwei Zhu, Hsiang-Yun Lee, Amit Zohar, Raghu Setty, Bhavesh Doshi
Abstract: System and method for fine granularity control of data access and usage for across multi-tenant systems. A user makes a request to access a particular set of data from a particular remote data source for a specific purpose. The system authorizes the user to validate whether the user is qualified to make the request. The data source is checked to see if the particular data has been granted access for that particular purpose. A cloud neutral token is created and converted into a cloud specific token upon reaching the remote data source. The cloud specific token is used to create a temporary IAM role and IAM policy with a predetermined time to live. After the time to live expires, the IAM role and IAM policy are deleted.
Type:
Application
Filed:
January 31, 2024
Publication date:
March 27, 2025
Applicant:
Salesforce, Inc.
Inventors:
Chi Wang, Eugene Wayne Becker, Nidhi Chaudhary, Kishore Chaganti, Prasad Nimmakayala, Qingbo Cai, Linwei Zhu, Hsiang-Yun Lee, Amit Zohar, Raghu Setty, Bhavesh Doshi
Abstract: System and method for fine granularity control of data access and usage for across multi-tenant systems. A user makes a request to access a particular set of data from a particular remote data source for a specific purpose. The system authorizes the user to validate whether the user is qualified to make the request. The data source is checked to see if the particular data has been granted access for that particular purpose. A cloud neutral token is created and converted into a cloud specific token upon reaching the remote data source. The cloud specific token is used to create a temporary IAM role and IAM policy with a predetermined time to live. After the time to live expires, the IAM role and IAM policy are deleted.
Type:
Application
Filed:
January 31, 2024
Publication date:
March 27, 2025
Applicant:
Salesforce, Inc.
Inventors:
Chi Wang, Eugene Wayne Becker, Nidhi Chaudhary, Kishore Chaganti, Prasad Nimmakayala, Qingbo Cai, Linwei Zhu, Hsiang-Yun Lee, Amit Zohar, Raghu Setty, Bhavesh Doshi
Abstract: A computing device receives a user input to add a data visualization to a first visualization card in a first scene of an interactive presentation. In response to the user input, when the first scene is an initial scene to be added, the device computes, for each metric of a plurality of metrics, a respective parameter that measures the variability of values of the respective metric, and identifies a first subset of metrics based on the computed parameters. The device generates a respective data visualization for each metric. The device displays a plurality of the generated data visualizations. The device receives user selection of a first data visualization of the plurality of data visualizations, corresponding to a first metric of the subset of metrics. In response to the user selection, the device populates the first visualization card with the first data visualization.
Type:
Grant
Filed:
September 29, 2022
Date of Patent:
March 25, 2025
Assignee:
Salesforce, Inc.
Inventors:
Matthew Michael Brehmer, Arjun Srinivasan
Abstract: A system provides a framework for testing template code processed by a templating engine. A multitenant system may use template code for implementing Infrastructure as Code (IAC), for example, to generate pipelines for deploying software or provisioning resources for a datacenter configured in a cloud platform. The system sets the search path in a template engine environment object dynamically for each template file. The system allows testing of macros used by the template engine. The system converts the macros to callable entities that can be invoked by test cases. The system allows developers to finding code defects earlier and increase application availability. The system provides flexibility in testing and automation in running the tests. Furthermore, the system allows a separation of production code with unit tests.
Type:
Grant
Filed:
January 31, 2023
Date of Patent:
March 25, 2025
Assignee:
Salesforce, Inc.
Inventors:
Zemann Phoesop Sheen, Abhishek B. Waichal, Srinivas Dhruvakumar
Abstract: Apparatus and method for a scalable pricing engine. A scalable pricing engine is operable in a low-scale mode and a high-scale or scalable mode to process pricing data in response to pricing requests. The pricing engine operates in a first runtime environment in the low-scale mode in which it can service pricing requests up to a threshold number and in which the pricing data can be updated and tested. The pricing engine also operates in a second runtime environment which is a scalable runtime supporting pricing requests above the specified threshold. The scalable runtime and pricing engine rely on a scalable read-only data service which distributes a read-only copy of at least a portion of the pricing data from the primary database, a high-scale cache to reduce access latency, data processing and network resource allocations, and data reduction techniques when processing requests and responses.
Type:
Grant
Filed:
September 20, 2022
Date of Patent:
March 25, 2025
Assignee:
Salesforce, Inc.
Inventors:
Parth Vijay Vaishnav, Thomas Jones, Mitchell Christensen, Daniel May, Harpreet Singh, Jalaleldeen Aref
Abstract: A method that includes receiving a first request for a data object associated with a communication process flow that controls electronic communications between a tenant and a set of users corresponding to the tenant. The first request may include a set of querying parameters and a set of triggering parameters. The method may further include querying, based on the set of querying parameters, a communication process flow management service for data associated with the communication process flow. The method may further include generating, based on the querying, the data object that includes the data associated with the communication process flow. The method may further include transmitting, to a communication platform in accordance with the set of triggering parameters, a second request that comprises the data object. The second request may cause posting of an entry of the data object into a communication channel of the communication platform.
Type:
Grant
Filed:
September 17, 2021
Date of Patent:
March 25, 2025
Assignee:
Salesforce, Inc.
Inventors:
Aaron Popelka, William Robert Jennings, II, Pranavkumar Janakbhai Parekh, Roy Raviv
Abstract: Dialogue summarization is challenging due to its multi-speaker standpoints, casual spoken language style, and limited labelled data. The embodiments are directed to a coarse-to-fine dialogue summarization model that improves abstractive dialogue summarization quality and enables granular controllability. A summary draft that includes key words for turns in a dialogue conversation history is created. The summary draft includes pseudo-labelled interrogative pronoun categories and noisy key phrases. The dialogue conversation history is divided into segments. A generate language model is trained to generate a segment summary for each dialogue segment using a portion of the summary draft that corresponds to at least one dialogue turn in the dialogue segment. A dialogue summary is generated using the generative language model trained using the summary draft.
Type:
Grant
Filed:
January 27, 2021
Date of Patent:
March 25, 2025
Assignee:
Salesforce, Inc.
Inventors:
Chien-Sheng Wu, Wenhao Liu, Caiming Xiong, Linqing Liu
Abstract: Described herein is a system and method for capturing data associated with actions attempted by an automated agent. The system described herein captures data associated with the actions attempted by an automated agent during the messaging session between an automated agent and the user and present a summary of the actions in a messaging platform. In an embodiment, the automated agent uploads data associated with actions attempted during the messaging session to a server. The server captures the data associated with the actions and generates a description of each action that was attempted. The server generates a summary including the description of each action. The summary of the actions are rendered in the messaging platform.
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for implementing a bi-level subscription process. A server computing device subscribes to a global topic. The server computing device receives a discovery message published to the global topic, where the discovery message specifies an instance name, a data center, and an instance URL. The server computing device subscribes to a regional topic having the instance name. The server computing device receives a metadata message published to the regional topic having the instance name, where the metadata message includes a tenant identifier, source information pertaining to a source from which events are to be obtained, and destination information pertaining to a destination via which the events are to be transmitted. The server computing device stores the source information and destination information in association with the tenant identifier, obtains events from the source and transmits the events to the destination.
Abstract: Techniques are provided for thwarting attackers in a computing system which uses network management interfaces (NMIs). Before submitting NMI form data, a user computing device queries a server using a user id to obtain a signature which defines a shuffling map and random data such as a random key. The NMI form data is divided into portions and the random data is appended to each portion to provide respective data units, or buckets of data. The data units are then shuffled according to the shuffling map before being transmitted to a server, with the signature or an identifier of the signature included in a header. At the server, the data units are unshuffled to recover the data units, and the random data is removed to recover the form data portions. The instructions of the form data can then be executed.
Abstract: Disclosed herein are system, method, and computer program product embodiments for providing asynchronous backend processing of complex, time consuming, and/or expensive jobs. A command line interface (CLI) provides a command interface between a user and a backend processing server. The CLI sends a job request to the backend server, which immediately replies to the request with a confirmation message that includes a job identifier. This response is sufficient to allow the CLI to end its wait for the job response. Meanwhile, the backend server carries out the job by parsing the job into component tasks according to a declaration file and assigns those different tasks to different work servers. The backend server functions as a master server, tracking the statuses of the different tasks and assigning out new tasks until the job is complete. An overall job status is provided to the CLI upon request by referencing the job identifier.
Abstract: A method and system for generating a digital access token consumable by a piggy-back service system has been developed. A request for a digital access token for a client is received. The digital access token is associated with a tenant. At least one standard claim associated with a client attribute of the client is generated. The digital access token includes a header, a payload, and a signature. The payload includes the at least one standard claim associated with the client attribute. The digital access token enables the piggy-back service system to independently authorize access by the client to at least one service at the piggy-back service system based on the at least one standard claim. The digital access token is transmitted to a first device associated with the client.
Abstract: Method, apparatus and computer program product for seamless communication resource transition are described herein. A user may wish to share an external communication resource within a group-based communication system. Settings may be provided allowing the user to more effectively share the external communication resource. The user may select the appropriate settings such that the external communication resource can be transmitted to the group-based communication system for display in accordance with the selected settings.
Type:
Grant
Filed:
June 28, 2023
Date of Patent:
March 18, 2025
Assignee:
Salesforce, Inc.
Inventors:
Roland Schemers, James McPhail, Matthew Wahl
Abstract: An object interface for quick access to object(s) of a communication platform is described. Server(s) of the communication platform can receive, in association with a user interface of the communication platform, a request to associate an object with an object interface associated with a virtual space of the communication platform. The server(s) can cause one or more objects to be presented via the user interface and can receive a selection of a particular object from the one or more objects. The server(s) can cause, in response to the selection, a user interface element representative of the particular object to be associated with the object interface, wherein the user interface element is associated with an actuation mechanism that, when actuated, causes the particular object to be presented via the user interface. Notifications associated with the particular object can be indicated by annotation(s) to the user interface.