Patents by Inventor Paul Anthony Mason
Paul Anthony Mason has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11782773Abstract: A system and method for automated application programming interface (API) importation that includes receiving a selection of at least one API provider service of a set of API provider services with API integration support for a platform, retrieving a listing of APIs provided by the selected at least one API provider service, receiving a selection of at least one API from the listing of APIs, and enabling the selected at least one API for a user of the platform, in response to the selection of the at least one API.Type: GrantFiled: August 30, 2021Date of Patent: October 10, 2023Assignee: Salesforce, Inc.Inventors: Kirkland Spector, Philip Issler, Jr., Barkha Keni, Paul Anthony Mason, Alexander Victor Edelstein, Brian Jaffery Tajuddin
-
Publication number: 20230063160Abstract: A system and method for automated application programming interface (API) importation that includes receiving a selection of at least one API provider service of a set of API provider services with API integration support for a platform, retrieving a listing of APIs provided by the selected at least one API provider service, receiving a selection of at least one API from the listing of APIs, and enabling the selected at least one API for a user of the platform, in response to the selection of the at least one API.Type: ApplicationFiled: August 30, 2021Publication date: March 2, 2023Applicant: salesforce.com, inc.Inventors: Kirkland Spector, Philip Issler, JR., Barkha Keni, Paul Anthony Mason, Alexander Victor Edelstein, Brian Jaffery Tajuddin
-
Publication number: 20220326822Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the customization of a process flow builder. A first graphical user interface (GUI) identifying one or more user selectable process flow types is provided. Responsive to a selection of a process flow type, information corresponding to the selected process flow type is obtained. The information includes one or more headers and, for at least a first header, identifies one or more elements that are user-selectable for addition to a layout representing a process flow. A second GUI is generated using the information. A user may access the second GUI to generate a layout representing a process flow of the process flow type.Type: ApplicationFiled: April 21, 2021Publication date: October 13, 2022Applicant: Salesforce.com, Inc.Inventors: Paul Anthony MASON, Samuel William BAILEY, Samantha REYNARD, Derek D'SOUZA, Lovi YU
-
Publication number: 20220326987Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the customization of a process flow builder. A first graphical user interface (GUI) identifying one or more user selectable process flow types is provided. Responsive to a selection of a process flow type, information corresponding to the selected process flow type is obtained. The information includes one or more headers and, for at least a first header, identifies one or more elements that are user-selectable for addition to a layout representing a process flow. A second GUI is generated using the information. A user may access the second GUI to generate a layout representing a process flow of the process flow type.Type: ApplicationFiled: April 21, 2021Publication date: October 13, 2022Applicant: Salesforce.com, Inc.Inventors: Paul Anthony MASON, William Charles EIDSON, Samuel William BAILEY, Alex EDELSTEIN, Samantha REYNARD, Barkha KENI, Tanveer Singh RANDHAWA
-
Patent number: 11089019Abstract: Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies the electronic device. Subsequent accesses to the resource during the session are monitored to determine whether changes occur to the information. A security action is taken in response to a change in the information.Type: GrantFiled: November 30, 2016Date of Patent: August 10, 2021Assignee: salesforce.com, inc.Inventor: Paul Anthony Mason
-
Patent number: 10764277Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: GrantFiled: July 9, 2018Date of Patent: September 1, 2020Assignee: salesforce.com, inc.Inventors: William Charles Mortimore, Jr., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Patent number: 10419451Abstract: A system and a method are disclosed for determining malicious web requests. The system processes incoming web requests to determine whether a request matches predetermined patterns of suspicious requests. The systems stores associations between patterns of suspicious requests, parts of the web request where each pattern occurs, and attack type associated with the pattern. If the system determines that an incoming web request matches a pattern of a suspicious request, the system determines whether to forward the request to the web server for processing or to hold the request. The system locks out a source of request for a period of time if the source sends requests that match certain attack patterns.Type: GrantFiled: November 9, 2015Date of Patent: September 17, 2019Assignee: salesforce.comInventor: Paul Anthony Mason
-
Patent number: 10212189Abstract: Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page. The server system may obtain authentication credentials with an image rendered by the user system. The server system may authenticate the user system based on the authentication credentials and information included in the rendered image. Other embodiments may be described and/or claimed.Type: GrantFiled: October 11, 2016Date of Patent: February 19, 2019Assignee: SALESFORCE.COM, INC.Inventor: Paul Anthony Mason
-
Publication number: 20180337913Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: ApplicationFiled: July 9, 2018Publication date: November 22, 2018Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Patent number: 10021089Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: GrantFiled: April 9, 2015Date of Patent: July 10, 2018Assignee: salesforce.com, inc.Inventors: William Charles Mortimore, Jr., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat
-
Publication number: 20180152451Abstract: Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies the electronic device. Subsequent accesses to the resource during the session are monitored to determine whether changes occur to the information. A security action is taken in response to a change in the information.Type: ApplicationFiled: November 30, 2016Publication date: May 31, 2018Inventor: Paul Anthony MASON
-
Patent number: 9954880Abstract: Techniques are disclosed relating to limiting malicious-code analysis of webpage content. In one embodiment, a computing system receives a webpage requested by a client device. The computing system randomly alters content of the webpage to limit analysis of the content by malicious code such that the altering does not affect how the webpage is displayed by the client device. The computing system may then serve the webpage with the altered content to the client device. In some embodiments, the altering includes searching the webpage for an HTML element that specifies a plurality of attributes in a particular ordering and rearranging the plurality of attributes to have a new ordering different from the particular ordering. In some embodiments, the altering includes parsing the webpage for an HTML element that specifies an identifier attribute and modifying an identifier attribute of the element.Type: GrantFiled: October 30, 2015Date of Patent: April 24, 2018Assignee: salesforce.com, inc.Inventor: Paul Anthony Mason
-
Publication number: 20180103050Abstract: Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page. The server system may obtain authentication credentials with an image rendered by the user system. The server system may authenticate the user system based on the authentication credentials and information included in the rendered image. Other embodiments may be described and/or claimed.Type: ApplicationFiled: October 11, 2016Publication date: April 12, 2018Applicant: salesforce.com, inc.Inventor: Paul Anthony MASON
-
Patent number: 9774572Abstract: Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a stored resource, where a first portion of the request is encrypted by a client device using a particular encryption technique and a second portion of the request is not encrypted using the particular encryption technique and where the first portion of the request includes a reference to the resource. In some embodiments, the host decrypts the reference to the resource and provides the resource to the requesting device based on the decrypted reference.Type: GrantFiled: May 11, 2015Date of Patent: September 26, 2017Assignee: salesforce.com, inc.Inventors: Paul Anthony Mason, Harsimranjit Singh Chabbewal
-
Publication number: 20170134407Abstract: A system and a method are disclosed for determining malicious web requests. The system processes incoming web requests to determine whether a request matches predetermined patterns of suspicious requests. The systems stores associations between patterns of suspicious requests, parts of the web request where each pattern occurs, and attack type associated with the pattern. If the system determines that an incoming web request matches a pattern of a suspicious request, the system determines whether to forward the request to the web server for processing or to hold the request. The system locks out a source of request for a period of time if the source sends requests that match certain attack patterns.Type: ApplicationFiled: November 9, 2015Publication date: May 11, 2017Inventor: Paul Anthony Mason
-
Publication number: 20170126719Abstract: Techniques are disclosed relating to limiting malicious-code analysis of webpage content. In one embodiment, a computing system receives a webpage requested by a client device. The computing system randomly alters content of the webpage to limit analysis of the content by malicious code such that the altering does not affect how the webpage is displayed by the client device. The computing system may then serve the webpage with the altered content to the client device. In some embodiments, the altering includes searching the webpage for an HTML element that specifies a plurality of attributes in a particular ordering and rearranging the plurality of attributes to have a new ordering different from the particular ordering. In some embodiments, the altering includes parsing the webpage for an HTML element that specifies an identifier attribute and modifying an identifier attribute of the element.Type: ApplicationFiled: October 30, 2015Publication date: May 4, 2017Inventor: Paul Anthony Mason
-
Publication number: 20160337320Abstract: Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a stored resource, where a first portion of the request is encrypted by a client device using a particular encryption technique and a second portion of the request is not encrypted using the particular encryption technique and where the first portion of the request includes a reference to the resource. In some embodiments, the host decrypts the reference to the resource and provides the resource to the requesting device based on the decrypted reference.Type: ApplicationFiled: May 11, 2015Publication date: November 17, 2016Inventors: Paul Anthony Mason, Harsimranjit Singh Chabbewal
-
Publication number: 20160301679Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.Type: ApplicationFiled: April 9, 2015Publication date: October 13, 2016Inventors: William Charles Mortimore, JR., Sergio Isaac Koren, Paul Anthony Mason, Alan Vangpat