-
公开(公告)号:US11429741B2
公开(公告)日:2022-08-30
申请号:US17111705
申请日:2020-12-04
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Joshua David Alexander
Abstract: Techniques are disclosed relating multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system compares the current contextual information with prior contextual information for database requests and then selects a security level from the different security levels. The computer system then initiates verification of a subset of authentication factors corresponding to the selected security level. In some embodiments, the computer system determines, based on the verification, whether to authorize the requested database operation.
-
公开(公告)号:US11216435B2
公开(公告)日:2022-01-04
申请号:US16140428
申请日:2018-09-24
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Yu Chen , Michael Allan Friedman , Yvonne Zhou , Shivan Kaul Sahib
IPC: G06F16/22 , G06F21/62 , G06F16/248 , G06F16/2455
Abstract: At least one database table of denormalized values corresponding to selected values of field properties in records across multiple disparate tables of the database environment is maintained. A structured query is received through a structured query language application program interface (API). The structured query to request a listing of records across the multiple disparate tables of the database environment. The database table is searched for indications corresponding to records across the multiple disparate tables of the database environment corresponding to the selected values indicating communication with a specified party. A listing of records from across the multiple disparate tables that satisfy the selected values is returned through the structured query language API.
-
公开(公告)号:US20210232700A1
公开(公告)日:2021-07-29
申请号:US16752506
申请日:2020-01-24
Applicant: salesforce.com, inc.
Inventor: Shivan Kaul Sahib , Marla Hay , Yvonne Zhou , Yu Chen
IPC: G06F21/62 , G06F16/2455
Abstract: Described are methods and systems for using policies to comply with a person's request for data pertaining to the person, pursuant to applicable data privacy laws. A policy is retrieved responsive to receiving a query that includes data to identify records that store data pertaining to the person. The policy indicates first and second database objects, and respective first and second sets of fields, which store data that pertains to persons. The policy is applied. Applying the policy includes retrieving, as first values, data stored in the first set of fields of a first record associated with the data in the query, and retrieving, as second values, data stored in the second set of fields of a second record associated with the first record. The first and second values, and the names of the fields from which they were retrieved, are stored in a document.
-
公开(公告)号:US11899813B2
公开(公告)日:2024-02-13
申请号:US17808842
申请日:2022-06-24
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Joshua David Alexander
CPC classification number: G06F21/6227 , G06F21/316 , G06F21/34 , G06F2221/2113
Abstract: Techniques are disclosed relating to multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system selects, based on the current contextual information, a security level from the multiple different security levels. In some embodiments, the computer system revokes, based on the selected security level, access privileges of the user for accessing a database corresponding to the database operation request.
-
5.
公开(公告)号:US20200097574A1
公开(公告)日:2020-03-26
申请号:US16140428
申请日:2018-09-24
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Yu Chen , Michael Allan Friedman , Yvonne Zhou , Shivan Kaul Sahib
Abstract: At least one database table of denormalized values corresponding to selected values of field properties in records across multiple disparate tables of the database environment is maintained. A structured query is received through a structured query language application program interface (API). The structured query to request a listing of records across the multiple disparate tables of the database environment. The database table is searched for indications corresponding to records across the multiple disparate tables of the database environment corresponding to the selected values indicating communication with a specified party. A listing of records from across the multiple disparate tables that satisfy the selected values is returned through the structured query language API.
-
公开(公告)号:US20220083551A1
公开(公告)日:2022-03-17
申请号:US17534425
申请日:2021-11-23
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Yvonne Zhou , Yu Chen , Michael Allan Friedman , Shivan Kaul Sahib
IPC: G06F16/2453 , G06F16/2455 , G06F16/23
Abstract: Methods and apparatus for updating a denormalized database object after updating, deleting, or inserting a record in a source database object are described. A first operation on a source database object that involves a record of the source database object being updated, deleted, or inserted is performed. A first part of a corresponding second operation involving a respective record of the denormalized database object being updated, deleted, or inserted is performed. A query result that references an aggregate field of a set of records in the denormalized database object is altered. The altering includes an aggregation operation using values in the query result being performed and altering that part of the query result that includes the aggregate field of the set of records. A second part is optionally performed to complete the corresponding second operation and update the denormalized database object.
-
公开(公告)号:US11227069B2
公开(公告)日:2022-01-18
申请号:US16139619
申请日:2018-09-24
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Michael Allan Friedman , Yvonne Zhou , Shivan Kaul Sahib
IPC: G06F21/62 , H04L29/06 , G06F16/9535
Abstract: An indication of an action is received through and application program interface (API) provided by one or more hardware processing devices. The action corresponds to communication with a specified party. Multiple disparate tables stored in at least one database of a of a database environment associated with the one or more hardware processing devices are searched for records having the field property corresponding to the specified party. The field property from the corresponding multiple disparate tables are evaluated. A unified field property is determined based on the evaluation of the field property from the corresponding multiple disparate tables. The unified field property is returned through the API.
-
公开(公告)号:US11216460B2
公开(公告)日:2022-01-04
申请号:US16411107
申请日:2019-05-13
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Yvonne Zhou , Yu Chen , Michael Allan Friedman , Shivan Kaul Sahib
IPC: G06F16/00 , G06F16/2453 , G06F16/2455 , G06F16/23
Abstract: Methods and apparatus for updating a denormalized database object after updating, deleting, or inserting a record in a source database object are described. A first operation on a source database object that involves a record of the source database object being updated, deleted, or inserted is performed. A first part of a corresponding second operation involving a respective record of the denormalized database object being updated, deleted, or inserted is performed. A query result that references an aggregate field of a set of records in the denormalized database object is altered. The altering includes an aggregation operation using values in the query result being performed and altering that part of the query result that includes the aggregate field of the set of records. A second part is optionally performed to complete the corresponding second operation and update the denormalized database object.
-
公开(公告)号:US20220327231A1
公开(公告)日:2022-10-13
申请号:US17808842
申请日:2022-06-24
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Joshua David Alexander
Abstract: Techniques are disclosed relating to multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system selects, based on the current contextual information, a security level from the multiple different security levels. In some embodiments, the computer system revokes, based on the selected security level, access privileges of the user for accessing a database corresponding to the database operation request.
-
公开(公告)号:US20220179989A1
公开(公告)日:2022-06-09
申请号:US17111705
申请日:2020-12-04
Applicant: salesforce.com, inc.
Inventor: Marla Hay , Joshua David Alexander
Abstract: Techniques are disclosed relating multi-factor authentication for data security. In some embodiments, a computer system receives, from a user device, a database operation request that specifies a set of query data, where the computer system supports multiple different security levels requiring different subsets of a set of authentication factors supported by a known device of a user of the user device. Various devices may determine current contextual information for the database operation request, where the contextual information indicates the set of query data. In some embodiments, the computer system compares the current contextual information with prior contextual information for database requests and then selects a security level from the different security levels. The computer system then initiates verification of a subset of authentication factors corresponding to the selected security level. In some embodiments, the computer system determines, based on the verification, whether to authorize the requested database operation.
-
-
-
-
-
-
-
-
-