-
公开(公告)号:US10764277B2
公开(公告)日:2020-09-01
申请号:US16030706
申请日:2018-07-09
Applicant: salesforce.com, inc.
IPC: H04L29/06
Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
-
公开(公告)号:US11677732B2
公开(公告)日:2023-06-13
申请号:US16875145
申请日:2020-05-15
Applicant: salesforce.com, inc.
Inventor: Josh Alexander , Seth Holloway , Evan Tyler Grim , Ian Glazer , William Charles Mortimore, Jr.
IPC: H04L9/40 , H04W12/062
CPC classification number: H04L63/08 , H04L63/083 , H04L63/0861 , H04W12/062 , H04L2463/082
Abstract: Techniques are disclosed relating to contextual authentication across different applications based on user communications. In some embodiments, a user is preauthenticated to certain actions on a second application based on the user's communication via a first application. The user's communication via a first application provides contextual information that may be used to preauthenticate a request to perform an action on the second application. Contextual information may include the user's communication itself, communications characteristics that are determined from the user's communications, or both. In some embodiments, the degree of preauthentication progressively increases or decreases with the degree of use on the first application; that is, the user is preauthenticated to greater or fewer portions of an authentication procedure, to perform greater or fewer actions, or to perform actions more or less critical to security, as additional information regarding the user's communication on the first application becomes available. In some embodiments, preauthentication may be revoked as additional contextual information becomes available on the first application.
-
13.
公开(公告)号:US10958431B2
公开(公告)日:2021-03-23
申请号:US15993430
申请日:2018-05-30
Applicant: salesforce.com, inc.
Inventor: Matthew Bahrenburg , Alan Vangpat , Anupam Jain , William Charles Mortimore, Jr. , Srinath Krishna Ananthakrishnan , Peter S. Wisnovsky
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for facilitating the authentication of computing system requests across tenants of at least one multi-tenant database system. Authentication is facilitated using a central registry that is accessible by and independent from the tenants of the multi-tenant database system.
-
公开(公告)号:US10680804B2
公开(公告)日:2020-06-09
申请号:US15716677
申请日:2017-09-27
Applicant: salesforce.com, inc.
Inventor: Alexandre Hersans , John Bracken , Assaf Ben Gur , William Charles Mortimore, Jr. , Swaroop Shere
IPC: H04L9/08 , H04L9/14 , G06F12/123 , G06F12/0813
Abstract: Methods, systems, and devices for distributed caching of encrypted encryption keys are described. Some multi-tenant database systems may support encryption of data records. To efficiently handle multiple encryption keys across multiple application servers, the database system may store the encryption keys in a distributed cache accessible by each of the application servers. To securely cache the encryption keys, the database system may encrypt (e.g., wrap) each data encryption key (DEK) using a second encryption key (e.g., a key encryption key (KEK)). The database system may store the DEKs and KEKs in separate caches to further protect the encryption keys. For example, while the encrypted DEKs may be stored in the distributed cache, the KEKs may be stored locally on application servers. The database system may further support “bring your own key” (BYOK) functionality, where a user may upload a tenant secret or tenant-specific encryption key to the database.
-
公开(公告)号:US10536463B2
公开(公告)日:2020-01-14
申请号:US16387270
申请日:2019-04-17
Applicant: salesforce.com, inc.
Abstract: Controlling access to sensitive data can be difficult during an application development effort. A developer may not be authorized to see the data that is to be used by the application. Credentials used in a development environment to access development data can require modification when the application is migrated to a deployed environment. Changing the code in the deployed environment increases risks of change induced incidents. The technology disclosed allows for the creation of a named credential object, where the credentials for different environments are stored, and where the named credential object is called by metadata. This allows the promotion of code from a development environment to a deployed environment without changes to code, and without giving access to sensitive data to the developer.
-
公开(公告)号:US09647922B2
公开(公告)日:2017-05-09
申请号:US14278987
申请日:2014-05-15
Applicant: salesforce.com, inc.
Inventor: William Charles Mortimore, Jr. , George John Murnock, Jr. , Reid A. Elliott , Ture Hoefner , Robert Michael Fitzpatrick , Dileep Burki , Doug Bitting , Erik Jeffrey Nierenberg , Akhilesh Gupta
IPC: G06F15/173 , H04L12/26 , H04L12/24
CPC classification number: H04L43/50 , H04L41/5051
Abstract: Disclosed are methods, apparatus, systems, and computer readable storage media for trials onboarding. A server may receive a request to generate a trial instance of an organization providing data and functionality for a period of time. Data on the request may also be stored. The trial instance may be selected from a template based on an access channel corresponding to the request.
-
-
-
-
-