Mobile app publishing for a responsive community experience

    公开(公告)号:US11243753B2

    公开(公告)日:2022-02-08

    申请号:US16177813

    申请日:2018-11-01

    Abstract: Embodiments of apparatus, systems, and methods are described for creating and configuring a custom mobile application (app), with communities, using a graphical user interface (GUI). The GUI enables selection of a pre-configured template for creating a custom mobile app for a user group of a customer relationship management system or of an existing community. The GUI enables entry of metadata comprising identification of a specific user community of the custom mobile app. The GUI enables selection of a distribution model for the custom mobile app for the specific user community, further allowing entry of additional metadata comprising distribution model parameters and packaging parameters of the app. The GUI enables packaging of the app using the packaging parameters and publishing of the app to an app store using the distribution model parameters. The app becomes accessible from the app store for installation on a mobile device according to the distribution model.

    Validation and governance of a cloud computing platform based datacenter

    公开(公告)号:US11240107B1

    公开(公告)日:2022-02-01

    申请号:US17092012

    申请日:2020-11-06

    Abstract: A system receives one or more modifications to a platform-independent declarative specification from a set of data center entity owner teams to generate a modified platform-independent declarative specification that captures various aspects for deploying a data center on a target cloud platform. The system performs end-to-end validation of the modifications in multiple phases, starting with validating the modifications based on a set of predefined rules associated with the modified platform-independent declarative specification. When all the multiple phases of validation indicate success, the system a notification of end-to-end validation success in association with the received changes. Each request to modify a data center entity in the platform-independent declarative specification undergoes governance checks to ensure that the approver of the request belongs to a predefined set of owners associated with the data center entity.

    Runtime detector for data corruptions

    公开(公告)号:US11238017B2

    公开(公告)日:2022-02-01

    申请号:US15884165

    申请日:2018-01-30

    Abstract: In a multitenant data platform architecture, one or more supporting data tables are used to efficiently retrieve data responsive to data retrieval requests. Programmatic code markers associated with contextual data about a data transaction thread are identified. The contextual data is examined using the one or more programmatic code markers invoked by the database in the data transaction thread at runtime. Based on the contextual data returning an indication of a data corruption in one or more supporting data structures, an action associated with the data transaction thread is performed. A log of data corruptions and corresponding call stack trace data may be generated. The data transaction thread may be allowed to continue to execute statements that modify data tables, or the data transaction thread may be terminated.

    Application infrastructure configuration based on annotated API schemas

    公开(公告)号:US11237889B1

    公开(公告)日:2022-02-01

    申请号:US17144920

    申请日:2021-01-08

    Inventor: Billy Ma

    Abstract: An infrastructure management system automatically determines a configuration of infrastructure services for the execution of applications that best satisfies predefined target criteria based on receiving annotated application programming interface (API) schemas associated with the applications. The system extracts information from customized annotations in a received API schema, sets up an API gateway with an existing configuration of infrastructure services, and logs requests received at this existing configuration via the gateway. The system generates a set of alternate configurations based on the extracted information, simulates execution of a set of logged requests to determine a set of valid configurations, and subsequently selects a new configuration that satisfies threshold predefined target criteria. The system may update the existing configuration to the new configuration without interrupting application services.

    Systems, methods, and apparatuses for implementing a scheduler and workload manager that identifies and consumes global virtual resources

    公开(公告)号:US11237865B2

    公开(公告)日:2022-02-01

    申请号:US16528613

    申请日:2019-07-31

    Abstract: In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing a stateless, deterministic scheduler and work discovery system with interruption recovery. For instance, according to one embodiment, there is disclosed a system to implement a stateless scheduler service, in which the system includes: a processor and a memory to execute instructions at the system; a compute resource discovery engine to identify one or more computing resources available to execute workload tasks; a workload discovery engine to identify a plurality of workload tasks to be scheduled for execution; a cache to store information on behalf of the compute resource discovery engine and the workload discovery engine; a scheduler to request information from the cache specifying the one or more computing resources available to execute workload tasks and the plurality of workload tasks to be scheduled for execution; and further in which the scheduler is to schedule at least a portion of the plurality of workload tasks for execution via the one or more computing resources based on the information requested. Other related embodiments are disclosed.

    AUTHENTICATION USING KEY AGREEMENT
    328.
    发明申请

    公开(公告)号:US20220029796A1

    公开(公告)日:2022-01-27

    申请号:US16938632

    申请日:2020-07-24

    Abstract: A client may transmit an authentication request to a server. the server may initiate a key agreement process using a short-lived private key generated at the server and a public key of the device, generate a shared secret, and derive a symmetric key. The symmetric key may be used to encrypt a random challenge. Further, the server initiates a key agreement process for the client using the partial private key that was generated for the client and the short-lived public key generated at the server. A partial key agreement result and the encrypted random challenge may be transmitted to the client. The client may complete the key agreement process using the partial key agreement result and a respective portion of the private key. The client may derive the encryption key and decrypt the random challenge. An indication of the random challenge may be transmitted to the server, which authenticates the client.

    DISCOVERY AND RECOMMENDATION OF ONLINE LEARNING RESOURCES

    公开(公告)号:US20220027562A1

    公开(公告)日:2022-01-27

    申请号:US16935149

    申请日:2020-07-21

    Abstract: A system models web content including learning resources available on a website, and makes suggestions of potentially useful learning resources when a user highlights text of interest within the website. In order to facilitate these suggestions, a neural network-based system is trained on learning resources and other content available on the website to create a common word embedding for learning resources and other website text. A student model may then be created to facilitate real time or near real time suggestions of relevant learning resources in response to selections of text from the website.

    SECURING DATA USING KEY AGREEMENT
    330.
    发明申请

    公开(公告)号:US20220021524A1

    公开(公告)日:2022-01-20

    申请号:US16931210

    申请日:2020-07-16

    Abstract: Methods and systems for securing customer data in a multi-tenant database environment are described. A key identifier received from a security server may be stored by an application server. The key identifier may be associated with a private key that is accessible by the security server and not accessible by the application server. A request to derive a symmetric key may be transmitted from the application server to the security server, the request including a public key generated by the application server, a salt value, and the key identifier. The symmetric key may then be derived based on the transmitted public key and the private key using a key derivation function. The application server may then receive and store the symmetric key in an in-memory cache, and be used to securely encrypt data received by the application server from client devices.

Patent Agency Ranking