-
公开(公告)号:US10558634B2
公开(公告)日:2020-02-11
申请号:US15257216
申请日:2016-09-06
Applicant: salesforce.com, inc.
Inventor: Matthew Fuchs
Abstract: A system receives an association of first item with first system user, generates first hash value by applying first hash function associated with first system user to first item identifier associated with first item, and sets a bit corresponding to first hash value in array. The system receives an association of second item with second system user, generates second hash value by applying second hash function associated with second user to second item identifier associated with second item, and sets a bit corresponding to second hash value in array. The system receives a request to determine whether third item is associated with first system user, generates third hash value by applying first hash function to third item identifier associated with third item, and outputs message that third item is not associated with first user if a bit corresponding to third hash value is not set in array.
-
公开(公告)号:US20200019630A1
公开(公告)日:2020-01-16
申请号:US16036755
申请日:2018-07-16
Applicant: salesforce.com, inc.
Inventor: Yu Wu , Guillaume Le Stum , Srikara Rao
Abstract: Embodiments of the present disclosure relate to combining database records using stream processing and inverted indexing. Other embodiments may be described and/or claimed.
-
公开(公告)号:US10536439B2
公开(公告)日:2020-01-14
申请号:US15589220
申请日:2017-05-08
Applicant: salesforce.com, inc.
Inventor: John Brooke Althouse , Jeffrey S. Atkinson , Joshua Atkins
Abstract: Client fingerprints can be used to detect and defend against malware and hacking into information systems more effectively than using IP addresses. A unique client fingerprint can be based on data found in the client's SSL client hello packet. SSL version, cipher suites, and other fields of the packet can be utilized, preferably utilizing individual field values in the order in which they appear in the packet. The ordered values are converted to decimal values, separated by delimiters, and concatenated to form an identifier string. The identifier string may be mapped, preferably by a hash function, to form the client fingerprint. The client fingerprint may be logged, and whitelists and blacklists may be formed using client fingerprints so formed.
-
公开(公告)号:US10514951B2
公开(公告)日:2019-12-24
申请号:US15587161
申请日:2017-05-04
Applicant: salesforce.com, inc.
Inventor: Armin Bahramshahry , Piranavan Selvanandan
Abstract: In accordance with disclosed embodiments, there are provided systems, methods, and apparatuses for implementing a stateless, deterministic scheduler and work discovery system with interruption recovery. For instance, according to one embodiment, there is disclosed a system to implement a stateless scheduler service, in which the system includes: a processor and a memory to execute instructions at the system; a compute resource discovery engine to identify one or more computing resources available to execute workload tasks; a workload discovery engine to identify a plurality of workload tasks to be scheduled for execution; a local cache to store information on behalf of the compute resource discovery engine and the workload discovery engine; a scheduler to request information from the local cache specifying the one or more computing resources available to execute workload tasks and the plurality of workload tasks to be scheduled for execution; and further in which the scheduler is to schedule at least a portion of the plurality of workload tasks for execution via the one or more computing resources based on the information requested. Other related embodiments are disclosed.
-
公开(公告)号:USD870145S1
公开(公告)日:2019-12-17
申请号:US29681376
申请日:2019-02-25
Applicant: salesforce.com, inc.
Designer: Sheila Christian , Stephen Coyner , Adrian Dieter Rapp
-
公开(公告)号:US10511564B2
公开(公告)日:2019-12-17
申请号:US15411513
申请日:2017-01-20
Applicant: salesforce.com, inc.
Inventor: Shailesh Govande
Abstract: This disclosure provides various techniques that may allow for user availability aware communication. For example, a first user may desire to send an electronic message to a second user, but may not have a way to intelligently select a messaging service to use. This disclosure provides, in one example of user availability aware messaging, that a particular messaging service may be selected based on activity information regarding the second user's activity on one or more messaging services. The electronic message may be sent to the second user via the particular messaging service.
-
公开(公告)号:US10481996B2
公开(公告)日:2019-11-19
申请号:US16271210
申请日:2019-02-08
Applicant: Salesforce.com, Inc.
Inventor: Sergey Gorbaty
Abstract: Computer program, methods, and systems for code modification of a programming language platform and a software application in an intermediate language at different times are disclosed. The methods and system may modify a portion of the programming language platform in the intermediate language at a first time to alter a functionality of or add a new functionality to the programming language platform; and may modify the software application in the intermediate language at a second time different from the first time, where the software application may be modified based on a runtime analysis rule that uses the altered or added new functionality of the programming language platform. The modified programming language platform may be included in a first package, and the modified software application may be included in a second package, and executed on the modified programming language platform.
-
公开(公告)号:US10476855B1
公开(公告)日:2019-11-12
申请号:US15689098
申请日:2017-08-29
Applicant: salesforce.com, inc.
Inventor: Prasad Peddada , Taher Elgamal
Abstract: Systems and methods for identify confirmation and transaction security are described. The system generates a challenge. The system transmits to a client computing system an encrypted challenge generated using the challenge and a public key of an asymmetric key pair to a client computing system. The system fragments a private key of the asymmetric key pair into a first, second and third private key fragments. The system generates a first partially decrypted challenge using the first private key fragment and the encrypted challenge. The system receives a second and a third partially decrypted challenges from the client computing system. The system generates a decrypted challenge using the first, second and third partially decrypted challenges. The system compares the decrypted challenge and the challenge for identity verification.
-
619.
公开(公告)号:US10474492B2
公开(公告)日:2019-11-12
申请号:US15365772
申请日:2016-11-30
Applicant: salesforce.com, inc.
Inventor: Pallav Kothari , Phillip Oliver Metting van Rijn
Abstract: In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine.
-
620.
公开(公告)号:US10469438B2
公开(公告)日:2019-11-05
申请号:US15443840
申请日:2017-02-27
Applicant: salesforce.com, inc.
Inventor: Tarang Luthra
IPC: G06F15/16 , H04L12/58 , G06F16/93 , G06F3/0486 , H04L12/18
Abstract: Disclosed are some implementations of systems, apparatus, methods and computer program products for integrating a collaborative communication system and a document collaboration system. A document within the document collaboration system may be linked to an object within the collaborative communication system. A user post may be received in association with the object or the document. A first feed configured to be rendered in association with the object is synchronized with a second feed configured to be rendered in association with the document such that both the first feed and the second feed each includes the user post.
-
-
-
-
-
-
-
-
-