-
公开(公告)号:USD870145S1
公开(公告)日:2019-12-17
申请号:US29681376
申请日:2019-02-25
Applicant: salesforce.com, inc.
Designer: Sheila Christian , Stephen Coyner , Adrian Dieter Rapp
-
公开(公告)号:US10511564B2
公开(公告)日:2019-12-17
申请号:US15411513
申请日:2017-01-20
Applicant: salesforce.com, inc.
Inventor: Shailesh Govande
Abstract: This disclosure provides various techniques that may allow for user availability aware communication. For example, a first user may desire to send an electronic message to a second user, but may not have a way to intelligently select a messaging service to use. This disclosure provides, in one example of user availability aware messaging, that a particular messaging service may be selected based on activity information regarding the second user's activity on one or more messaging services. The electronic message may be sent to the second user via the particular messaging service.
-
公开(公告)号:US20190370727A1
公开(公告)日:2019-12-05
申请号:US16542070
申请日:2019-08-15
Applicant: salesforce.com, inc.
Inventor: Jason Winters
IPC: G06Q10/06
Abstract: In accordance with embodiments, there are provided mechanisms and methods for managing business deals. The mechanisms and methods for managing business deals may enable embodiments to provide a dynamic and interactive user-interface including any combination of contacts, accounts, opportunities, allowing users to create tasks, events, leads (e.g., from Data.com), reports, dashboards, instant messenger, external deal spaces, email service (e.g., Outlook), a cloud-based productivity suite for businesses that allows work on any device (e.g., Google apps), mobile access, private messaging, lead management, mass email templates, social media monitoring (e.g., from Radian6), role-based sharing and security, and/or additional storage, for example. In an embodiment, the number of contacts may be unlimited.
-
754.
公开(公告)号:US20190354719A1
公开(公告)日:2019-11-21
申请号:US16530937
申请日:2019-08-02
Applicant: salesforce.com, inc.
Inventor: Olumayokun Obembe , Gregory Lapouchnian , Vijayanth Devadhar , Jason Woods , Karthikeyan Govindarajan , Ashwini Bijwe , Prasad Peddada
Abstract: Within one or more instances of a computing environment where an instance is a self-contained architecture to provide at least one database with corresponding search and file system. User information from the one or more instances of the computing environment is organized as zones. A zone is based on one or more characteristics of corresponding user information that are different than the instance to which the user information belongs. User information is selectively obfuscated prior to transmitting blocks of data including the obfuscated user information. The selective obfuscation is based on zone information for one or more zones to which the user information belongs.
-
公开(公告)号:US10481996B2
公开(公告)日:2019-11-19
申请号:US16271210
申请日:2019-02-08
Applicant: Salesforce.com, Inc.
Inventor: Sergey Gorbaty
Abstract: Computer program, methods, and systems for code modification of a programming language platform and a software application in an intermediate language at different times are disclosed. The methods and system may modify a portion of the programming language platform in the intermediate language at a first time to alter a functionality of or add a new functionality to the programming language platform; and may modify the software application in the intermediate language at a second time different from the first time, where the software application may be modified based on a runtime analysis rule that uses the altered or added new functionality of the programming language platform. The modified programming language platform may be included in a first package, and the modified software application may be included in a second package, and executed on the modified programming language platform.
-
公开(公告)号:US10476855B1
公开(公告)日:2019-11-12
申请号:US15689098
申请日:2017-08-29
Applicant: salesforce.com, inc.
Inventor: Prasad Peddada , Taher Elgamal
Abstract: Systems and methods for identify confirmation and transaction security are described. The system generates a challenge. The system transmits to a client computing system an encrypted challenge generated using the challenge and a public key of an asymmetric key pair to a client computing system. The system fragments a private key of the asymmetric key pair into a first, second and third private key fragments. The system generates a first partially decrypted challenge using the first private key fragment and the encrypted challenge. The system receives a second and a third partially decrypted challenges from the client computing system. The system generates a decrypted challenge using the first, second and third partially decrypted challenges. The system compares the decrypted challenge and the challenge for identity verification.
-
757.
公开(公告)号:US10474492B2
公开(公告)日:2019-11-12
申请号:US15365772
申请日:2016-11-30
Applicant: salesforce.com, inc.
Inventor: Pallav Kothari , Phillip Oliver Metting van Rijn
Abstract: In accordance with embodiments disclosed herein, there are provided mechanisms and methods for automating deployment of applications in a multi-tenant database environment. For example, in one embodiment, mechanisms include managing a plurality of machines operating as a machine farm within a datacenter by executing an agent provisioning script at a control hub, instructing the plurality of machines to download and instantiate a lightweight agent; pushing a plurality of URL (Uniform Resource Locator) references from the control hub to the instantiated lightweight agent on each of the plurality of machines specifying one or more applications to be provisioned and one or more dependencies for each of the applications; and loading, via the lightweight agent at each of the plurality of machines, the one or more applications and the one or more dependencies for each of the one or more applications into memory of each respective machine.
-
公开(公告)号:US20190342088A1
公开(公告)日:2019-11-07
申请号:US16051403
申请日:2018-07-31
Applicant: salesforce.com, inc.
Inventor: William C. EIDSON , David HACKER , Yu CHEN , Michael Goldberg BOILEN , Shakti Prakash DAS
Abstract: A method and apparatus for tokenization of user-traceable data are described. User traceable data is data that is not directly personal data but can be traced back to the identity or an activity of the user. A first raw value is encrypted into a first token using a symmetric key encryption mechanism based on a combination of a second raw value including personal data of a user and a second token resulting from the tokenization of the second raw value where the first token is an anonymized representation of the first raw value.
-
公开(公告)号:US20190340388A1
公开(公告)日:2019-11-07
申请号:US16051414
申请日:2018-07-31
Applicant: Salesforce.com, inc.
Inventor: William C. EIDSON , David HACKER , Yu CHEN , Hui Fung Herman KWONG , Wolfgang KRAUSE
Abstract: A method and a system for enabling multiple log record consumers to comply with regulations and requirements regarding privacy and handling of data are described. A determination, based on a log record format being of a first of the log record types, that a first field from a raw log record is to be tokenized based on a first tokenization strategy of multiple tokenization strategies in the first log record type, is performed. Each one of the tokenization strategies identifies a tokenization mechanism from tokenization mechanisms for generating a token from a raw value to enable compliance with a set of regulations and requirements regarding privacy and the handling of data. For a first raw value in the first field a first token is generated that is an anonymized representation of the first raw value using a tokenization mechanism identified by the first tokenization strategy in the log record type.
-
公开(公告)号:US20190340178A1
公开(公告)日:2019-11-07
申请号:US16513262
申请日:2019-07-16
Applicant: salesforce.com, inc.
Inventor: Kevin Venkiteswaran , Marcus Torres
IPC: G06F16/2455
Abstract: Disclosed are examples of systems, apparatus, methods, and computer program products for accessing and displaying shared data. In some implementations, a shared cache can be maintained. A first component and a second component can be identified. A shared record can be identified as associated with the first component and the second component. It can be determined that the shared record is valid. Shared record data from the shared record can be displayed through the first component and the second component in a user interface.
-
-
-
-
-
-
-
-
-