Distributed key caching for encrypted keys

    公开(公告)号:US11700112B2

    公开(公告)日:2023-07-11

    申请号:US16863402

    申请日:2020-04-30

    Abstract: Methods, systems, and devices for distributed caching of encrypted encryption keys are described. Some multi-tenant database systems may support encryption of data records. To efficiently handle multiple encryption keys across multiple application servers, the database system may store the encryption keys in a distributed cache accessible by each of the application servers. To securely cache the encryption keys, the database system may encrypt (e.g., wrap) each data encryption key (DEK) using a second encryption key (e.g., a key encryption key (KEK)). The database system may store the DEKs and KEKs in separate caches to further protect the encryption keys. For example, while the encrypted DEKs may be stored in the distributed cache, the KEKs may be stored locally on application servers. The database system may further support “bring your own key” (BYOK) functionality, where a user may upload a tenant secret or tenant-specific encryption key to the database.

    Advertisement distribution system, method and computer program product using a multi-tenant on-demand database system

    公开(公告)号:US11694220B2

    公开(公告)日:2023-07-04

    申请号:US17215673

    申请日:2021-03-29

    CPC classification number: G06Q30/0241

    Abstract: In accordance with embodiments, there are provided mechanisms and methods for advertisement distribution using a multi-tenant on-demand database system. These mechanisms and methods for distributing advertisements using a multi-tenant on-demand database system can integrate an advertisement distribution service with the services provided by the multi-tenant on-demand database system. The ability to provide an advertisement distribution service with the services provided by the multi-tenant on-demand database system can enable the distribution of advertisements to take advantage of other data stored by and/or services provided by the multi-tenant on-demand database system.

    UPGRADING A TARGET SYSTEM IN A CONTINUOUS INTEGRATION SYSTEM

    公开(公告)号:US20230205510A1

    公开(公告)日:2023-06-29

    申请号:US17565227

    申请日:2021-12-29

    CPC classification number: G06F8/65 G06F8/71 G06F8/61

    Abstract: In an example, an apparatus may operate as a continuous delivery (CD) pipeline for application artifacts running on a target software platform. The apparatus may include a processor to operate an application upgrader for the target software platform, the application upgrader to: consume application artifacts from a continuous integration (CI) system, wherein the target software platform runs a version of the application artifacts; obtain a signed manifest output from the CI system, the signed manifest identifying the consumed application artifacts; and compare a signature of the application artifacts from the CI system to a signature of the version running on the target software platform to determine if an update of the version running on the target software platform is required. Other embodiments may be disclosed and/or claimed.

    Display screen or portion thereof with animated graphical user interface

    公开(公告)号:USD990496S1

    公开(公告)日:2023-06-27

    申请号:US29803588

    申请日:2021-08-13

    Abstract: FIG. 1 is a front view of a display screen or portion thereof with animated graphical user interface showing a first image of the claimed design;
    FIG. 2 is a second image thereof; and,
    FIG. 3 is a third image thereof.
    The outermost broken lines in the figures show a display screen or portion thereof, and form no part of the claimed design. The other broken lines in the figures show portions of the animated graphical user interface that form no part of the claimed design.
    The appearance of the animated image sequentially transitions between the images shown in FIGS. 1-3. The process or period in which one image transitions to another forms no part of the claimed design.

    Centralized storage for search servers

    公开(公告)号:US11687533B2

    公开(公告)日:2023-06-27

    申请号:US17255328

    申请日:2018-06-22

    Inventor: Ilan Ginzburg

    CPC classification number: G06F16/2455 G06F16/2272 G06F16/27

    Abstract: Techniques are disclosed relating to servicing search requests based on index information stored in a storage shared between multiple search servers. In some embodiments, a first search server maintains a local cache including index information usable to service received search requests and synchronizes the local cache with the shared storage. The synchronizing includes retrieving, from the shared storage, metadata indicative of the index information in the shared storage and determining, based on the metadata, whether the index information in the local cache differs from the shared storage. In response to determining that the index information in the local cache differs from the index information in the shared storage, the first search server updates the index information in the local cache with the index information in the shared storage. The first search server may then provide one or more search results determined using the updated index information.

    MULTI-TENANT CRYPTOGRAPHY IMPLEMENTATION COMPLIANCE

    公开(公告)号:US20230195905A1

    公开(公告)日:2023-06-22

    申请号:US17645251

    申请日:2021-12-20

    CPC classification number: G06F21/602 G06F21/57 G06F9/45558 G06F2009/45587

    Abstract: Methods, systems, apparatuses, devices, and computer program products are described. A virtual machine may receive, from an application associated with a tenant, a request to perform a cryptographic operation for the application at the virtual machine. Based on receiving the request, the virtual machine may determine that the tenant is limited to using a designated set of cryptographic operations in accordance with a cryptographic operation validation policy associated with the tenant. In some examples, the virtual machine may identify a designated version of the cryptographic operation, from the designated set of cryptographic operations, that corresponds to the cryptographic operation indicated by the request in satisfaction of the cryptographic operation validation policy. The virtual machine may execute the designated version of the cryptographic operation and return a result of the execution to the application.

Patent Agency Ranking