Transforming plug-in application recipe variables

    公开(公告)号:US10970142B2

    公开(公告)日:2021-04-06

    申请号:US16663011

    申请日:2019-10-24

    Abstract: Techniques for transforming plug-in application recipe (PIAR) variables are disclosed. A PIAR definition identifies a trigger and an action. Trigger variable values, exposed by a first plug-in application, are necessary to evaluate the trigger. Evaluating the trigger involves determining whether a condition is satisfied, based on values of trigger variables. A second plug-in application exposes an interface for carrying out an action. Evaluating the action involves carrying out the action based on input variable values. A user selects, via a graphical user interface of a PIAR management application, a variable for a trigger or action operation and a transformation operation to be applied to the variable. The PIAR management application generates a PIAR definition object defining the trigger, the action, and the transformation operation, and stores the PIAR definition object for evaluation on an ongoing basis.

    RESTRICTING PLUG-IN APPLICATION RECIPES
    2.
    发明申请

    公开(公告)号:US20190005257A1

    公开(公告)日:2019-01-03

    申请号:US15994332

    申请日:2018-05-31

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

    Restricting plug-in application recipes

    公开(公告)号:US10902152B2

    公开(公告)日:2021-01-26

    申请号:US15994332

    申请日:2018-05-31

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

    MANAGING A PLUG-IN APPLICATION RECIPE VIA AN INTERFACE

    公开(公告)号:US20190004879A1

    公开(公告)日:2019-01-03

    申请号:US15994346

    申请日:2018-05-31

    CPC classification number: G06F9/543

    Abstract: Techniques for managing a plug-in application recipe (“PIAR”) are disclosed. A mapping between (a) a user-selected field, selected via a PIAR creation interface, and (b) a third-party application field, exposed by an application programming interface (“API”) of a third-party application, is stored. The third-party application field is associated with a trigger or action of a PIAR. Managing the PIAR in an active state involves periodically receiving and checking data from the third-party application field against a PIAR condition. During or after managing the PIAR in the active state, information is stored to update the mapping to a different mapping. The different mapping maps the user-selected field to a different third-party application field. Without modifying the PIAR, managing the PIAR in the active state then involves periodically receiving and checking data from the different third-party application field against the PIAR condition.

    TRANSFORMING PLUG-IN APPLICATION RECIPE VARIABLES

    公开(公告)号:US20190004877A1

    公开(公告)日:2019-01-03

    申请号:US15994368

    申请日:2018-05-31

    Abstract: Techniques for transforming plug-in application recipe (PIAR) variables are disclosed. A PIAR definition identifies a trigger and an action. Trigger variable values, exposed by a first plug-in application, are necessary to evaluate the trigger. Evaluating the trigger involves determining whether a condition is satisfied, based on values of trigger variables. A second plug-in application exposes an interface for carrying out an action. Evaluating the action involves carrying out the action based on input variable values. A user selects, via a graphical user interface of a PIAR management application, a variable for a trigger or action operation and a transformation operation to be applied to the variable. The PIAR management application generates a PIAR definition object defining the trigger, the action, and the transformation operation, and stores the PIAR definition object for evaluation on an ongoing basis.

    Restricting plug-in application recipes

    公开(公告)号:US11507696B2

    公开(公告)日:2022-11-22

    申请号:US17125096

    申请日:2020-12-17

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

    RESTRICTING PLUG-IN APPLICATION RECIPES

    公开(公告)号:US20210103671A1

    公开(公告)日:2021-04-08

    申请号:US17125096

    申请日:2020-12-17

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

    GOVERNING ACCESS TO THIRD-PARTY APPLICATION PROGRAMMING INTERFACES

    公开(公告)号:US20190286502A1

    公开(公告)日:2019-09-19

    申请号:US16427465

    申请日:2019-05-31

    Abstract: Techniques for governing access to third-party application programming interfaces (API's) are disclosed. A proxy service exposes an API configured to receive requests, from user-facing services, to perform functions of backend services. The proxy service stores a usage policy that defines a criterion that is (a) different from any authorization criterion and (b) associated with using a function of a backend service. The proxy service receives a request to perform the function of the first backend service for a user-facing service and determines that the request does not satisfy the usage policy. Based on determining that the request does not satisfy the usage policy, the proxy service refrains from accessing the backend service to perform the function responsive to the request, and transmits an alert to the user-facing service indicating that the request does not satisfy the usage policy.

    Restricting plug-in application recipes

    公开(公告)号:US12175005B2

    公开(公告)日:2024-12-24

    申请号:US17991180

    申请日:2022-11-21

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

    RESTRICTING PLUG-IN APPLICATION RECIPES

    公开(公告)号:US20230086922A1

    公开(公告)日:2023-03-23

    申请号:US17991180

    申请日:2022-11-21

    Abstract: Techniques for restricting plug-in application recipes (“PIARs”) are disclosed. A PIAR management application receives a PIAR restriction via an authenticated user of the PIAR management application. The PIAR restriction is applicable to certain users of the PIAR management application. The PIAR restriction identifies functionality of the PIAR management application that would otherwise be available to a user of the PIAR management application if the user had an active account for a particular plug-in application that, once linked to that user in the PIAR management application and associated with a particular PIAR, would be capable of supplying at least part of the functionality. The PIAR management application stores the PIAR restriction, including information to block the restricted functionality. Based on the PIAR restriction, the PIAR management application blocks the restricted functionality. Many different types of functionality may be restricted, in various ways.

Patent Agency Ranking