-
公开(公告)号:US11748320B2
公开(公告)日:2023-09-05
申请号:US17184697
申请日:2021-02-25
Applicant: salesforce.com, inc.
Inventor: Alexandre Hersans , Swaroop Shere , Chenghung Ker , Parth Vijay Vaishnav , Assaf Ben-Gur , Victor Weilin Liu , Daniel McGarry , Samatha Sanikommu
IPC: G06F16/00 , G06F16/215 , G06F21/60 , G06Q30/01 , G06F16/22 , G06F16/23 , G06F16/2458
CPC classification number: G06F16/215 , G06F16/2237 , G06F16/2365 , G06F16/2468 , G06F21/602 , G06Q30/01
Abstract: Disclosed herein are system, method, and computer program product embodiments for detecting duplicates with exact and fuzzy matching on encrypted match indexes using an encryption key in a cloud computing platform. An embodiment operates by determining a match rule index value upon reception of a new record. The embodiment encrypts the match index rule value using the customer's encryption key and a deterministic encryption method and stores the encrypted match rule index value. Duplicate detection may be later performed by using the same deterministic encryption method to determine a cypher text for a candidate entry and comparing the ciphertext to the stored encrypted match indexes.
-
公开(公告)号:US10942906B2
公开(公告)日:2021-03-09
申请号:US16026819
申请日:2018-07-03
Applicant: salesforce.com, inc.
Inventor: Alexandre Hersans , Swaroop Shere , Chenghung Ker , Parth Vijay Vaishnav , Assaf Ben-Gur , Victor Weilin Liu , Daniel McGarry , Samatha Sanikommu
IPC: G06F16/00 , G06F16/215 , G06F21/60 , G06Q30/00 , G06F16/22 , G06F16/23 , G06F16/2458
Abstract: Disclosed herein are system, method, and computer program product embodiments for detecting duplicates with exact and fuzzy matching on encrypted match indexes using an encryption key in a cloud computing platform. An embodiment operates by determining a match rule index value upon reception of a new record. The embodiment encrypts the match index rule value using the customer's encryption key and a deterministic encryption method and stores the encrypted match rule index value. Duplicate detection may be later performed by using the same deterministic encryption method to determine a cypher text for a candidate entry and comparing the ciphertext to the stored encrypted match indexes.
-
公开(公告)号:US10521406B2
公开(公告)日:2019-12-31
申请号:US15282486
申请日:2016-09-30
Applicant: salesforce.com, inc.
Inventor: Parth Vaishnav , Chenghung Ker , Daniel McGarry , Danil Dvinov
IPC: G06F16/215 , G06F16/21 , G06F16/2455 , G06F16/28
Abstract: Some embodiments of the present invention include a method for merging nodes in hierarchies and include receiving, by a database system, a request to merge a first node in a first hierarchy of a plurality of nodes into a second node, the first node in the first hierarchy having child nodes; determining, by the database system, whether the merge request violates each of a plurality of constraints, the plurality of constraints comprising circular dependency of nodes, deleted node and ordering of nodes; and re-parenting, by the database system, in response to a determination that the merge request does not violate each of the plurality of constraints, the child nodes of the first node in the first hierarchy of nodes to the second node in response to the merging of the first node into the second node.
-
公开(公告)号:US20180096003A1
公开(公告)日:2018-04-05
申请号:US15282486
申请日:2016-09-30
Applicant: salesforce.com, inc.
Inventor: Parth VAISHNAV , Chenghung KER , Daniel McGarry , Danil DVINOV
IPC: G06F17/30
CPC classification number: G06F16/215 , G06F16/217 , G06F16/24565 , G06F16/282 , G06F16/289
Abstract: Some embodiments of the present invention include a method for merging nodes in hierarchies and include receiving, by a database system, a request to merge a first node in a first hierarchy of a plurality of nodes into a second node, the first node in the first hierarchy having child nodes; determining, by the database system, whether the merge request violates each of a plurality of constraints, the plurality of constraints comprising circular dependency of nodes, deleted node and ordering of nodes; and re-parenting, by the database system, in response to a determination that the merge request does not violate each of the plurality of constraints, the child nodes of the first node in the first hierarchy of nodes to the second node in response to the merging of the first node into the second node.
-
-
-