-
公开(公告)号:US20200311637A1
公开(公告)日:2020-10-01
申请号:US16366922
申请日:2019-03-27
Applicant: salesforce.com, inc.
Inventor: Utsavi Benani , Zhidong Ke , Scott W. Bishel , Praveen Innamuri , Kevin Terusaki , Shan-Cheng Ho
Abstract: Described is a method and system for verifying the end-to-end distribution of messages within an on-demand services platform. To provide the ability to monitor and trace such messages, the system may include a specialized and queryable datastore (or database) that allows the system to track the distribution and acknowledgement of messages throughout the services platform. Accordingly, a specialized verification process may be initiated to query the database to verify the receipt of a message has been acknowledged by various components within the system. In addition, the verification process may automatically retry the distribution the messages to ensure particular downstream components have received the message. Accordingly, the system alleviates the need to manual re-crawl various message source to ensure the end-to-end distribution of such messages.
-
公开(公告)号:US20220345458A1
公开(公告)日:2022-10-27
申请号:US17238180
申请日:2021-04-22
Applicant: salesforce.com, inc.
Inventor: Jayanth Parayil Kumarji , Priyadarshini Mitra , Kevin Terusaki , Zhidong Ke , Yifeng Liu , Utsavi Benani , Heng Zhang , Evan Jiang , Birva Joshi , Yogesh Patel
IPC: H04L29/06
Abstract: Various techniques and mechanisms for sharing remote resources among a trusted group are disclosed. A credential management agent utilizes a resource credential for a first user to access a secure resource corresponding to the first user for a second user by at least validating a second user and validating a consent of the first user to allow the second user to access the secure resource using the resource credential for the first user. The secure resource resides on a remote server system accessible via one or more application program interfaces (APIs). A platform management agent provides an interface for shared resource-agnostic credential sharing. The platform management agent validates credentials for the second user as belonging to a trusted group and forwards a request for access to the secure resource for the second user to the credential management agent. In response to receiving the resource credential for the first user to access the secure resource, the platform management agent accesses the secure resource on behalf of the second user to allow the second user to utilize the secure resource.
-
3.
公开(公告)号:US20220012214A1
公开(公告)日:2022-01-13
申请号:US16922986
申请日:2020-07-07
Applicant: salesforce.com, inc.
Inventor: Zhidong Ke , Kevin Terusaki , Yifeng Liu , Utsavi Benani , Heng Zhang , Aaron Zhang , Shreedhar Sundaram , Mahalaxmi Sanathkumar
IPC: G06F16/18 , G06F16/174 , G06F16/17 , G06F16/176 , G06F16/22 , G06F11/07
Abstract: Techniques and mechanisms for incremental data ingestion are disclosed. Raw data is received from multiple disparate sources to be consumed in an environment for collecting unformatted raw data. The environment has at least a delta data table and a delta notification table. A write to an entry in the delta data table is attempted. Entries to the delta data table specify at least records indicating changes to objects in the environment. A write a corresponding entry to the delta notification table is attempted in response to a successful write attempt to the delta data table. The delta notification table entry includes information about delta data table entries for a specified period. At least one data consumer is notified that the delta data table has been modified.
-
公开(公告)号:US11488082B2
公开(公告)日:2022-11-01
申请号:US16366922
申请日:2019-03-27
Applicant: salesforce.com, inc.
Inventor: Utsavi Benani , Zhidong Ke , Scott W. Bishel , Praveen Innamuri , Kevin Terusaki , Shan-Cheng Ho
Abstract: Described is a method and system for verifying the end-to-end distribution of messages within an on-demand services platform. To provide the ability to monitor and trace such messages, the system may include a specialized and queryable datastore (or database) that allows the system to track the distribution and acknowledgement of messages throughout the services platform. Accordingly, a specialized verification process may be initiated to query the database to verify the receipt of a message has been acknowledged by various components within the system. In addition, the verification process may automatically retry the distribution the messages to ensure particular downstream components have received the message. Accordingly, the system alleviates the need to manual re-crawl various message source to ensure the end-to-end distribution of such messages.
-
5.
公开(公告)号:US20220092048A1
公开(公告)日:2022-03-24
申请号:US17026061
申请日:2020-09-18
Applicant: Salesforce.com, inc.
Inventor: Zhidong Ke , Yifeng Liu , Heng Zhang , Utsavi Benani , Kevin Terusaki , Priyadarshini Mitra
IPC: G06F16/22 , G06F16/28 , G06F16/2457 , G06F16/23 , G06F16/27
Abstract: Architectures and techniques to provide an extract-once framework for data ingestion into a data lake. A data consumption job to ingest data to multiple tables within a data collection platform is started. Checkpoint metadata corresponding to the data consumption job is retrieved from a checkpoint metadata store. A subset of processes from the data consumption job are performed. Checkpoint metadata is updated in response to completion of the subset of processes. A subsequent subset of processes from the data consumption job is performed. Checkpoint metadata is updated in response to completion of each of the at least one subsequent subset of processes from the data consumption job. Batch metadata is updated in response to completion of the data consumption job.
-
6.
公开(公告)号:US20200250007A1
公开(公告)日:2020-08-06
申请号:US16264399
申请日:2019-01-31
Applicant: salesforce.com, inc.
Inventor: Zhidong Ke , Kevin Terusaki , Praveen Innamuri , Narek Asadorian
IPC: G06F9/50 , G06F16/174 , G06F9/52
Abstract: Described is a system and method for compacting data into customized (e.g. optimal) file sizes for processing by computing resources. The mechanism may leverage various computing resources such as a cluster computing frameworks combined with a stream processing platform to efficiently process the activity data. For example, activity data of an organization may be processed by a set of jobs (or sub-jobs) as part of a data stream by a set of distributed computing resources. In order to efficiently process such data, the mechanism may compact the data into customized (e.g. optimal) file sizes. For example, the customized file sizes may provide an optimal (or near optimal) amount of data to be processed by each job, for example, to improve performance.
-
7.
公开(公告)号:US11526528B2
公开(公告)日:2022-12-13
申请号:US16922989
申请日:2020-07-07
Applicant: salesforce.com, inc.
Inventor: Zhidong Ke , Kevin Terusaki , Yifeng Liu , Utsavi Benani , Heng Zhang
Abstract: Techniques and mechanisms for ingesting data through an atomic transaction are disclosed. Raw data is received from multiple disparate sources to be consumed in an environment that does not support atomic write operations to data consumers. The environment has at least a data table and a notification table. A write to an entry in the data table having an associated version is attempted. The data table entry corresponds to the data to be consumed. A write to a corresponding entry to the notification table is attempted in response to a successful write attempt to the data table. The notification table entry includes information about the corresponding data table entry. The version associated with the data table is modified in response to successful writes of both the data table entry and the notification table entry. At least one data consumer is notified that the data table version has been modified.
-
公开(公告)号:US20220237172A1
公开(公告)日:2022-07-28
申请号:US17156442
申请日:2021-01-22
Applicant: salesforce.com, inc.
Inventor: Heng Zhang , Kevin Terusaki , Zhidong Ke , Utsavi Benani , Mugdha Choudhari
Abstract: Techniques and mechanisms to manage deletions from data tables are disclosed. A request to delete data from at least one data table in an environment having tables storing data from multiple disparate sources is received. The environment can also have a delete request status table and a notification table. Processing of the delete request is managed utilizing a multi-stage workflow where stages of the multistage workflow are tracked by updating entries to the delete request status table. Completion of the delete request is verified by checking at least one entry in the delete request status table corresponding to the delete request. A corresponding entry is written to the notification table in response to a successful verified completion of the delete request.
-
公开(公告)号:US11061734B2
公开(公告)日:2021-07-13
申请号:US16264399
申请日:2019-01-31
Applicant: salesforce.com, inc.
Inventor: Zhidong Ke , Kevin Terusaki , Praveen Innamuri , Narek Asadorian
IPC: G06F9/50 , G06F9/52 , G06F16/174
Abstract: Described is a system and method for compacting data into customized (e.g. optimal) file sizes for processing by computing resources. The mechanism may leverage various computing resources such as a cluster computing frameworks combined with a stream processing platform to efficiently process the activity data. For example, activity data of an organization may be processed by a set of jobs (or sub-jobs) as part of a data stream by a set of distributed computing resources. In order to efficiently process such data, the mechanism may compact the data into customized (e.g. optimal) file sizes. For example, the customized file sizes may provide an optimal (or near optimal) amount of data to be processed by each job, for example, to improve performance.
-
公开(公告)号:US20230179413A1
公开(公告)日:2023-06-08
申请号:US17457386
申请日:2021-12-02
Applicant: salesforce.com, inc.
Inventor: Jayanth Parayil Kumarji , Mugdha Choudhari , Percy Mehta , Rajkumar Pellakuru , Kevin Terusaki
CPC classification number: H04L9/0891 , H04L9/0894 , H04L9/14
Abstract: A system and method for rotating private encryption keys for tenants of a database system has been developed. First, three separate public-private encryption keys are generated for a tenant of the database system. The three separate private encryption keys for the tenant are then stored in cloud-based storage. A defined cadence is created to rotate the private encryption keys for the tenant. The three separate private encryption keys for the tenant are defined as a a past private key, a present private key and a future private key. Next, the public encryption key is stored for the tenant in a global tenant directory. The present private key and the public encryption key are retrieved to encrypt and decrypt data from the tenant. The three separate private encryption keys are rotated at the defined cadence, where the past private key is discarded, the present private key becomes a new past private key, the future private key becomes a new present private key, and a new future private key is generated. The new past private key, the new present private key and the new future private key for the tenant are then stored in cloud-based storage.
-
-
-
-
-
-
-
-
-