-
公开(公告)号:US20230063160A1
公开(公告)日:2023-03-02
申请号:US17461894
申请日:2021-08-30
Applicant: salesforce.com, inc.
Inventor: Kirkland Spector , Philip Issler, JR. , Barkha Keni , Paul Anthony Mason , Alexander Victor Edelstein , Brian Jaffery Tajuddin
Abstract: A system and method for automated application programming interface (API) importation that includes receiving a selection of at least one API provider service of a set of API provider services with API integration support for a platform, retrieving a listing of APIs provided by the selected at least one API provider service, receiving a selection of at least one API from the listing of APIs, and enabling the selected at least one API for a user of the platform, in response to the selection of the at least one API.
-
公开(公告)号:US11089019B2
公开(公告)日:2021-08-10
申请号:US15365393
申请日:2016-11-30
Applicant: salesforce.com, inc.
Inventor: Paul Anthony Mason
IPC: H04L29/06
Abstract: Techniques for session security. Information corresponding to an electronic device used to access a resource is gathered. The information uniquely identifies the electronic device. Subsequent accesses to the resource during the session are monitored to determine whether changes occur to the information. A security action is taken in response to a change in the information.
-
公开(公告)号:US10764277B2
公开(公告)日:2020-09-01
申请号:US16030706
申请日:2018-07-09
Applicant: salesforce.com, inc.
IPC: H04L29/06
Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
-
公开(公告)号:US10021089B2
公开(公告)日:2018-07-10
申请号:US14682324
申请日:2015-04-09
Applicant: salesforce.com, inc.
IPC: H04L29/06
CPC classification number: H04L63/083 , H04L63/0838 , H04L63/102 , H04L2463/082
Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
-
公开(公告)号:US20170126719A1
公开(公告)日:2017-05-04
申请号:US14928340
申请日:2015-10-30
Applicant: salesforce.com, inc.
Inventor: Paul Anthony Mason
CPC classification number: H04L63/1425 , G06F17/2247 , G06F17/227 , G06F21/00 , G06F21/566 , H04L63/145 , H04L63/1483 , H04L67/02 , H04L67/42
Abstract: Techniques are disclosed relating to limiting malicious-code analysis of webpage content. In one embodiment, a computing system receives a webpage requested by a client device. The computing system randomly alters content of the webpage to limit analysis of the content by malicious code such that the altering does not affect how the webpage is displayed by the client device. The computing system may then serve the webpage with the altered content to the client device. In some embodiments, the altering includes searching the webpage for an HTML element that specifies a plurality of attributes in a particular ordering and rearranging the plurality of attributes to have a new ordering different from the particular ordering. In some embodiments, the altering includes parsing the webpage for an HTML element that specifies an identifier attribute and modifying an identifier attribute of the element.
-
公开(公告)号:US20160337320A1
公开(公告)日:2016-11-17
申请号:US14708925
申请日:2015-05-11
Applicant: salesforce.com, inc.
Inventor: Paul Anthony Mason , Harsimranjit Singh Chabbewal
CPC classification number: H04L63/0428 , G06F17/30887 , H04L63/0442 , H04L63/108 , H04L67/02
Abstract: Techniques are disclosed relating to protecting sensitive data in references to network resources. In some embodiments, a host system receives a request for a stored resource, where a first portion of the request is encrypted by a client device using a particular encryption technique and a second portion of the request is not encrypted using the particular encryption technique and where the first portion of the request includes a reference to the resource. In some embodiments, the host decrypts the reference to the resource and provides the resource to the requesting device based on the decrypted reference.
Abstract translation: 公开了关于在引用网络资源时保护敏感数据的技术。 在一些实施例中,主机系统接收对存储的资源的请求,其中请求的第一部分由客户端设备使用特定的加密技术加密,并且请求的第二部分不使用特定的加密技术进行加密,并且其中 请求的第一部分包括对资源的引用。 在一些实施例中,主机解密对资源的引用,并且基于解密的引用将资源提供给请求设备。
-
公开(公告)号:US20160301679A1
公开(公告)日:2016-10-13
申请号:US14682324
申请日:2015-04-09
Applicant: salesforce.com, inc.
IPC: H04L29/06
CPC classification number: H04L63/083 , H04L63/0838 , H04L63/102 , H04L2463/082
Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
Abstract translation: 定制用户验证的机制和技术。 从具有提供对一个或多个资源的访问的一个或多个计算设备的远程电子设备接收登录尝试。 分析登录尝试以从对应于登录尝试的多个简档确定简档。 一个或多个计算设备支持多个轮廓,每个轮廓具有对应的流。 在允许继续登录尝试之前执行与简档对应的流程。 在对应于简档的流程完成之后,通过一个或多个计算设备继续登录尝试。 响应于登录尝试的成功完成,经由一个或多个计算设备向一个或多个资源授予访问权限。
-
公开(公告)号:US10419451B2
公开(公告)日:2019-09-17
申请号:US14936262
申请日:2015-11-09
Applicant: salesforce.com, inc.
Inventor: Paul Anthony Mason
Abstract: A system and a method are disclosed for determining malicious web requests. The system processes incoming web requests to determine whether a request matches predetermined patterns of suspicious requests. The systems stores associations between patterns of suspicious requests, parts of the web request where each pattern occurs, and attack type associated with the pattern. If the system determines that an incoming web request matches a pattern of a suspicious request, the system determines whether to forward the request to the web server for processing or to hold the request. The system locks out a source of request for a period of time if the source sends requests that match certain attack patterns.
-
公开(公告)号:US10212189B2
公开(公告)日:2019-02-19
申请号:US15290367
申请日:2016-10-11
Applicant: salesforce.com, inc.
Inventor: Paul Anthony Mason
IPC: H04L29/06
Abstract: Systems and methods for detecting phishing attacks and identifying attackers are described. In embodiments, a server system may modify a template image based on user information and provide the modified image to a user system with a login page. The server system may obtain authentication credentials with an image rendered by the user system. The server system may authenticate the user system based on the authentication credentials and information included in the rendered image. Other embodiments may be described and/or claimed.
-
公开(公告)号:US20180337913A1
公开(公告)日:2018-11-22
申请号:US16030706
申请日:2018-07-09
Applicant: salesforce.com, inc.
IPC: H04L29/06
Abstract: Mechanisms and techniques for customized user validation. A login attempt is received from a remote electronic device with one or more computing devices that provide access to one or more resources. The login attempt is analyzed to determine a profile from a plurality of profiles corresponding to the login attempt. The one or more computing devices support the plurality profiles with each profile having a corresponding flow. The flow corresponding to the profile is performed prior to allowing continuation of the login attempt. The login attempt is continued, via the one or more computing devices, after the flow corresponding to the profile is completed. Access is granted to the one or more resources, via the one or more computing devices, in response to a successful completion of the login attempt.
-
-
-
-
-
-
-
-
-