-
公开(公告)号:US10397274B2
公开(公告)日:2019-08-27
申请号:US15421549
申请日:2017-02-01
Applicant: salesforce.com, inc.
Inventor: Mark Manasse , Amit Limaye
Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.
-
公开(公告)号:US11615261B2
公开(公告)日:2023-03-28
申请号:US16579706
申请日:2019-09-23
Applicant: salesforce.com, inc.
Inventor: Mark Manasse
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
-
公开(公告)号:US11336627B2
公开(公告)日:2022-05-17
申请号:US16512683
申请日:2019-07-16
Applicant: salesforce.com, inc.
Inventor: Mark Manasse , Amit Limaye
Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.
-
4.
公开(公告)号:US20200019814A1
公开(公告)日:2020-01-16
申请号:US16579706
申请日:2019-09-23
Applicant: salesforce.com,inc.
Inventor: Mark Manasse
IPC: G06K9/62
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
-
公开(公告)号:US10203889B2
公开(公告)日:2019-02-12
申请号:US15168870
申请日:2016-05-31
Applicant: salesforce.com, inc.
Inventor: Mark Manasse
Abstract: The technology disclosed includes access to content and encryption key rotation in a multi-generational file system that has a first tier file, and automatically initializes a second tier file accessible using a same path and file name as the first tier file. The disclosed technology includes copying forward blocks of data from the first tier file to the second tier file, and prior to completion of the copying forward, responding to an access request by accessing the second tier file by providing data available from the second tier file that has been copied forward and by following links associated with the holes to access blocks in the first tier file to provide data from the first tier file. The first tier files are encrypted using a first encryption key; and applying a second encryption key to encrypt data in the second tier files during the copying forward and write access.
-
公开(公告)号:US10019383B2
公开(公告)日:2018-07-10
申请号:US15365658
申请日:2016-11-30
Applicant: salesforce.com, inc.
Inventor: Mark Manasse
CPC classification number: G06Q50/184 , G06F3/0623 , G06F3/0643 , G06F3/0647 , G06F3/067 , G06F3/0685 , G06F12/1425 , G06F21/45 , G06F21/602 , G06F21/62 , G06F21/79 , G06F2212/1052
Abstract: Disclosed technology includes access to rotatable-key-encrypted content in a multi-tier disk partition system, with a first-tier-track, and initializing a second-tier-track accessible using the same block designator. A stack of bit vectors, stored in SSD memory, represents tier-tracks and a bit flag indicates whether a respective tier-track holds currently-active data or another bit vector needs to be consulted for access to a predecessor of the tier-track. Copying forward of data from the first-tier-track to the second-tier-track, as-scheduled or in response to an authorized write access to the second-tier-track includes, prior to completion, responding to an access request by providing data from the second-tier-track that has been copied forward and following mappings associated with the flag sets to provide data from the first-tier-track. First-tier-tracks are encrypted using a first encryption key; and a second encryption key is applied to encrypt data in the second-tier-tracks during the copying forward and write access.
-
公开(公告)号:US10713592B2
公开(公告)日:2020-07-14
申请号:US15339793
申请日:2016-10-31
Applicant: salesforce.com, inc.
Inventor: Mark Manasse
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
-
公开(公告)号:US20200053124A1
公开(公告)日:2020-02-13
申请号:US16512683
申请日:2019-07-16
Applicant: salesforce.com, inc.
Inventor: Mark Manasse , Amit Limaye
Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.
-
公开(公告)号:US10460203B2
公开(公告)日:2019-10-29
申请号:US15339796
申请日:2016-10-31
Applicant: salesforce.com, inc.
Inventor: Mark Manasse
IPC: G06K9/62
Abstract: The disclosed systems and methods include pre-calculation, per object, of object feature bin values, for identifying close matches between objects, such as text documents, that have numerous weighted features, such as specific-length word sequences. Predetermined feature weights get scaled with two or more selected adjacent scaling factors, and randomly rounded. The expanded set of weighted features of an object gets min-hashed into a predetermined number of feature bins. For each feature that qualifies to be inserted by min-hashing into a particular feature bin, and across successive feature bins, the expanded set of weighted features get min-hashed and circularly smeared into the predetermined number of feature bins. Completed pre-calculated sets of feature bin values for each scaling of the object, together with the scaling factor, are stored for use in comparing sampled features of the object with sampled features of other objects by calculating an estimated Jaccard similarity index.
-
公开(公告)号:US20180219913A1
公开(公告)日:2018-08-02
申请号:US15421549
申请日:2017-02-01
Applicant: salesforce.com, inc.
Inventor: Mark Manasse , Amit Limaye
CPC classification number: H04L63/166 , G06F9/45558 , G06F2009/45583 , G06F2009/45587 , H04L63/0281 , H04L63/0428 , H04L63/06 , H04L63/061
Abstract: According to an implementation of the disclosure, a computing device may record substantially all the network traffic being transported over a first node of a network over a period of time. The computing device may receive an authenticated request from a forensics system that includes access criteria. The first computing device may determine a relevant encrypted and unencrypted portion of the network traffic based on the access criteria. Based on unencrypted portion, the computing device may recalculate an encryption key applicable to the encrypted portion. The computing device may then replicate the relevant portion and the encryption key to the forensics system for forensic analysis.
-
-
-
-
-
-
-
-
-