-
公开(公告)号:US11429586B2
公开(公告)日:2022-08-30
申请号:US15389362
申请日:2016-12-22
Applicant: SAP SE
Inventor: Frank Wu , Tu Truong , Michael Kunzmann , Hameesh Manadath , Hansen Chen , Makoto Sugishita , Masamitsu Ochiai
IPC: G06F16/23 , G06F16/2455 , G06F16/242 , G06F40/205
Abstract: Technologies are provided for validating expression updates. A change to an editable expression can be detected by a client computing device and an expression update describing the detected change can be transmitted to an application server over a bidirectional communication channel. The application server can analyze the expression update to determine whether the detected change resulted in a valid expression. Analyzing the expression update can comprise locating an entity identifier in the detected change and searching a database to determine whether the identified entity exists. The application server can also determine whether a given user has permission to access the identified entity. The application server can transmit expression update validation information back to the client computing device over the bidirectional communication channel. The client computing device can update a user interface displaying the expression based on the validation information.
-
公开(公告)号:US20180181608A1
公开(公告)日:2018-06-28
申请号:US15389362
申请日:2016-12-22
Applicant: SAP SE
Inventor: Frank Wu , Tu Truong , Michael Kunzmann , Hameesh Manadath , Hansen Chen , Makoto Sugishita , Masamitsu Ochiai
CPC classification number: G06F16/2365 , G06F16/2423 , G06F16/24564 , G06F17/2705
Abstract: Technologies are provided for validating expression updates. A change to an editable expression can be detected by a client computing device and an expression update describing the detected change can be transmitted to an application server over a bidirectional communication channel. The application server can analyze the expression update to determine whether the detected change resulted in a valid expression. Analyzing the expression update can comprise locating an entity identifier in the detected change and searching a database to determine whether the identified entity exists. The application server can also determine whether a given user has permission to access the identified entity. The application server can transmit expression update validation information back to the client computing device over the bidirectional communication channel. The client computing device can update a user interface displaying the expression based on the validation information.
-
公开(公告)号:US11170346B2
公开(公告)日:2021-11-09
申请号:US15385479
申请日:2016-12-20
Applicant: SAP SE
Inventor: Nethaji Tummuru , Surbhi Sheth-Shah , Michael Kunzmann , Sanjay Shirole , Jun Meng
Abstract: A credentials verification network utilizes blockchain technology to track/verify credentials for candidates that can later be used in the hiring verification process. As implemented by nodes of a distributed network, a candidate receives from a first network node a secure credential generated by a credentialing source from an original credential document. The first node processes the secure credential according to a security feature (e.g., hash function) to create a transaction, and assigns an identifier to the transaction. The first node signs the transaction with a private key to create a transaction signature. The first node sends the signed transaction to a central server that broadcasts the transaction to the blockchain network. Once the network has accepted the transaction, the candidate will be notified and handed over the raw text document and transaction receipt ID. The candidate can forward the information to a recruiter or potential employer running a second node.
-
公开(公告)号:US20180082256A1
公开(公告)日:2018-03-22
申请号:US15385479
申请日:2016-12-20
Applicant: SAP SE
Inventor: Nethaji Tummuru , Surbhi Sheth-Shah , Michael Kunzmann , Sanjay Shirole , Jun Meng
CPC classification number: G06Q10/1053 , H04L9/3236 , H04L9/3297 , H04L2209/38
Abstract: A credentials verification network utilizes blockchain technology to track/verify credentials for candidates that can later be used in the hiring verification process. As implemented by nodes of a distributed network, a candidate receives from a first network node a secure credential generated by a credentialing source from an original credential document. The first node processes the secure credential according to a security feature (e.g., hash function) to create a transaction, and assigns an identifier to the transaction. The first node signs the transaction with a private key to create a transaction signature. The first node sends the signed transaction to a central server that broadcasts the transaction to the blockchain network. Once the network has accepted the transaction, the candidate will be notified and handed over the raw text document and transaction receipt ID. The candidate can forward the information to a recruiter or potential employer running a second node.
-
-
-