-
公开(公告)号:US20210326311A1
公开(公告)日:2021-10-21
申请号:US16848878
申请日:2020-04-15
Applicant: salesforce.com, inc.
Inventor: Chenghung KER , Danil DVINOV , Parth Vijay VAISHNAV , Swaroop SHERE , Alexandre HERSANS
IPC: G06F16/215 , H04L9/06 , G06F16/28 , G06F21/60
Abstract: Provided herein are system, methods and computer program products for identifying duplicate records stored in a database system, comprising: generating a plurality of encrypted match indexes for each of a plurality of records stored in the database system, each of the plurality of encrypted match indexes encrypts a value of each encryption enabled field of a respective one of the plurality of records defined by at least one match rule, creating a cluster of records comprising at least one set containing at least two records of the plurality of records, the at least two records having respective encrypted match indexes corresponding to the at least one match rule, causing identification of duplicate records in the at least one set according to detection of records of the at least one set having respective match indexes matching the at least one match rule, and outputting an indication of the identified duplicate records.
-
公开(公告)号:US20210182255A1
公开(公告)日:2021-06-17
申请号:US17184697
申请日:2021-02-25
Applicant: salesforce.com, inc.
Inventor: Alexandre HERSANS , Swaroop SHERE , Chenghung KER , Parth Vijay VAISHNAV , Assaf BEN-GUR , Victor Weilin LIU , Daniel MCGARRY , Samatha SANIKOMMU
IPC: G06F16/215 , G06F21/60 , G06Q30/00 , G06F16/22 , G06F16/23 , G06F16/2458
Abstract: Disclosed herein are system, method, and computer program product embodiments for detecting duplicates with exact and fuzzy matching on encrypted match indexes using an encryption key in a cloud computing platform. An embodiment operates by determining a match rule index value upon reception of a new record. The embodiment encrypts the match index rule value using the customer's encryption key and a deterministic encryption method and stores the encrypted match rule index value. Duplicate detection may be later performed by using the same deterministic encryption method to determine a cypher text for a candidate entry and comparing the ciphertext to the stored encrypted match indexes.
-