KEY PERMISSION DISTRIBUTION
    131.
    发明公开

    公开(公告)号:US20240111746A1

    公开(公告)日:2024-04-04

    申请号:US18535805

    申请日:2023-12-11

    Abstract: Techniques are disclosed relating to the distribution of database key permissions. A database system may distribute first permission information to a plurality of database nodes that identifies a distribution of key range permissions to ones of the plurality of database nodes. A given key range permission being distributed to a given database node may permit that database node to write records whose keys fall within a key range associated with the given key range permission. The database system may receive, from a first database node, a request for a first key range permission provisioned to a second database node. The database system may modify the first permission information to derive second permission information that provisions the first key range permission to the first database node instead of the second database node. The database system may distribute the second permission information to ones of the plurality of database nodes.

    Cross-site request forgery protection

    公开(公告)号:US11949714B2

    公开(公告)日:2024-04-02

    申请号:US17160840

    申请日:2021-01-28

    Abstract: Digital data processing systems of the type in which a server digital data device (“server”) is coupled to a client digital data device (“client”) over a network, e.g., the Internet, include web server software executing within an application layer on the server that responds to a request from the client by (i) validating a key received from the client with that request, (ii) generating a result code indicative of a success of that validation, (iii) initiating processing of the request, including invoking server resource software executing outside the application layer. The server resource software, which checks the result code upon invocation and before performing a protected operation required for processing the request, responds to a result code indicating that the result did not validate by exiting before executing the protected operation.

    Multiple stakeholders for a single business process

    公开(公告)号:US11941230B2

    公开(公告)日:2024-03-26

    申请号:US17323469

    申请日:2021-05-18

    CPC classification number: G06F3/0484 G06F3/048 G06Q10/10

    Abstract: Methods and apparatus, including computer program products, implementing and using techniques for providing a customized representation of a business process involving one or more organizational entities that are accessible through a network. A user interface that can display a customized representation of a business process is provided. User information, including user privileges associated with the business process, is stored in a central repository that is accessible through the network. A request to view the business process is received from a first user through the user interface. The user privileges for the first user are retrieved from the central repository. A customized representation of the business process is displayed with the user interface. The customized representation is in compliance with the retrieved user privileges for the first user.

    Mechanisms for maintaining chains without locks

    公开(公告)号:US11940994B2

    公开(公告)日:2024-03-26

    申请号:US17515118

    申请日:2021-10-29

    CPC classification number: G06F16/2379 G06F16/24552

    Abstract: Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.

    Mechanisms for handling schema changes

    公开(公告)号:US11940963B2

    公开(公告)日:2024-03-26

    申请号:US17457244

    申请日:2021-12-01

    CPC classification number: G06F16/213 G06F16/2282 G06F16/2358 G06F16/24552

    Abstract: Techniques are disclosed relating to database schemas. A computer system may receive a metadata document that describes an updated schema for a database that stores a plurality of records. The computer system may instantiate a set of processes to perform an upgrade routine to upgrade ones of the plurality of records to comply with the updated schema. While the set of processes are upgrading the records, the computer system may receive a request to perform an operation on one of the plurality of records. The computer system may detect that the record corresponds to an earlier schema version than a version of the updated schema of the metadata document and may upgrade the record to comply with that updated schema. After upgrading the record, the computer system may perform the requested operation on the record.

    SYSTEMS AND METHODS FOR A READING AND COMPREHENSION ASSISTANCE TOOL

    公开(公告)号:US20240095464A1

    公开(公告)日:2024-03-21

    申请号:US18159616

    申请日:2023-01-25

    CPC classification number: G06F40/40 G06N3/08

    Abstract: Embodiments described herein provide system of a neural network based news reading tool. The system includes a communication interface receiving one or more text passages from data sources. The system also includes a memory storing a discord question neural model that generates a discord question according to the text passages. The system further includes processors executing processor-executable instructions to perform operations that include determining, by the discord question neural model, respective locations within the one or more text passages for inserting the discord question; receiving, via the communication interface from a client component, an indication that a user device is accessing a first text passage from a first data source; and sending, via the communication interface, the discord question, and a first location corresponding to the first text passage to the user device thereby causing the client component to generate and display a reading interface widget.

    Topic Identification Based on Virtual Space Machine Learning Models

    公开(公告)号:US20240095459A1

    公开(公告)日:2024-03-21

    申请号:US17946952

    申请日:2022-09-16

    CPC classification number: G06F40/35 G06N5/022 H04L51/02

    Abstract: Techniques for displaying workflow responses based on determining topics associated with user requests are discussed herein. In some examples, a user may post a request (e.g., question) to a virtual space (e.g., a channel, thread, board, etc.) of a communication platform. The communication platform may input the request into a machine learning model trained to identify topics associated with the request and confidence levels associated with topics. In such examples, the communication platform may associate a topic with the user request based on the confidence level of the topic. In some examples, the communication platform may determine that the topic is associated with a graphical identifier (e.g., emoji). The communication platform may cause the graphical identifier to be displayed to the virtual space within which the user request was posted. In response to displaying the graphical identifier, the communication platform may display a workflow response to the virtual space.

    DEPLOYMENT OF A MULTI-TECHNOLOGY-STACK APPLICATION

    公开(公告)号:US20240095003A1

    公开(公告)日:2024-03-21

    申请号:US18063664

    申请日:2022-12-08

    CPC classification number: G06F8/61

    Abstract: Implementations(s) for deploying application(s) are described. Responsive to an indication to install a specific instance of an application registered in a registry, first and second code are retrieved from the registry to cause the installation. Responsive to the first and second code, it is detected that the first code is executable to receive information that will be generated responsive to execution of the second code; the specific instance of the second part of the application is caused to be deployed on the second TS using the fourth code identified in the second code; the information is received; and a specific instance of the first part of the application is caused to be deployed on the first TS using the third code identified in the first code and to be configured to communicate with the specific instance of the second part of the application using the information.

Patent Agency Ranking