High performance parallel indexing for forensics and electronic discovery

    公开(公告)号:US10417265B2

    公开(公告)日:2019-09-17

    申请号:US15351733

    申请日:2016-11-15

    Applicant: SAP SE

    Abstract: A system, a method and a computer program product for indexing data samples are disclosed. A locality-sensitive string hash index is determined for each data sample in a plurality of data samples. The determined locality-sensitive string hash indexes for at least two data samples in the plurality of data samples are compared. The comparison includes estimating, based on the determined locality-sensitive string hash indexes, a distance between the two data samples. Based on the comparison, at least one data sample in the plurality of data samples being similar to at least another data sample in the plurality of data samples is identified.

    Enterprise Resource Textual Analysis
    12.
    发明申请

    公开(公告)号:US20180144032A1

    公开(公告)日:2018-05-24

    申请号:US15357357

    申请日:2016-11-21

    Applicant: SAP SE

    Abstract: Disclosed herein are system, method, and computer program product embodiments for providing enterprise resource textual analysis. An embodiment operates by receiving a request to search a document management system for a keyword. One or more relevant documents of the document management system associated with the keyword are identified. The keyword is compared to a data dictionary corresponding to an enterprise system associated with the document management system. Contextual search results including the one or more relevant documents and a relationship between the keyword and data of the enterprise system are provided.

    Machine-learning creation of job posting content

    公开(公告)号:US11551187B2

    公开(公告)日:2023-01-10

    申请号:US16689434

    申请日:2019-11-20

    Applicant: SAP SE

    Abstract: Provided is a system and method for generating job posting content through machine learning. In one example, the method may include storing text content of previous postings, receiving target attributes of a candidate that is a subject of a new posting, identifying, via a machine learning model, a subset of previous postings from among the previous postings which are most closely related to the new posting based on the target attributes of the candidate with respect to content of the previous postings, and detecting text objects from the identified subset of previous postings and outputting a display of the detected text objects.

    Optimized testing system
    14.
    发明授权

    公开(公告)号:US11003574B2

    公开(公告)日:2021-05-11

    申请号:US16001687

    申请日:2018-06-06

    Applicant: SAP SE

    Inventor: Udo Klein

    Abstract: Described herein includes a software testing system that optimizes test case scheduling to efficiently and speedily analyze a block of code. The system enhances the performance of software testing by implementing a test controller using test statistics to optimize testing performance. The test controller may use the test statistics to determine relevant test cases to execute, and to provide better and/or faster feedback to users.

    MACHINE LEARNING DETECTION OF DATABASE INJECTION ATTACKS

    公开(公告)号:US20200097587A1

    公开(公告)日:2020-03-26

    申请号:US16140558

    申请日:2018-09-25

    Applicant: SAP SE

    Inventor: Udo Klein

    Abstract: Techniques and solutions are described for detecting malicious database activity, such as SQL injection attempts. A first machine learning classifier can be trained by comparing processed and unprocessed user input, where a difference between the two can indicate suspicious or malicious activity. The trained classifier can be used to analyze user input before query execution. A second machine learning classifier is trained with a data set that includes call stack information for an application requesting execution of a dynamic query and query statistics associated with processing of the query at the database. The query of the application can be correlated with a corresponding database query by hashing the application query and the database query and comparing the hash values, where matching hash value indicate a common query. The trained classifier can monitor execution of future queries to identify queries having anomalous patterns, which may indicate malicious or suspicious activity.

    Cloud container security framework
    16.
    发明授权

    公开(公告)号:US11310037B2

    公开(公告)日:2022-04-19

    申请号:US16932197

    申请日:2020-07-17

    Applicant: SAP SE

    Abstract: A containerized application is initialized in a cloud-based computing environment. Thereafter, the containerized application obtains environment variables encapsulating credentials. The containerized application stores the environment variables in a secret store of the containerized application. The environment variables are later wiped upon completion of the storing of the environment variables. Related apparatus, systems, techniques and articles are also described.

    MACHINE-LEARNING CREATION OF JOB POSTING CONTENT

    公开(公告)号:US20210150484A1

    公开(公告)日:2021-05-20

    申请号:US16689434

    申请日:2019-11-20

    Applicant: SAP SE

    Abstract: Provided is a system and method for generating job posting content through machine learning. In one example, the method may include storing text content of previous postings, receiving target attributes of a candidate that is a subject of a new posting, identifying, via a machine learning model, a subset of previous postings from among the previous postings which are most closely related to the new posting based on the target attributes of the candidate with respect to content of the previous postings, and detecting text objects from the identified subset of previous postings and outputting a display of the detected text objects.

    Data storage system file integrity check

    公开(公告)号:US10440033B2

    公开(公告)日:2019-10-08

    申请号:US15460691

    申请日:2017-03-16

    Applicant: SAP SE

    Inventor: Udo Klein

    Abstract: An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine that the first key is not equivalent to the hashed first file. A second key is then obtained that corresponds to the hashed first file. A second file is then obtained using the second key. This second file is hashed to determine whether the second key is equivalent to the hashed second file. Integrity of the first file is confirmed if the second key is equivalent to the hashed second file or integrity of the first file is rejected if the second key is not equivalent to the hashed second file. Related apparatus, systems, techniques and articles are also described.

    Data Storage System File Integrity Check
    20.
    发明申请

    公开(公告)号:US20180270252A1

    公开(公告)日:2018-09-20

    申请号:US15460691

    申请日:2017-03-16

    Applicant: SAP SE

    Inventor: Udo Klein

    Abstract: An integrity check for a first file is initiated. In response, a first key corresponding to the first file is obtained. The first file is hashed to determine that the first key is not equivalent to the hashed first file. A second key is then obtained that corresponds to the hashed first file. A second file is then obtained using the second key. This second file is hashed to determine whether the second key is equivalent to the hashed second file. Integrity of the first file is confirmed if the second key is equivalent to the hashed second file or integrity of the first file is rejected if the second key is not equivalent to the hashed second file. Related apparatus, systems, techniques and articles are also described.

Patent Agency Ranking