-
公开(公告)号:US20230259379A1
公开(公告)日:2023-08-17
申请号:US17672540
申请日:2022-02-15
Applicant: SAP SE
Inventor: Udo Klein , Achim Seubert , Lukas Melzer , Daniel Goldmann
CPC classification number: G06F9/45529 , G06F9/542
Abstract: A method for configurable in-application event logging may include receiving, from a client device, one or more user inputs specifying at least one of an event of interest associated with an operation of a software application and a data to collect in response to the event of interest. A logging agent may be configured, based on the user inputs, to respond to the specified event of interest by generating one or more log messages including the specified data. The logging agent may be as a first programming code embedded within a second programming code implementing the software application such that the logging agent is able to access a context of each executing instance of the software application. Related systems and computer program products are also provided.
-
公开(公告)号:US11190908B2
公开(公告)日:2021-11-30
申请号:US16822286
申请日:2020-03-18
Applicant: SAP SE
Inventor: Udo Klein , Holger Knospe , Lukas Melzer
Abstract: Provided are systems and methods for visualizing spatio-temporal data of a user location. In one example, the method may include receiving spatio-temporal movement information of a first user device associated with a first user, and receiving spatio-temporal movement information of a second user device associated with a second user, identifying a point in time when the first user and the second user could have met based on the received spatio-temporal movement information of the first and second user devices, outputting, via a user interface, a first timeline indicating movement of the first user device over time and a second timeline indicating movement of the second user device over time, and displaying a visual indicator with respect to the first and second timelines indicating the identified point in time when the first and second users could have met.
-
公开(公告)号:US20210263924A1
公开(公告)日:2021-08-26
申请号:US17319770
申请日:2021-05-13
Applicant: SAP SE
Inventor: Udo Klein
IPC: G06F16/2458 , G06K9/62 , H04L29/06 , G06N20/00 , G06F16/22
Abstract: Techniques and solutions are described for detecting malicious database activity, such as SQL injection attempts. A first machine learning classifier can be trained by comparing processed and unprocessed user input, where a difference between the two can indicate suspicious or malicious activity. The trained classifier can be used to analyze user input before query execution. A second machine learning classifier is trained with a data set that includes call stack information for an application requesting execution of a dynamic query and query statistics associated with processing of the query at the database. The query of the application can be correlated with a corresponding database query by hashing the application query and the database query and comparing the hash values, where matching hash value indicate a common query. The trained classifier can monitor execution of future queries to identify queries having anomalous patterns, which may indicate malicious or suspicious activity.
-
公开(公告)号:US11030203B2
公开(公告)日:2021-06-08
申请号:US16140558
申请日:2018-09-25
Applicant: SAP SE
Inventor: Udo Klein
Abstract: Techniques and solutions are described for detecting malicious database activity, such as SQL injection attempts. A first machine learning classifier can be trained by comparing processed and unprocessed user input, where a difference between the two can indicate suspicious or malicious activity. The trained classifier can be used to analyze user input before query execution. A second machine learning classifier is trained with a data set that includes call stack information for an application requesting execution of a dynamic query and query statistics associated with processing of the query at the database. The query of the application can be correlated with a corresponding database query by hashing the application query and the database query and comparing the hash values, where matching hash value indicate a common query. The trained classifier can monitor execution of future queries to identify queries having anomalous patterns, which may indicate malicious or suspicious activity.
-
公开(公告)号:US10963889B2
公开(公告)日:2021-03-30
申请号:US15460710
申请日:2017-03-16
Applicant: SAP SE
Inventor: Udo Klein , Oliver Klemenz
IPC: G06Q30/00
Abstract: Integrity of a physical object is verified by receiving, data encapsulating a request to verify the integrity of the physical object. Subsequently, a data structure is accessed that includes a plurality of linked segments each characterizing an entity within a supply chain for the physical object. Each segment includes a respective predecessor field and a respective hash value. All of the segments can be iterated through in reverse chronological order to confirm, for each segment, whether a value for the predecessor field is equal to a hash value in a hash field in an immediately previously segment, the hash value being a hash of all values of the particular segment. Data characterizing the iteration can then be provided. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US10824681B2
公开(公告)日:2020-11-03
申请号:US15357357
申请日:2016-11-21
Applicant: SAP SE
Inventor: Udo Klein , Susan Marie Thomas
Abstract: Disclosed herein are system, method, and computer program product embodiments for providing enterprise resource textual analysis. An embodiment operates by receiving a request to search a document management system for a keyword. One or more relevant documents of the document management system associated with the keyword are identified. The keyword is compared to a data dictionary corresponding to an enterprise system associated with the document management system. Contextual search results including the one or more relevant documents and a relationship between the keyword and data of the enterprise system are provided.
-
公开(公告)号:US20200221261A1
公开(公告)日:2020-07-09
申请号:US16822286
申请日:2020-03-18
Applicant: SAP SE
Inventor: Udo Klein , Holger Knospe , Lukas Melzer
Abstract: Provided are systems and methods for visualizing spatio-temporal data of a user location. In one example, the method may include receiving spatio-temporal movement information of a first user device associated with a first user, and receiving spatio-temporal movement information of a second user device associated with a second user, identifying a point in time when the first user and the second user could have met based on the received spatio-temporal movement information of the first and second user devices, outputting, via a user interface, a first timeline indicating movement of the first user device over time and a second timeline indicating movement of the second user device over time, and displaying a visual indicator with respect to the first and second timelines indicating the identified point in time when the first and second users could have met.
-
公开(公告)号:US20180137115A1
公开(公告)日:2018-05-17
申请号:US15351733
申请日:2016-11-15
Applicant: SAP SE
Inventor: Udo Klein , Philipp Scholl
IPC: G06F17/30
CPC classification number: G06F16/313 , G06F16/325
Abstract: A system, a method and a computer program product for indexing data samples are disclosed. A locality-sensitive string hash index is determined for each data sample in a plurality of data samples. The determined locality-sensitive string hash indexes for at least two data samples in the plurality of data samples are compared. The comparison includes estimating, based on the determined locality-sensitive string hash indexes, a distance between the two data samples. Based on the comparison, at least one data sample in the plurality of data samples being similar to at least another data sample in the plurality of data samples is identified.
-
公开(公告)号:US20180068059A1
公开(公告)日:2018-03-08
申请号:US15259420
申请日:2016-09-08
Applicant: SAP SE
Inventor: Jens Odenheimer , Udo Klein
CPC classification number: G16B30/00 , H03M7/30 , H03M7/3084
Abstract: In a process of malicious sequence detection for gene synthesizer, a sequence is received as input in the gene synthesizer. A sequence of interest is isolated from the received sequence. The sequence of interest is encoded using an encoding mechanism. The encoded sequence of interest is received as input in a locality sensitive hasher. A hash is generated corresponding to the sequence of interest. The hash is matched with malicious hashes stored in a database. Upon determining a match between the hash and a malicious hash, a similarity score is computed between the hash and the malicious hash. It is determined whether the similarity score is above a threshold score. Upon determining that the similarity score is above the threshold score, the sequence of interest is identified as malicious sequence and is prevented from synthesis.
-
公开(公告)号:US20160364426A1
公开(公告)日:2016-12-15
申请号:US14736985
申请日:2015-06-11
Applicant: SAP SE
Inventor: Sebastian Schroetel , Uwe Schulz , Udo Klein
IPC: G06F17/30
CPC classification number: G06F16/907
Abstract: An artifact in an application is assigned with a tag. The tag is a string that characterizes the artifact. A list of suggested tags is provided, which includes tags assigned to similar artifacts maintained by the application. The list of suggested tags also includes newly suggested tags based on analysis of the artifact. The tags within the application are maintained and operations such as deletion, renaming, or unification of tags are performed. Unification of tags is performed through determining similarities between at least two tags. The similarity is determined based on existence of a trigram in the at least two tags after normalization of tags and based on edit distance between each two tags from the at least two tags. A tag cloud is provided for navigation between artifacts in the application. Tag cloud is defined based on frequency of use and selectiveness of tags.
Abstract translation: 应用程序中的工件被分配了一个标签。 标签是表示该工件的字符串。 提供了建议标签的列表,其中包括分配给应用程序维护的类似工件的标签。 建议标签的列表还包括基于对工件分析的新建标签。 维护应用程序中的标签,并执行诸如标签的删除,重命名或统一的操作。 通过确定至少两个标签之间的相似性来执行标签的统一。 基于标签归一化之后的至少两个标签中的三角形的存在并且基于来自至少两个标签的每个两个标签之间的编辑距离来确定相似性。 提供标签云用于应用程序中的工件之间的导航。 标签云是根据使用频率和标签的选择性定义的。
-
-
-
-
-
-
-
-
-