Modeling internet of things devices in processes

    公开(公告)号:US11334837B2

    公开(公告)日:2022-05-17

    申请号:US16552025

    申请日:2019-08-27

    Applicant: SAP SE

    Abstract: The disclosure generally describes methods, software, and systems, including a method for using an object definition from which object documents are instantiated defining real-world variants of a physical object and including a meta-model identifying nodes, fields, and associations with other object definitions. The object definition includes, at instantiation of a given object document marking an existence of the physical object, an object identifier node, including an object identifier, and at least one variant type node, including a variant type identifier identifying the real-world variant of the physical object and including variant extension nodes and fields extending the object definition to a variant object definition. For each variant type node, process variant configuration information is received that models real-world processes for the real-world variant of the physical object, including process and data interactions between the real-world variant of the physical object and the other physical objects.

    ADDITIONAL MESSAGE INFORMATION HANDLING FOR APPLICATIONS

    公开(公告)号:US20170147424A1

    公开(公告)日:2017-05-25

    申请号:US14946944

    申请日:2015-11-20

    Applicant: SAP SE

    CPC classification number: G06F11/0706 G06F11/0769 G06F11/32

    Abstract: Various embodiments of systems and methods to display an additional message information relevant to a product are described herein. Initially a determination is made whether error message, corresponding to a data processing error related to a product, has a corresponding additional message information related to the product. Next, based on the determined additional message information, an additional message information property of the error message is updated to indicate that the error message has the corresponding additional information. Next, based on the updated additional message information property, the additional message information is converted to obtain a converted additional message information in a markup language. Finally the converted additional message information is forwarded to a user interface, where it is displayed.

    INTELLIGENT FIREWALL RULE HANDLING

    公开(公告)号:US20250030690A1

    公开(公告)日:2025-01-23

    申请号:US18223228

    申请日:2023-07-18

    Applicant: SAP SE

    Abstract: A computer-implemented method may comprise receiving, from a client application running within a client network, a request for a server application running within a server network to perform an action, and then generating, by the client network, a modified version of the request for the server application to perform the action, where the modified version of the request for the server application to perform the action comprises an access token configured to be used by the server network to allow an update of an access control list for the server application. The client network may then send, to the server network, the modified version of the request for the server application to perform the action.

    CONTEXTUAL DATA AUGMENTATION FOR SOFTWARE ISSUE PRIORITIZATION

    公开(公告)号:US20240420093A1

    公开(公告)日:2024-12-19

    申请号:US18211452

    申请日:2023-06-19

    Applicant: SAP SE

    Abstract: Systems and methods described herein relate to techniques for identifying and using context data to prioritize reported issues in a software context. A data record of a reported issue is accessed. The reported issue is associated with a software offering provided to a user. The data record comprises issue metadata that includes a first priority rating for the reported issue. The issue metadata is used to identify a relation between the reported issue and context data associated with the user. A second priority rating for the reported issue is generated based on at least the context data. The second priority rating may differ from the first priority rating. The second priority rating is presented at a computing device, optionally together with the first priority rating via a graphical user interface.

    SYSTEM AND METHOD FOR MODIFYING USER INTERFACE ELEMENTS
    9.
    发明申请
    SYSTEM AND METHOD FOR MODIFYING USER INTERFACE ELEMENTS 审中-公开
    用于修改用户界面元素的系统和方法

    公开(公告)号:US20160328137A1

    公开(公告)日:2016-11-10

    申请号:US15213679

    申请日:2016-07-19

    Applicant: SAP SE

    Abstract: The present disclosure involves systems, products, and methods for modifying elements within a user interface (UI). One method includes operations for identifying an instance of a UI text element for modification within a UI associated with a software application, wherein the UI is displayed to at least one user; retrieving a set of metadata associated with the identified instance of the UI text element, where each instance of the UI text element is associated with the retrieved set of metadata; receiving at least one modification to the retrieved set of metadata associated with the identified instance of the UI text element; and persisting the modified set of metadata associated with the UI text element.

    Abstract translation: 本公开涉及用于修改用户界面(UI)内的元素的系统,产品和方法。 一种方法包括用于识别用于在与软件应用相关联的UI中进行修改的UI文本元素的实例的操作,其中UI被显示给至少一个用户; 检索与所识别的UI文本元素的实例相关联的一组元数据,其中UI文本元素的每个实例与所检索的元数据集相关联; 对与所识别的UI文本元素的实例相关联的所检索的元数据集接收至少一个修改; 并且保持与UI文本元素相关联的修改的元数据集。

    Context analysis engine for information technology incidents

    公开(公告)号:US12028230B1

    公开(公告)日:2024-07-02

    申请号:US18223223

    申请日:2023-07-18

    Applicant: SAP SE

    CPC classification number: H04L43/0823 H04L67/10

    Abstract: A computer-implemented method may comprise detecting an occurrence of an information technology (IT) incident between a cloud service and a software application based on observability data of the cloud service, where the observability data indicates a current state of the cloud service, the cloud service runs within a first network, and the software application runs within a second network different from the first network. The computer-implemented method may further comprise obtaining context information for the IT incident from the second network in response to the detecting of the occurrence of the IT incident, where the context information indicating circumstances in which the IT incident occurred, and then determining a countermeasure for the IT incident based on the context information. The computer-implemented method may additionally comprise performing an action based on the countermeasure.

Patent Agency Ranking