-
公开(公告)号:US20190050376A1
公开(公告)日:2019-02-14
申请号:US15673691
申请日:2017-08-10
Applicant: SAP SE
Inventor: Rouven Krebs , Steffen Koenig , Benjamin Hoke , Jochen Wilhelm , Christian Rost , Matthias Meissner
Abstract: Techniques are described for automatically analyzing received values to determine their semantic meaning and apply one or more formatting modifications and/or emphases to the received values based on the determined semantic meaning. In one example, a value to be formatted based on a semantic context associated with at least two portions of the received value is received. In response, a semantic rules associated with the received value is identified. The received value is semantically processed using the semantic rules, where processing includes identifying at least two portions of the value corresponding to their contexts. At least one formatting rule is determined as associated with the two or more semantic contexts, each formatting rule associated with a particular context. The formatting rules are applied to the corresponding portions of the received values associated their semantic contexts to generate a modified version of the received value, which is then provided for presentation.
-
公开(公告)号:US12105791B2
公开(公告)日:2024-10-01
申请号:US17455721
申请日:2021-11-19
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm
CPC classification number: G06F21/45 , H04L9/30 , H04L9/3226 , H04L63/08
Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.
-
公开(公告)号:US20230161864A1
公开(公告)日:2023-05-25
申请号:US17455721
申请日:2021-11-19
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm
CPC classification number: G06F21/45 , H04L9/3226 , H04L63/08 , H04L9/30
Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.
-
公开(公告)号:US20190384630A1
公开(公告)日:2019-12-19
申请号:US16011751
申请日:2018-06-19
Applicant: SAP SE
Inventor: Benjamin Hoke , Jochen Wilhelm , Steffen Koenig , Rouven Krebs
IPC: G06F9/48
Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.
-
公开(公告)号:US11805177B2
公开(公告)日:2023-10-31
申请号:US17534791
申请日:2021-11-24
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm , Christian Rost
IPC: H04L67/141 , H04L67/143 , H04L9/40 , G06F9/455 , H04L67/01
CPC classification number: H04L67/141 , G06F9/45558 , H04L63/0823 , H04L63/108 , H04L67/01 , H04L67/143 , G06F2009/45595
Abstract: Programs, systems, and methods are described for providing on-demand applications to users by infrastructure as a service platforms. A request catcher may receive a request to start an application that runs on a managed system that is scheduled to be off. The request catcher or a management application may verify that the user has authorization to access the application and request to the management application to start the managed system. The management application may start the managed system and the managed system may then provide access to the application to the user.
-
公开(公告)号:US10761879B2
公开(公告)日:2020-09-01
申请号:US16011751
申请日:2018-06-19
Applicant: SAP SE
Inventor: Benjamin Hoke , Jochen Wilhelm , Steffen Koenig , Rouven Krebs
IPC: G06F9/48
Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.
-
公开(公告)号:US10402229B2
公开(公告)日:2019-09-03
申请号:US15420298
申请日:2017-01-31
Applicant: SAP SE
Inventor: Petar Dimitrov , Jochen Wilhelm , Dimitar Bankov , Ivan Tsankov , Benjamin Hoke
Abstract: Methods, systems, and computer-readable storage media for receiving a request to execute a custom process over a target system, the custom process including one or more operations, determining, for each operation of the custom process, a set of entities implicated by a respective operation based on an operations graph of the custom process, and relations paths of the respective operation, determining, for each set of entities, a sub-set of entities based on one or more constraints of the respective operation, providing, for each operation of the custom process, an operation process that is to be executed over one or more entities of a respective sub-set of entities, combining operation processes into a single custom process, and initiating execution of the single custom process.
-
公开(公告)号:US20230164225A1
公开(公告)日:2023-05-25
申请号:US17534791
申请日:2021-11-24
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm , Christian Rost
IPC: H04L67/141 , H04L67/143 , H04L67/01 , G06F9/455
CPC classification number: H04L67/141 , H04L67/143 , H04L67/42 , H04L63/0823 , H04L63/108 , G06F9/45558 , G06F2009/45595
Abstract: Programs, systems, and methods are described for providing on-demand applications to users by infrastructure as a service platforms. A request catcher may receive a request to start an application that runs on a managed system that is scheduled to be off. The request catcher or a management application may verify that the user has authorization to access the application and request to the management application to start the managed system. The management application may start the managed system and the managed system may then provide access to the application to the user.
-
公开(公告)号:US20180217869A1
公开(公告)日:2018-08-02
申请号:US15420298
申请日:2017-01-31
Applicant: SAP SE
Inventor: Petar Dimitrov , Jochen Wilhelm , Dimitar Bankov , Ivan Tsankov , Benjamin Hoke
IPC: G06F9/50
CPC classification number: G06F9/5038 , G06F8/60 , G06F8/61 , G06F8/62 , G06F8/65 , G06F8/70 , G06F8/76 , G06F9/48 , G06F9/4843 , G06F9/4881 , G06F9/4887 , G06F9/50 , G06F9/5005 , G06F9/5011 , G06F9/5027 , G06F9/5044 , G06F9/5061
Abstract: Methods, systems, and computer-readable storage media for receiving a request to execute a custom process over a target system, the custom process including one or more operations, determining, for each operation of the custom process, a set of entities implicated by a respective operation based on an operations graph of the custom process, and relations paths of the respective operation, determining, for each set of entities, a sub-set of entities based on one or more constraints of the respective operation, providing, for each operation of the custom process, an operation process that is to be executed over one or more entities of a respective sub-set of entities, combining operation processes into a single custom process, and initiating execution of the single custom process.
-
-
-
-
-
-
-
-