AUTOMATIC VALUE FORMATTING BASED ON INTRINSIC STRUCTURAL SEMANTICS

    公开(公告)号:US20190050376A1

    公开(公告)日:2019-02-14

    申请号:US15673691

    申请日:2017-08-10

    Applicant: SAP SE

    Abstract: Techniques are described for automatically analyzing received values to determine their semantic meaning and apply one or more formatting modifications and/or emphases to the received values based on the determined semantic meaning. In one example, a value to be formatted based on a semantic context associated with at least two portions of the received value is received. In response, a semantic rules associated with the received value is identified. The received value is semantically processed using the semantic rules, where processing includes identifying at least two portions of the value corresponding to their contexts. At least one formatting rule is determined as associated with the two or more semantic contexts, each formatting rule associated with a particular context. The formatting rules are applied to the corresponding portions of the received values associated their semantic contexts to generate a modified version of the received value, which is then provided for presentation.

    Cloud key management for system management

    公开(公告)号:US12105791B2

    公开(公告)日:2024-10-01

    申请号:US17455721

    申请日:2021-11-19

    Applicant: SAP SE

    CPC classification number: G06F21/45 H04L9/30 H04L9/3226 H04L63/08

    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.

    CLOUD KEY MANAGEMENT FOR SYSTEM MANAGEMENT
    3.
    发明公开

    公开(公告)号:US20230161864A1

    公开(公告)日:2023-05-25

    申请号:US17455721

    申请日:2021-11-19

    Applicant: SAP SE

    CPC classification number: G06F21/45 H04L9/3226 H04L63/08 H04L9/30

    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.

    SERVICE BLUEPRINT CREATION FOR COMPLEX SERVICE CALLS

    公开(公告)号:US20190384630A1

    公开(公告)日:2019-12-19

    申请号:US16011751

    申请日:2018-06-19

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.

    Service blueprint creation for complex service calls

    公开(公告)号:US10761879B2

    公开(公告)日:2020-09-01

    申请号:US16011751

    申请日:2018-06-19

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.

    Platform for orchestrating custom processes across system landscapes

    公开(公告)号:US10402229B2

    公开(公告)日:2019-09-03

    申请号:US15420298

    申请日:2017-01-31

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for receiving a request to execute a custom process over a target system, the custom process including one or more operations, determining, for each operation of the custom process, a set of entities implicated by a respective operation based on an operations graph of the custom process, and relations paths of the respective operation, determining, for each set of entities, a sub-set of entities based on one or more constraints of the respective operation, providing, for each operation of the custom process, an operation process that is to be executed over one or more entities of a respective sub-set of entities, combining operation processes into a single custom process, and initiating execution of the single custom process.

Patent Agency Ranking