AUTOMATIC VALUE FORMATTING BASED ON INTRINSIC STRUCTURAL SEMANTICS

    公开(公告)号:US20190050376A1

    公开(公告)日:2019-02-14

    申请号:US15673691

    申请日:2017-08-10

    Applicant: SAP SE

    Abstract: Techniques are described for automatically analyzing received values to determine their semantic meaning and apply one or more formatting modifications and/or emphases to the received values based on the determined semantic meaning. In one example, a value to be formatted based on a semantic context associated with at least two portions of the received value is received. In response, a semantic rules associated with the received value is identified. The received value is semantically processed using the semantic rules, where processing includes identifying at least two portions of the value corresponding to their contexts. At least one formatting rule is determined as associated with the two or more semantic contexts, each formatting rule associated with a particular context. The formatting rules are applied to the corresponding portions of the received values associated their semantic contexts to generate a modified version of the received value, which is then provided for presentation.

    Cloud key management for system management

    公开(公告)号:US12105791B2

    公开(公告)日:2024-10-01

    申请号:US17455721

    申请日:2021-11-19

    Applicant: SAP SE

    CPC classification number: G06F21/45 H04L9/30 H04L9/3226 H04L63/08

    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.

    AUTOMATED PATTERN GENERATION FOR ELASTICITY IN CLOUD-BASED APPLICATIONS

    公开(公告)号:US20230297438A1

    公开(公告)日:2023-09-21

    申请号:US17699296

    申请日:2022-03-21

    Applicant: SAP SE

    CPC classification number: G06F9/5077 G06F9/5022 G06F11/3423 G06F2209/5019

    Abstract: Methods, systems, and computer-readable storage media for receiving a set of timeseries, each timeseries in the set of timeseries representing a parameter of execution of the system, pre-processing each timeseries in the set of timeseries to provide a set of pre-processed timeseries, merging timeseries in the set of timeseries to provide a merged timeseries, generating a consolidated timeseries based on the merged timeseries and a periodicity, deriving a pattern based on the consolidated time series, the pattern defining a scaling factor for each period in a timeframe, and executing, by an instance manager, scaling of the system based on the pattern to selectively scale one or more of instances of the system and controllable resources based on scaling factors of the pattern.

    CLOUD KEY MANAGEMENT FOR SYSTEM MANAGEMENT
    4.
    发明公开

    公开(公告)号:US20230161864A1

    公开(公告)日:2023-05-25

    申请号:US17455721

    申请日:2021-11-19

    Applicant: SAP SE

    CPC classification number: G06F21/45 H04L9/3226 H04L63/08 H04L9/30

    Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.

    SERVICE BLUEPRINT CREATION FOR COMPLEX SERVICE CALLS

    公开(公告)号:US20190384630A1

    公开(公告)日:2019-12-19

    申请号:US16011751

    申请日:2018-06-19

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.

    INTRUSION DETECTION SYSTEM ENRICHMENT BASED ON SYSTEM LIFECYCLE

    公开(公告)号:US20190042737A1

    公开(公告)日:2019-02-07

    申请号:US15665758

    申请日:2017-08-01

    Applicant: SAP SE

    Inventor: Rouven Krebs

    Abstract: Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the secured environment's operations. In one example, a secured environment comprising at least one component is monitored, where the secured environment is associated with a lifecycle operations manager (LOM) responsible for managing lifecycle operations associated with at least one component in the SE. One or more log files associated with operations of each of the at least one components are obtained, along with log files associated with lifecycle operations executed by the LOM. A determination is made as to whether the particular activities documented in the log files indicate a violation of at least one malicious action rule. In response to determining that the log files are associated with a malicious action rule, a mitigation action associated with the violation is triggered.

    Responsive cache to improve latency in service-based architectures

    公开(公告)号:US11269775B2

    公开(公告)日:2022-03-08

    申请号:US16691829

    申请日:2019-11-22

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for receiving, by a service, a request for data, transmitting, by the service, a data request to a data source, determining, by the service, that usable data is stored within a fuzzy cache of the service, and in response: calculating supplemental data based on the usable data, and transmitting an initial response including the supplemental data, the initial response being displayed at a client that had transmitted the request for data, and receiving, by the service and from the data source, requested data in response to the request for data, and transmitting, by the service, an updated response including the requested data.

    LOGIC SCALING SETS FOR CLOUD-LIKE ELASTICITY OF LEGACY ENTERPRISE APPLICATIONS

    公开(公告)号:US20210409347A1

    公开(公告)日:2021-12-30

    申请号:US16912870

    申请日:2020-06-26

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for determining, by an instance manager and from a pattern associated with a system executing within a landscape, that a status of the system is to change to scaled-in, the pattern being absent any reference to instances of systems executed within landscapes, in response, identifying, by the instance manager and from a logic scaling set that is associated with the system, one or more instances of the system that are able to be scaled-in, selecting, by the instance manager, at least one instance of the one or more instances, and executing, by the instance manager, scaling of the system based on the at least one instance.

    Service blueprint creation for complex service calls

    公开(公告)号:US10761879B2

    公开(公告)日:2020-09-01

    申请号:US16011751

    申请日:2018-06-19

    Applicant: SAP SE

    Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.

Patent Agency Ranking