-
公开(公告)号:US20190050376A1
公开(公告)日:2019-02-14
申请号:US15673691
申请日:2017-08-10
Applicant: SAP SE
Inventor: Rouven Krebs , Steffen Koenig , Benjamin Hoke , Jochen Wilhelm , Christian Rost , Matthias Meissner
Abstract: Techniques are described for automatically analyzing received values to determine their semantic meaning and apply one or more formatting modifications and/or emphases to the received values based on the determined semantic meaning. In one example, a value to be formatted based on a semantic context associated with at least two portions of the received value is received. In response, a semantic rules associated with the received value is identified. The received value is semantically processed using the semantic rules, where processing includes identifying at least two portions of the value corresponding to their contexts. At least one formatting rule is determined as associated with the two or more semantic contexts, each formatting rule associated with a particular context. The formatting rules are applied to the corresponding portions of the received values associated their semantic contexts to generate a modified version of the received value, which is then provided for presentation.
-
公开(公告)号:US12105791B2
公开(公告)日:2024-10-01
申请号:US17455721
申请日:2021-11-19
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm
CPC classification number: G06F21/45 , H04L9/30 , H04L9/3226 , H04L63/08
Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.
-
公开(公告)号:US20230297438A1
公开(公告)日:2023-09-21
申请号:US17699296
申请日:2022-03-21
Applicant: SAP SE
Inventor: Rouven Krebs , Maximilian Stefanac , Waldemar Firus
CPC classification number: G06F9/5077 , G06F9/5022 , G06F11/3423 , G06F2209/5019
Abstract: Methods, systems, and computer-readable storage media for receiving a set of timeseries, each timeseries in the set of timeseries representing a parameter of execution of the system, pre-processing each timeseries in the set of timeseries to provide a set of pre-processed timeseries, merging timeseries in the set of timeseries to provide a merged timeseries, generating a consolidated timeseries based on the merged timeseries and a periodicity, deriving a pattern based on the consolidated time series, the pattern defining a scaling factor for each period in a timeframe, and executing, by an instance manager, scaling of the system based on the pattern to selectively scale one or more of instances of the system and controllable resources based on scaling factors of the pattern.
-
公开(公告)号:US20230161864A1
公开(公告)日:2023-05-25
申请号:US17455721
申请日:2021-11-19
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm
CPC classification number: G06F21/45 , H04L9/3226 , H04L63/08 , H04L9/30
Abstract: The present disclosure relates to computer-implemented methods, software, and systems for identifying potential attacks through monitoring of user credential login attempts across a network of websites. One example method includes receiving a request associated with an authentication of a requestor at a landscape environment. In response to receiving the request encrypted credentials responsive to the request are loaded at a credential manager running at the landscape environment. The encrypted credentials are persisted at a storage by the credential manager. The encrypted credentials include credentials that are encrypted with a public key and are provided in encrypted form to the credential manager. The encrypted credentials are provided to a credential usage component running at the landscape environment for decrypting the encrypted credential with a private key persisted by the credential usage component at the landscape environment.
-
公开(公告)号:US20190384630A1
公开(公告)日:2019-12-19
申请号:US16011751
申请日:2018-06-19
Applicant: SAP SE
Inventor: Benjamin Hoke , Jochen Wilhelm , Steffen Koenig , Rouven Krebs
IPC: G06F9/48
Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.
-
公开(公告)号:US20190042737A1
公开(公告)日:2019-02-07
申请号:US15665758
申请日:2017-08-01
Applicant: SAP SE
Inventor: Rouven Krebs
Abstract: Techniques are described for automatically incorporating lifecycle information for a secured environment (SE) into an intrusion detection system monitoring the secured environment's operations. In one example, a secured environment comprising at least one component is monitored, where the secured environment is associated with a lifecycle operations manager (LOM) responsible for managing lifecycle operations associated with at least one component in the SE. One or more log files associated with operations of each of the at least one components are obtained, along with log files associated with lifecycle operations executed by the LOM. A determination is made as to whether the particular activities documented in the log files indicate a violation of at least one malicious action rule. In response to determining that the log files are associated with a malicious action rule, a mitigation action associated with the violation is triggered.
-
公开(公告)号:US11805177B2
公开(公告)日:2023-10-31
申请号:US17534791
申请日:2021-11-24
Applicant: SAP SE
Inventor: Rouven Krebs , Jochen Wilhelm , Christian Rost
IPC: H04L67/141 , H04L67/143 , H04L9/40 , G06F9/455 , H04L67/01
CPC classification number: H04L67/141 , G06F9/45558 , H04L63/0823 , H04L63/108 , H04L67/01 , H04L67/143 , G06F2009/45595
Abstract: Programs, systems, and methods are described for providing on-demand applications to users by infrastructure as a service platforms. A request catcher may receive a request to start an application that runs on a managed system that is scheduled to be off. The request catcher or a management application may verify that the user has authorization to access the application and request to the management application to start the managed system. The management application may start the managed system and the managed system may then provide access to the application to the user.
-
公开(公告)号:US11269775B2
公开(公告)日:2022-03-08
申请号:US16691829
申请日:2019-11-22
Applicant: SAP SE
Inventor: Rouven Krebs , Steffen Koenig
IPC: G06F12/0862
Abstract: Methods, systems, and computer-readable storage media for receiving, by a service, a request for data, transmitting, by the service, a data request to a data source, determining, by the service, that usable data is stored within a fuzzy cache of the service, and in response: calculating supplemental data based on the usable data, and transmitting an initial response including the supplemental data, the initial response being displayed at a client that had transmitted the request for data, and receiving, by the service and from the data source, requested data in response to the request for data, and transmitting, by the service, an updated response including the requested data.
-
公开(公告)号:US20210409347A1
公开(公告)日:2021-12-30
申请号:US16912870
申请日:2020-06-26
Applicant: SAP SE
Inventor: Rouven Krebs , Steffen Koenig
IPC: H04L12/911 , H04L12/923 , G06F9/355
Abstract: Methods, systems, and computer-readable storage media for determining, by an instance manager and from a pattern associated with a system executing within a landscape, that a status of the system is to change to scaled-in, the pattern being absent any reference to instances of systems executed within landscapes, in response, identifying, by the instance manager and from a logic scaling set that is associated with the system, one or more instances of the system that are able to be scaled-in, selecting, by the instance manager, at least one instance of the one or more instances, and executing, by the instance manager, scaling of the system based on the at least one instance.
-
公开(公告)号:US10761879B2
公开(公告)日:2020-09-01
申请号:US16011751
申请日:2018-06-19
Applicant: SAP SE
Inventor: Benjamin Hoke , Jochen Wilhelm , Steffen Koenig , Rouven Krebs
IPC: G06F9/48
Abstract: Methods, systems, and computer-readable storage media for executing service calls, and include receiving a service call including a flat structure of a set of key-value pairs, providing a blueprint including one or more blueprint expressions, for at least one blueprint expression included in the blueprint, determining a specific value by processing at least one blueprint expression of the blueprint using a value of a key-value pair, and providing the specific value for execution of the process.
-
-
-
-
-
-
-
-
-