-
公开(公告)号:US11570183B2
公开(公告)日:2023-01-31
申请号:US16895988
申请日:2020-06-08
Applicant: SAP SE
Inventor: Harikrishnan Mangayil , Abhishek Nagendra , Yash Bagadia , Subhadeep Khan , Jayant Sable , Srinivas Vinnakota , Sukesh Kaul
IPC: H04L29/06 , H04L9/40 , G06F16/245
Abstract: A distribution network communicates content to tenant groups in a secure manner. An engine of the distribution network receives content created utilizing an application having different customers and partners. The engine also receives: a first identifier indicating a customer of the application with which a tenant is associated, and a second identifier indicating a partner of the application with which the tenant is associated. The engine references a stored database table to correlate the first identifier and the second identifier. Based upon the first identifier and the second identifier, the engine evaluates whether the tenant is to be provided access to the content. The engine may provide the tenant with the content according to an access right determined from the first identifier and the second identifier. Certain embodiments may find particular use disseminating content to new tenants of a customer, based upon prior distribution to other tenants of that customer.
-
公开(公告)号:US11226943B2
公开(公告)日:2022-01-18
申请号:US16867304
申请日:2020-05-05
Applicant: SAP SE
Inventor: Harikrishnan Mangayil , Srinivas Vinnakota , Abhishek Nagendra , Sukesh Kaul , Subhadeep Khan , Yash Bagadia
Abstract: A distribution network may efficiently communicate items/item details in a private manner, with different access rights tailored to various tenants residing within a same or different customer landscape. A first input comprising a flat file with items/item details, is received. A second input comprising permissions entries for per-user, per-item direct access rights (e.g., view, read, write, delete) is also received. The first and second inputs are recursively processed to find nearest ancestors having the direct access rights, with a hash maintained including the nearest ancestors. An effective permitted structure (e.g., tree comprising root and leaf nodes) is generated by recursively adding descendant items having inherited access rights, to the nearest ancestors. Ultimately, descendant item(s) are privately distributed to a user with an access right according to the effective permitted structure. Embodiments may be particularly suited to the private distribution of analytics content (e.g., dimensions, stories, views) to various tenants.
-
公开(公告)号:US20230064676A1
公开(公告)日:2023-03-02
申请号:US17463117
申请日:2021-08-31
Applicant: SAP SE
Inventor: Arpitha A Shetty , Veekshitha , Srinivas Vinnakota , Amrita Prabhakaran , Vijaya Pramilamma Bovilla , Priyanka Kommanapalli
IPC: G06F16/26 , G06F16/2458 , G06F16/242 , G06F21/62 , G06F16/25
Abstract: A method for accessing data stored in a database may include receiving a query to generate, based on blended data, a visualization. The blended data may include a first set of data from a first data source and a second set of data from a second data source. The query may also include a payload. The method may also include accessing the first set of data by injecting, into the payload, the first permission, and transmitting, to the first data source, the payload including the first permission. The method may also include accessing the second set of data by injecting, into the payload, the second permission, and transmitting, to the second data source, the payload including the first permission, the first set of data, and the second permission. The method may also include causing, using the blended data, presentation of the visualization. Related systems and articles of manufacture are provided.
-
公开(公告)号:US20210349870A1
公开(公告)日:2021-11-11
申请号:US16867304
申请日:2020-05-05
Applicant: SAP SE
Inventor: Harikrishnan Mangayil , Srinivas Vinnakota , Abhishek Nagendra , Sukesh Kaul , Subhadeep Khan , Yash Bagadia
Abstract: A distribution network may efficiently communicate items/item details in a private manner, with different access rights tailored to various tenants residing within a same or different customer landscape. A first input comprising a flat file with items/item details, is received. A second input comprising permissions entries for per-user, per-item direct access rights (e.g., view, read, write, delete) is also received. The first and second inputs are recursively processed to find nearest ancestors having the direct access rights, with a hash maintained including the nearest ancestors. An effective permitted structure (e.g., tree comprising root and leaf nodes) is generated by recursively adding descendant items having inherited access rights, to the nearest ancestors. Ultimately, descendant item(s) are privately distributed to a user with an access right according to the effective permitted structure. Embodiments may be particularly suited to the private distribution of analytics content (e.g., dimensions, stories, views) to various tenants.
-
公开(公告)号:US20210328998A1
公开(公告)日:2021-10-21
申请号:US16895988
申请日:2020-06-08
Applicant: SAP SE
Inventor: Harikrishnan Mangayil , Abhishek Nagendra , Yash Bagadia , Subhadeep Khan , Jayant Sable , Srinivas Vinnakota , Sukesh Kaul
IPC: H04L29/06 , G06F16/245
Abstract: A distribution network communicates content to tenant groups in a secure manner. An engine of the distribution network receives content created utilizing an application having different customers and partners. The engine also receives: a first identifier indicating a customer of the application with which a tenant is associated, and a second identifier indicating a partner of the application with which the tenant is associated. The engine references a stored database table to correlate the first identifier and the second identifier. Based upon the first identifier and the second identifier, the engine evaluates whether the tenant is to be provided access to the content. The engine may provide the tenant with the content according to an access right determined from the first identifier and the second identifier. Certain embodiments may find particular use disseminating content to new tenants of a customer, based upon prior distribution to other tenants of that customer.
-
公开(公告)号:US20240143616A1
公开(公告)日:2024-05-02
申请号:US18050427
申请日:2022-10-27
Applicant: SAP SE
Inventor: Vignesh Sankaran , Srinivas Vinnakota , Arpitha A Shetty , Sohandeep Das
IPC: G06F16/25 , G06F16/245
CPC classification number: G06F16/254 , G06F16/245
Abstract: An application embedded within a cloud application may load a data object which accesses information from a database to generate visualizations of data. When the data object is transported from a development system to a production system, the database may not have table entries and views as expected and loading the data object might fail. In such cases, the datasource may be created from metadata. A first metadata call is sent to the database using the application metadata and an indication that a datasource was not found is received from the database. Query metadata is extracted from the application metadata of the data object and a datasource creation call is sent to the database using the extracted query metadata, thereby initiating creation of a datasource artifact in the database. Then, query results are obtained based on the datasource artifact and query results are provided in the cloud application.
-
公开(公告)号:US11809445B2
公开(公告)日:2023-11-07
申请号:US17463117
申请日:2021-08-31
Applicant: SAP SE
Inventor: Arpitha A Shetty , Veekshitha , Srinivas Vinnakota , Amrita Prabhakaran , Vijaya Pramilamma Bovilla , Priyanka Kommanapalli
IPC: G06F16/26 , G06F16/2458 , G06F16/25 , G06F16/242 , G06F21/62
CPC classification number: G06F16/26 , G06F16/2445 , G06F16/2471 , G06F16/25 , G06F21/6227 , G06F2221/2141
Abstract: A method for accessing data stored in a database may include receiving a query to generate, based on blended data, a visualization. The blended data may include a first set of data from a first data source and a second set of data from a second data source. The query may also include a payload. The method may also include accessing the first set of data by injecting, into the payload, the first permission, and transmitting, to the first data source, the payload including the first permission. The method may also include accessing the second set of data by injecting, into the payload, the second permission, and transmitting, to the second data source, the payload including the first permission, the first set of data, and the second permission. The method may also include causing, using the blended data, presentation of the visualization. Related systems and articles of manufacture are provided.
-
-
-
-
-
-