-
公开(公告)号:US11716349B2
公开(公告)日:2023-08-01
申请号:US17319770
申请日:2021-05-13
Applicant: SAP SE
Inventor: Udo Klein
IPC: G06F16/00 , H04L9/40 , G06N20/00 , G06F16/2458 , G06F16/22 , G06F18/214
CPC classification number: H04L63/1466 , G06F16/2255 , G06F16/2462 , G06F18/214 , G06N20/00
Abstract: Techniques and solutions are described for detecting malicious database activity, such as SQL injection attempts. A first machine learning classifier can be trained by comparing processed and unprocessed user input, where a difference between the two can indicate suspicious or malicious activity. The trained classifier can be used to analyze user input before query execution. A second machine learning classifier is trained with a data set that includes call stack information for an application requesting execution of a dynamic query and query statistics associated with processing of the query at the database. The query of the application can be correlated with a corresponding database query by hashing the application query and the database query and comparing the hash values, where matching hash value indicate a common query. The trained classifier can monitor execution of future queries to identify queries having anomalous patterns, which may indicate malicious or suspicious activity.
-
公开(公告)号:US20200042156A1
公开(公告)日:2020-02-06
申请号:US16051548
申请日:2018-08-01
Applicant: SAP SE
Inventor: Tim Philipp Trabold , Udo Klein
IPC: G06F3/0481 , G06F17/30
Abstract: Provided are systems and methods which generate and display an three-dimensional (3D) object representing multiple values. Rotation of the object provides different views of the values enabling easier understanding of the differences. In one example, the method may include receiving a first dataset and a second dataset, identifying a value from the first dataset and a value from the second dataset which are associated with each other, generating a rotational three-dimensional (3D) object comprising a first component having a size representing the value from the first dataset and a second component having a size representing the value from the second dataset value, and outputting the rotational 3D object via a user interface where the rotational 3D object is configured to display different rotational views of the first and second component.
-
公开(公告)号:US10360234B2
公开(公告)日:2019-07-23
申请号:US15335004
申请日:2016-10-26
Applicant: SAP SE
Inventor: Udo Klein
IPC: G06F16/25 , G06F16/178
Abstract: A method, a system, and a computer program product for data extraction are disclosed. At least one container of data is analyzed to determine format of at least a portion of data contained in the container. Based on the determined format of the portion of data, at least one extractor in a plurality of extractors is selected to extract the portion of data from the container. The portion of data is extracted from the container and a structure of the extracted portion of data is generated for performing analysis of a content of the extracted portion of data.
-
公开(公告)号:US20190213350A1
公开(公告)日:2019-07-11
申请号:US15863140
申请日:2018-01-05
Applicant: SAP SE
Inventor: Udo Klein , Michael Kusber
CPC classification number: G06F21/6227 , G06F7/582 , G06F16/2282 , G06F16/951 , G06F21/6245 , G06F21/64 , H04L9/0643 , H04L9/0656 , H04L9/0869 , H04L9/3297 , H04L63/083 , H04L63/0884 , H04L2209/08
Abstract: An alias key is generated for each person identification (ID) in a database table. The alias key us used to lookup the corresponding person ID in the database table. In addition, for each alias key, a temporary alias key is generated that is used to lookup the corresponding alias key in the database table. A plurality of queries are received from at least one remote client that each specify at least one of the temporary alias keys. Data is later transmitted to the at least one remote client that is responsive to the queries. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US20180300290A1
公开(公告)日:2018-10-18
申请号:US15486484
申请日:2017-04-13
Applicant: SAP SE
Inventor: Udo Klein
Abstract: Virtualized infrastructure instances are provided for running applications where electronic documents are rendered. The documents may comprise active content associated with risk of security issues. The documents are pre-processed to determine required software functionality for rendering. An index table including documents' characteristics relevant for displaying is generated. The characteristics include a correspondingly defined application for rendering a document, an OS for running the application, other. An identification of a document is received for displaying in a UI application separate from the virtualized instances. The first document is rendered on a virtualized instance from the infrastructure instances. The virtual instance is selected based on requirements for rendering the requested document, such as compatible application and OS. The rendered first document at the virtualized instance is displayed at the UI application on a virtual screen. The request for displaying is received by a user in a document analysis scenario.
-
公开(公告)号:US20180268422A1
公开(公告)日:2018-09-20
申请号:US15460710
申请日:2017-03-16
Applicant: SAP SE
Inventor: Udo Klein , Oliver Klemenz
IPC: G06Q30/00
CPC classification number: G06Q30/0185
Abstract: Integrity of a physical object is verified by receiving, data encapsulating a request to verify the integrity of the physical object. Subsequently, a data structure is accessed that includes a plurality of linked segments each characterizing an entity within a supply chain for the physical object. Each segment includes a respective predecessor field and a respective hash value. All of the segments can be iterated through in reverse chronological order to confirm, for each segment, whether a value for the predecessor field is equal to a hash value in a hash field in an immediately previously segment, the hash value being a hash of all values of the particular segment. Data characterizing the iteration can then be provided. Related apparatus, systems, techniques and articles are also described.
-
公开(公告)号:US20180137238A1
公开(公告)日:2018-05-17
申请号:US15352147
申请日:2016-11-15
Applicant: SAP SE
Inventor: Jens Odenheimer , Udo Klein
IPC: G06F19/22
CPC classification number: G16B30/00
Abstract: A plurality of deoxyribonucleic acid (DNA) reads is received, where each DNA read represents a portion of a DNA sequence of a patient's DNA sample. The plurality of DNA reads is assembled into an aligned DNA sequence based on a human reference DNA sequence. At least one variant is identified by comparing the aligned DNA sequence to the human reference sequence, where each variant represents a difference between the aligned DNA sequence and the human reference sequence. A plurality of virus reference DNA sequences is received, where each virus reference sequence represents a DNA sequence of a virus. For each identified variant and each of the plurality of virus reference sequences, a correlation is computed between the variant and the virus reference sequence.
-
公开(公告)号:US20180113920A1
公开(公告)日:2018-04-26
申请号:US15335004
申请日:2016-10-26
Applicant: SAP SE
Inventor: Udo Klein
CPC classification number: G06F16/258 , G06F16/1794
Abstract: A method, a system, and a computer program product for data extraction are disclosed. At least one container of data is analyzed to determine format of at least a portion of data contained in the container. Based on the determined format of the portion of data, at least one extractor in a plurality of extractors is selected to extract the portion of data from the container. The portion of data is extracted from the container and a structure of the extracted portion of data is generated for performing analysis of a content of the extracted portion of data.
-
公开(公告)号:US11900137B2
公开(公告)日:2024-02-13
申请号:US17672540
申请日:2022-02-15
Applicant: SAP SE
Inventor: Udo Klein , Achim Seubert , Lukas Melzer , Daniel Goldmann
CPC classification number: G06F9/45529 , G06F9/542
Abstract: A method for configurable in-application event logging may include receiving, from a client device, one or more user inputs specifying at least one of an event of interest associated with an operation of a software application and a data to collect in response to the event of interest. A logging agent may be configured, based on the user inputs, to respond to the specified event of interest by generating one or more log messages including the specified data. The logging agent may be as a first programming code embedded within a second programming code implementing the software application such that the logging agent is able to access a context of each executing instance of the software application. Related systems and computer program products are also provided.
-
公开(公告)号:US20220021523A1
公开(公告)日:2022-01-20
申请号:US16932197
申请日:2020-07-17
Applicant: SAP SE
Inventor: Udo Klein , Richard Lindner
Abstract: A containerized application is initialized in a cloud-based computing environment. Thereafter, the containerized application obtains environment variables encapsulating credentials. The containerized application stores the environment variables in a secret store of the containerized application. The environment variables are later wiped upon completion of the storing of the environment variables. Related apparatus, systems, techniques and articles are also described.
-
-
-
-
-
-
-
-
-