INTEGRATED SELF-CUSTODY CRYPTOGRAPHIC TRANSACTIONS

    公开(公告)号:US20250045741A1

    公开(公告)日:2025-02-06

    申请号:US18925424

    申请日:2024-10-24

    Applicant: SAP SE

    Abstract: This disclosure describes systems, software, and computer implemented methods including receiving a request from a second entity to transfer a digital asset to a first entity. Receiving a request for an address and public key is sent to an asset custody application executing on a device that is managed by the first entity. Receiving, a public key and a wallet address and sends the wallet address to the second entity. Further this disclosure describes receiving a request to transfer a digital asset from a first entity to a second entity. Generating a transaction package pursuant to the one or more parameters, the transaction package including a transaction and a public key of a digital wallet associated with the first entity. Executing the transaction and sending the signed transaction package to a distributed ledger.

    REAL-TIME RISK ASSESSMENT OF CODE CONTRIBUTIONS

    公开(公告)号:US20250045413A1

    公开(公告)日:2025-02-06

    申请号:US18230577

    申请日:2023-08-04

    Applicant: SAP SE

    Abstract: Contribution requests to a code repository are analyzed with a machine learning model before publishing. The machine learning model can be trained with past metadata of the contributor. Metadata can be extracted from the requests to determine whether the request is atypical for the contributor via a risk score. Requests determined to be atypical can be flagged for action by a security manager. Realtime assessment of code contributions can increase overall software security in a software development context.

    DEDUPLICATION OF COMPUTER PROGRAMS USING SIMILARITY MEASURES AND ARTIFICIAL INTELLIGENCE

    公开(公告)号:US20250045043A1

    公开(公告)日:2025-02-06

    申请号:US18229915

    申请日:2023-08-03

    Applicant: SAP SE

    Abstract: Various embodiments for deduplication of APIs using similarity measures and artificial intelligence are described herein. An embodiment operates by receiving a request to compare a first computing program to a second computing program, wherein each computing program includes an address, one or more tables accessed by a respective computing program, one or more input parameters, and one or more output parameters. Similarity measures are calculated between the addresses, tables, input parameters, and output parameters of the two computing programs. The similarity measures are provided to a trained artificial intelligence (AI) model, which generates a similarity determination. Performed an action based on the similarity determination.

    Cross-functional application data attachment retrieval

    公开(公告)号:US12216716B2

    公开(公告)日:2025-02-04

    申请号:US18049063

    申请日:2022-10-24

    Applicant: SAP SE

    Abstract: In an implementation, a request for one or more attachments stored in an application document store is received from a requestor and by an application agent associated with an application. For each attachment identified in the request, the application agent: 1) requests the attachment from a data privacy integration (DPI) kernel service; 2) receives a download link to an attachment in the application document store; 3) downloads, using the download link, the attachment from the application document store; 4) informs the DPI kernel service that a download of the attachment is complete; and 5) receives a message from the DPI kernel service that the download link has been deactivated. The application agent returns the one or more attachments to the requestor.

    Techniques for integrating data for multiple instances of a data artifact

    公开(公告)号:US12216636B2

    公开(公告)日:2025-02-04

    申请号:US17846347

    申请日:2022-06-22

    Applicant: SAP SE

    Inventor: Daniel Buchmann

    Abstract: The present disclosure provides techniques and solutions for integrating data from different instances of a data source, such as a data artifact. That is, in some cases data may be disjoint, or it may overlap in whole or part. How data should be integrated can depend on whether data overlaps, or a type or extent of overlap. An artifact that consumes data can be integrated to indicate how data from underlying instances of a data source should be integrated, including when this consuming artifact requests data indirectly from a consolidation artifact. A search against the consuming artifact can be modified based on configuration information in the consuming artifact indicating how or if data from multiple instances of the data source should be integrated.

    Software testing with reliability metric

    公开(公告)号:US12216570B2

    公开(公告)日:2025-02-04

    申请号:US17881465

    申请日:2022-08-04

    Applicant: SAP SE

    Abstract: An example method comprises forming a communication link between a software test orchestration tool and a testing dashboard; receiving from the software test orchestration tool an indication of software test results at the application level of granularity, wherein the results indicate reliability status for a plurality of software applications; and calculating a reliability metric based on the indication of software test results.

    INTERPRETABILITY FRAMEWORK FOR DIFFERENTIALLY PRIVATE DEEP LEARNING

    公开(公告)号:US20250036811A1

    公开(公告)日:2025-01-30

    申请号:US18904462

    申请日:2024-10-02

    Applicant: SAP SE

    Abstract: Data is received that specifies a bound for an adversarial posterior belief pc that corresponds to a likelihood to re-identify data points from the dataset based on a differentially private function output. Privacy parameters ε, δ are then calculated based on the received data that govern a differential privacy (DP) algorithm to be applied to a function to be evaluated over a dataset. The calculating is based on a ratio of probabilities distributions of different observations, which are bound by the posterior belief pc as applied to a dataset. The calculated privacy parameters are then used to apply the DP algorithm to the function over the dataset. Related apparatus, systems, techniques and articles are also described.

    OBJECT-BASED TEXT SEARCHING USING GROUP SCORE EXPRESSIONS

    公开(公告)号:US20250036672A1

    公开(公告)日:2025-01-30

    申请号:US18358796

    申请日:2023-07-25

    Applicant: SAP SE

    Abstract: Methods and systems for object-based text searching using group score expressions are provided. A method may include receiving a query including a request to search specified columns of a table for a set of search terms, and a group score filter for use in filtering the table based at least on a group score associated with a plurality of groups of rows of the table, determining the group score for each of a plurality of groups of rows of the table, filtering the table based at least on the group score filter included in the query and the group score determined for each of the plurality of groups of rows of the table, and providing at least one group of rows of the plurality of groups of rows that includes at least the portion of the set of search terms.

Patent Agency Ranking