Salesforce, Inc. patent applications on August 15th, 2024
Patent Applications by Salesforce, Inc. on August 15th, 2024
Salesforce, Inc.: 2 patent applications
Salesforce, Inc. has applied for patents in the areas of G06F9/54 (1), H04L51/212 (1), H04L9/40 (1) G06F9/546 (1), H04L63/1433 (1)
With keywords such as: application, web, firewall, instance, client, code, executable, vulnerability, information, and systems in patent application abstracts.
Patent Applications by Salesforce, Inc.
[[20240272969. METHOD AND SYSTEM FOR PROCESSING A STREAM OF INCOMING MESSAGES SENT FROM A SPECIFIC INPUT MESSAGE SOURCE AND VALIDATING EACH INCOMING MESSAGE OF THAT STREAM BEFORE SENDING THEM TO A SPECIFIC TARGET SYSTEM_simplified_abstract_(salesforce, inc.)]]
Inventor(s): Steven Joseph Crouse of Halifax CA (US) for salesforce, inc., Charles Cox of Halifax CA (US) for salesforce, inc.
IPC Code(s): G06F9/54, H04L51/212
CPC Code(s): G06F9/546
Abstract: methods and systems are provided for processing a stream of incoming messages sent from a specific input message source and validating each incoming message of that stream before sending them to a specific target system.
Inventor(s): Jose Lejin P J of Bangalore (IN) for salesforce, inc.
IPC Code(s): H04L9/40
CPC Code(s): H04L63/1433
Abstract: database systems and methods are provided for securing an instance of a web application from vulnerabilities in third party libraries using a web application firewall. one method involves receiving, at a web application firewall between an application server and a client, vulnerability information associated with the web application, generating, at the web application firewall, executable code for securing the instance of the web application based at least in part on the vulnerability information, providing, by the web application firewall, the executable code to the client over a network, and thereafter detecting a vulnerable library associated with the instance of the web application, wherein the client executes the executable code to secure the instance of the web application in response to detecting the vulnerable library.