Salesforce, inc. (20240348620). COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE simplified abstract

From WikiPatents
Jump to navigation Jump to search

COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE

Organization Name

salesforce, inc.

Inventor(s)

Freeman Parks of San Francisco CA (US)

Ryan D. Woebkenberg of San Francisco CA (US)

COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240348620 titled 'COMPUTING SYSTEM PERMISSION ADMINISTRATION ENGINE

    • Simplified Explanation:**

The patent application discusses identifying permissions for actions within an on-demand computing services environment, granting these permissions to user accounts, and creating designated permission sets based on the degree of overlap between user accounts granted different permissions.

    • Key Features and Innovation:**
  • Identification of permissions for actions within an on-demand computing services environment
  • Granting permissions to user accounts
  • Determining overlap between user accounts granted different permissions
  • Creation of designated permission sets based on overlap threshold
    • Potential Applications:**

This technology could be applied in cloud computing services, software as a service (SaaS) platforms, and other on-demand computing environments.

    • Problems Solved:**

This technology helps manage permissions efficiently within complex computing environments, ensuring proper access control and security measures are in place.

    • Benefits:**
  • Enhanced security through efficient permission management
  • Streamlined access control for user accounts
  • Improved organization of permissions within on-demand computing services
    • Commercial Applications:**

The technology could be utilized by cloud service providers, SaaS companies, and other organizations offering on-demand computing services to enhance security and access control for their users.

    • Prior Art:**

Prior art related to this technology may include research on access control mechanisms in cloud computing environments and permission management systems in on-demand services.

    • Frequently Updated Research:**

Stay updated on advancements in access control technologies, permission management systems, and cloud computing security measures to enhance the efficiency and effectiveness of this technology.

    • Questions about On-Demand Computing Services:**

1. How does this technology improve access control in on-demand computing environments? 2. What are the key factors to consider when determining overlap between user accounts granted different permissions?


Original Abstract Submitted

a plurality of permissions associated with the on-demand computing services environment may be identified. each of the permissions may identify a respective one or more actions permitted to be performed within the on-demand computing services environment. each of the permissions may be granted to a respective one or more user accounts within the on-demand computing services environment. a degree of overlap between a first group of the user accounts granted a first one of the permissions and a second group of the user accounts granted a second one of the permissions may be determined. when the degree of overlap exceeds a designated threshold, a designated permission set that includes the first permission and the second permission may be created.