-
公开(公告)号:US20220374535A1
公开(公告)日:2022-11-24
申请号:US17663996
申请日:2022-05-18
Applicant: Palantir Technologies Inc.
Inventor: Arnav Jagasia , Mihir Patil , Yeong Wei Wee
Abstract: A computer system is disclosed that provides purpose-based control of user actions and access to electronic data assets. For example, the computer system may perform operations including: receiving, from a user, a request to perform an action; determining any checkpoint config objects associated with the action; displaying checkpoint dialog based on checkpoint config object; determining whether criteria associated with the checkpoint object are satisfied; and in response to determining that the criteria associated with the checkpoint object are satisfied: generating a checkpoint record object; and proceeding to perform the action.
-
公开(公告)号:US20240012797A1
公开(公告)日:2024-01-11
申请号:US18218764
申请日:2023-07-06
Applicant: Palantir Technologies Inc.
Inventor: Arnav Jagasia , Ashley Meuser , Mihir Patil , Pieris Christofi , Sam Stoll
IPC: G06F16/21 , G06F16/23 , G06F16/185
CPC classification number: G06F16/219 , G06F16/2379 , G06F16/2358 , G06F16/185
Abstract: Systems and methods for lineage-aware data retention are provided. An example method includes receiving information of a committed transaction. The committed transaction is configured to add or change data to a dataset. The example method further includes receiving one or more lineages for the committed transaction, determining one or more parent transactions based at least in part on the one or more lineages, obtaining one or more parent retention dates that correspond to the one or more parent transactions respectively, and determining a transaction retention date for the committed transaction based at least in part on the one or more parent retention dates.
-
公开(公告)号:US20230418953A1
公开(公告)日:2023-12-28
申请号:US17846648
申请日:2022-06-22
Applicant: Palantir Technologies Inc.
Inventor: Hugo Dobbelaere , Mihir Patil , Morten Telling , Robert Kruszewski , Yeong Wei Wee
CPC classification number: G06F21/602 , H04L9/088
Abstract: An apparatus, computer-implemented method and computer program are disclosed for performing a cryptographic operation in a high-trust (HT) environment. The HT environment including a compute service and key storage service. The compute service receives from a user device, a user request for performing a cryptographic operation on at least a portion of a large-scale dataset. The user request including a user token associated with a user of the user device. The compute service sends to the key storage service, a cryptographic key access request corresponding to the received user request. The cryptographic key access request including data representative of the user token and/or a compute service token. The key storage service determines from the user token and/or compute service token whether the user has permission to have the cryptographic operation performed and/or whether to grant the compute service access to data representative of the cryptographic key in relation to the requested cryptographic operation when user has permission. In response to the key storage service granting access to the compute service, the key storage service sends to the compute service the requested cryptographic key/algorithm associated with the cryptographic operation of the user request. The compute service performs the cryptographic operation on the portion of the large-scale dataset based on the received cryptographic key/algorithm.
-
公开(公告)号:US11521100B1
公开(公告)日:2022-12-06
申请号:US16667820
申请日:2019-10-29
Applicant: Palantir Technologies Inc.
Inventor: Megha Arora , Samuel Szuflita , Hao Dang , Mihir Patil , Yeong Wei Wee , Alice Yu
Abstract: Systems and methods are provided for processing an input dataset or running an inference. The systems and methods may be configured to accept an input dataset, access one or more predefined logic plugins for processing the input dataset, process the input dataset based at least in part on a first predefined logic plugin, and generate the one or more outputs based at least in part of the processing of the input dataset. The one or more outputs may have a different format than a format of the input dataset.
-
公开(公告)号:US12197385B2
公开(公告)日:2025-01-14
申请号:US18307553
申请日:2023-04-26
Applicant: Palantir Technologies Inc.
Inventor: Arnav Jagasia , Ashley Meuser , Hugo Dobbelaere , Mihir Patil , Sam Stoll , Pieris Christofi
Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.
-
公开(公告)号:US12010232B2
公开(公告)日:2024-06-11
申请号:US17502624
申请日:2021-10-15
Applicant: Palantir Technologies Inc.
Inventor: Mihir Patil , Hugo Dobbelaere , Yeong Wei Wee , Maia Hamin , Piotr Kraus , Yurii Mashtalir , Hussein Farah , Alexander Galimberti , Caterina Wanka , Lukas Czypulovski , Juraj Micko , Nezihe Pehlivan
CPC classification number: H04L9/3215 , G06F21/10 , H04L9/0861 , H04L9/0894 , H04L2209/60
Abstract: A cryptography administration system facilitates secure, user-friendly and auditable cryptography. An administrator may create channels with associated cryptographic keys and algorithms for performing cryptographic operations such as encryption and decryption. The channel may be associated with licenses which may include permissions to perform cryptographic operations. The licenses may be shared with one or more users. A user may perform cryptographic operations using the channel according to the permissions and operations included in the licenses, to which the user has access, associated with the channel. The user does not need a technical understanding of the cryptographic system (e.g., keys and algorithms) to perform the cryptographic operations and does not need access to the keys to perform the operations. The cryptographic operations may be stored in an audit log that can be reviewed by user.
-
公开(公告)号:US20230350843A1
公开(公告)日:2023-11-02
申请号:US18307553
申请日:2023-04-26
Applicant: Palantir Technologies Inc.
Inventor: Arnav Jagasia , Ashley Meuser , Hugo Dobbelaere , Mihir Patil , Sam Stoll , Pieris Christofi
CPC classification number: G06F16/125 , G06F16/162
Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.
-
公开(公告)号:US20250156373A1
公开(公告)日:2025-05-15
申请号:US18965516
申请日:2024-12-02
Applicant: Palantir Technologies Inc.
Inventor: Arnav Jagasia , Ashley Meuser , Hugo Dobbelaere , Mihir Patil , Sam Stoll , Pieris Christofi
Abstract: A computer system provides transaction-level data retention policy inheritance. The system may perform operations including storing a first dataset comprising a plurality of transactions, each of the plurality of transactions comprising one or more data items; receiving a first transaction to the first dataset, the first transaction comprising one or more data items; determining a first retention policy for the first transaction; and storing the first retention policy with the first transaction. The system may further perform operations including calculating a deletion date for the first transaction based on the first retention policy; and storing the deletion date with the first transaction in the first dataset.
-
公开(公告)号:US20240283652A1
公开(公告)日:2024-08-22
申请号:US18654469
申请日:2024-05-03
Applicant: Palantir Technologies Inc.
Inventor: Mihir Patil , Hugo Dobbelaere , Yeong Wei Wee , Maia Hamin , Piotr Kraus , Yurii Mashtalir , Hussein Farah , Alexander Galimberti , Caterina Wanka , Lukas Czypulovski , Juraj Micko , Nezihe Pehlivan
CPC classification number: H04L9/3215 , G06F21/10 , H04L9/0861 , H04L9/0894 , H04L2209/60
Abstract: A cryptography administration system facilitates secure, user-friendly and auditable cryptography. The system can generate an encrypted data value from raw data values with a user-selected cryptography algorithm. The encrypted data value can comprise a pointer configured to access a location in storage comprising a cryptography key for decrypting the encrypted data value. The system can generate a license comprising one or more permissions of a user to decrypt the encrypted data value. The system can store the license in the location in storage accessible by the pointer of the encrypted data value.
-
公开(公告)号:US20240202865A1
公开(公告)日:2024-06-20
申请号:US18116215
申请日:2023-03-01
Applicant: Palantir Technologies Inc.
Inventor: Arnav JAGASIA , Anisha TANDON , David HERRERO-QUEVEDO , Fee CHRISTOPH , Lars CARIUS , Mihir Patil
CPC classification number: G06T3/0056 , G06F21/6209 , G06V10/70 , G06T2200/24 , G06V2201/10
Abstract: A computer-implemented method, system and computer program is disclosed. The method may comprise providing an image comprising a plurality of pixels, identifying at least one portion of the image to be obfuscated, modifying pixels of the at least one image portion using a key for producing an updated image in which the at least one image portion is obfuscated, providing the key, or a link to the key, in an access profile for the identified at least one image portion and allocating permissions to one or more users for enabling them to view the at least one image portion, by use of the key, when viewing the updated image.
-
-
-
-
-
-
-
-
-