-
公开(公告)号:US11500731B2
公开(公告)日:2022-11-15
申请号:US17006109
申请日:2020-08-28
Applicant: Palantir Technologies Inc.
Inventor: James Baker
IPC: G06F16/00 , G06F11/14 , G06F16/27 , G06F16/23 , G06F16/215
Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred.
-
公开(公告)号:US20220207025A1
公开(公告)日:2022-06-30
申请号:US17521481
申请日:2021-11-08
Applicant: Palantir Technologies Inc.
Inventor: Jeremy Kong , Grgur Petric Maretic , Gokcan Ozakdag , James Baker , Sandor Van Wassenhove , Thomas Petracca
Abstract: An apparatus and method are disclosed. The method, which may be performed by one or more processors, may comprise receiving timestamp data representing a plurality of database transactions and dividing the timestamp data into a plurality of partitioning quanta (nPQ), each partitioning quantum (PQ) of the plurality of partitioning quanta representing a range of timestamps. Further, for each partitioning quantum (PQ) of the plurality of partitioning quanta (nPQ), the method may comprise allocating the timestamp data, such that sequentially adjacent timestamps are allocated to different partitions of a physical storage system for subsequent storage at the allocated partitions.
-
13.
公开(公告)号:US20220147643A1
公开(公告)日:2022-05-12
申请号:US17582139
申请日:2022-01-24
Applicant: Palantir Technologies Inc.
Inventor: Lam Tran , James Baker , Lili Yang
Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.
-
公开(公告)号:US11169987B2
公开(公告)日:2021-11-09
申请号:US16402700
申请日:2019-05-03
Applicant: Palantir Technologies Inc.
Inventor: Jeremy Kong , Grgur Petric Maretic , Gokcan Ozakdag , James Baker , Sandor Van Wassenhove , Thomas Petracca
Abstract: An apparatus and method are disclosed. The method, which may be performed by one or more processors, may comprise receiving timestamp data representing a plurality of database transactions and dividing the timestamp data into a plurality of partitioning quanta (nPQ), each partitioning quantum (PQ) of the plurality of partitioning quanta representing a range of timestamps. Further, for each partitioning quantum (PQ) of the plurality of partitioning quanta (nPQ), the method may comprise allocating the timestamp data, such that sequentially adjacent timestamps are allocated to different partitions of a physical storage system for subsequent storage at the allocated partitions.
-
公开(公告)号:US20210286804A1
公开(公告)日:2021-09-16
申请号:US17334286
申请日:2021-05-28
Applicant: Palantir Technologies Inc.
Inventor: Grgur Petric Maretic , James Baker , Nathan Ziebart , Sandor Van Wassenhove
IPC: G06F16/23 , G06F16/21 , G06F16/2455
Abstract: A computer-implemented method for targeted sweep of a key-value data storage is provided. The method comprises before a write transaction to a database having a key value store commits, and before each of one or more write commands of the write transaction are persisted to the key value store, writing an entry for each of the one or more write commands to an end of a targeted sweep queue, the entry comprising metadata including: data identifying a cell to which the write command relates, a start timestamp of the write transaction, and information identifying a type of the write transaction.
-
16.
公开(公告)号:US20210124835A1
公开(公告)日:2021-04-29
申请号:US16733415
申请日:2020-01-03
Applicant: Palantir Technologies Inc.
Inventor: Lam Tran , James Baker , Lili Yang
Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.
-
公开(公告)号:US11960362B2
公开(公告)日:2024-04-16
申请号:US17962726
申请日:2022-10-10
Applicant: Palantir Technologies Inc.
Inventor: James Baker
IPC: G06F16/00 , G06F11/14 , G06F16/215 , G06F16/23 , G06F16/27
CPC classification number: G06F11/1451 , G06F11/1464 , G06F16/215 , G06F16/2379 , G06F16/27 , G06F2201/835
Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred.
-
18.
公开(公告)号:US11822687B2
公开(公告)日:2023-11-21
申请号:US17582139
申请日:2022-01-24
Applicant: Palantir Technologies Inc.
Inventor: Lam Tran , James Baker , Lili Yang
CPC classification number: G06F21/6218 , G06F21/602 , H04L9/0643 , H04L41/22 , H04L63/20
Abstract: Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.
-
公开(公告)号:US20230031243A1
公开(公告)日:2023-02-02
申请号:US17962726
申请日:2022-10-10
Applicant: Palantir Technologies Inc.
Inventor: James Baker
IPC: G06F11/14 , G06F16/27 , G06F16/23 , G06F16/215
Abstract: A distributed, transactional database uses timestamps, such as logical clock values, for entry versioning and transaction management in the database. To write to the database, a service requests a timestamp to be inserted into the database with a new version of data. During a backup procedure, a cleanup process is paused, issuing new timestamps is paused, and a backup timestamp is generated, which results in an effective backup copy. During a restore of a backup, a snapshot of the database is loaded and any entries older than the backup timestamp are deleted, which ensures that a consistent restore has occurred.
-
公开(公告)号:US20230017799A1
公开(公告)日:2023-01-19
申请号:US17949965
申请日:2022-09-21
Applicant: Palantir Technologies Inc.
Inventor: Jakob Juelich , James Baker
IPC: G06F16/2455 , G06F21/62 , G06F16/901 , G06F16/16 , G06F16/953
Abstract: Systems, methods, and non-transitory computer readable media are provided for recursively searching a plurality of workspaces of the system for linked data associated with the seed data, initiating an endpoint process for each the seed data and the linked data, and, upon completion of the search, delete the seed data and the linked data identified based at least in part on the endpoint process. The process may be automatically repeated at a predetermined time interval to identify and remove future data that is stored in the plurality of datasets.
-
-
-
-
-
-
-
-
-