-
公开(公告)号:US12182106B2
公开(公告)日:2024-12-31
申请号:US18211403
申请日:2023-06-19
Applicant: Palantir Technologies Inc.
Inventor: Grgur Petric Maretic , James Baker , Nathan Ziebart , Sandor Van Wassenhove
IPC: G06F7/00 , G06F16/21 , G06F16/23 , G06F16/2455
Abstract: A computer-implemented method for targeted sweep of a key-value data storage is provided. The method comprises before a write transaction to a database having a key value store commits, and before each of one or more write commands of the write transaction are persisted to the key value store, writing an entry for each of the one or more write commands to an end of a targeted sweep queue, the entry comprising metadata including: data identifying a cell to which the write command relates, a start timestamp of the write transaction, and information identifying a type of the write transaction.
-
公开(公告)号:US20240427911A1
公开(公告)日:2024-12-26
申请号:US18823436
申请日:2024-09-03
Applicant: PALANTIR TECHNOLOGIES INC.
Inventor: Anton APOSTOLATOS , Adam LIESKOVSKÝ , Florian DIEGRUBER , Francisco FERREIRA , Joseph KANE , Joanna PELLER , Kelvin LAU , Maciej LASKA , Mikael Ibrahim MOFARREJ , Max-Philipp SCHRADER , Philipp HOEFER , Spencer McCOLLESTER , Viktor NORDLING
Abstract: A computer-implemented method enforces data security constraints in a data pipeline. The data pipeline takes one or more source datasets as input and performs one or more data transformations on them. The method includes using data defining one or more data security constraints to configure the data pipeline to perform a data transformation on a restricted subset of entries of the source datasets. The restriction is defined by the data defining one or more data security constraints. The method further includes performing the data transformation according to the configuration to produce one or more transformed datasets. The method further includes using the data defining one or more data security constraints to perform a verification on one or more of the transformed datasets to ensure that entries in the one or more of the transformed datasets are restricted as defined by the one or more data security constraints.
-
公开(公告)号:US12174800B2
公开(公告)日:2024-12-24
申请号:US18415253
申请日:2024-01-17
Applicant: Palantir Technologies Inc.
Inventor: David Lisuk , Daniel Erenrich , Guodong Xu , Luis Voloch , Rahul Agarwal , Simon Slowik , Aleksandr Zamoshchin , Andre Frederico Cavalheiro Menck , Anirvan Mukherjee , Daniel Chin
IPC: G06F16/00 , G06F16/13 , G06F16/18 , G06F16/188 , G06F30/00 , G06N7/00 , G06F111/20
Abstract: A model management system provides a centralized repository for storing and accessing models. The model management system receives an input to store a model object in a first model state generated based on a first set of known variables. The model management system generates a first file including a first set of functions defining the first model state and associates the first file with a model key identifying the model object. The model management system receives an input to store the model object in a second model state having been generated based on the first model state and a second set of known variables. The model management system generates a second file including a second set of functions defining the second model state and associates the second file with the model key. The model management system identifies available versions of the model object based on the model key.
-
公开(公告)号:US20240406261A1
公开(公告)日:2024-12-05
申请号:US18804656
申请日:2024-08-14
Applicant: Palantir Technologies Inc.
Inventor: Greg DeArment , Mark Elliot , Jonathan Yu , Jon Paek , Phillip Chen , Brian Toth , David Tolnay , Daniel Rothfus , Bradley Moylan
IPC: H04L67/1095 , G06F8/71 , G06F9/44 , G06F9/445 , G06F9/455 , G06F9/46 , G06F9/48 , G06F9/50 , G06F11/07 , G06F11/14 , H04L41/5054
Abstract: A method comprises receiving, at a host, a request to set new service configuration information for a target service in a distributed computing environment; retrieving a current revision identifier of a current revision of service configuration information for the target service from a revision index key in a local replica of a configuration store, the revision index key storing one or more key-value pairs, a key in a specific key-value pair identifying the target service; assigning a new revision identifier based on the current revision identifier; writing the new service configuration information into a new revision of the service configuration information in the local replica; updating the revision index key in an atomic compare-and-swap operation, the compare comprising verifying that the current revision identifier in the revision index key has remained the same since the retrieving, the swap comprising updating the specific key-value pair with the new revision identifier.
-
公开(公告)号:US20240403634A1
公开(公告)日:2024-12-05
申请号:US18676339
申请日:2024-05-28
Applicant: Palantir Technologies Inc.
Inventor: Matthew Hawes , Ankit Shankar , Morten Telling , Adil Majid , Jack Dobson
IPC: G06N3/08
Abstract: An artificial intelligence system can be used to respond to natural language inputs. The AI System may, for example, receive a first user input for a LLM, generate a first prompt based on the first user input, transmit the first prompt to an LLM, receive an output from the LLM, and evaluate the output from the LLM with reference to one or more validation tests. Responsive to determining that the output from the LLM is not validated, generate a second prompt for the LLM, where the second prompt indicates at least an aspect of the output that caused the output to not be evaluated (e.g., a portion of the output that may need to be updated or corrected), transmit the second prompt to the LLM, and receive an updated output from the LLM. The AI system can include an application for testing functions that utilize interactions with language models.
-
公开(公告)号:US20240403273A1
公开(公告)日:2024-12-05
申请号:US18678300
申请日:2024-05-30
Applicant: Palantir Technologies Inc.
Inventor: Daniel Zangri , Nicholas Morgan , Hunter Herman
IPC: G06F16/21
Abstract: Systems and methods for managing and/or using observation schemas are provided. In some embodiments, a method includes receiving a data stream from one or more data sources; accessing a first observation schema including one or more built-in fields and one or more custom fields associated with the received data stream; receiving a configuration associated with at least one of the one or more custom fields; and generating a second observation schema based on the configuration and the first observation schema.
-
公开(公告)号:US20240385885A1
公开(公告)日:2024-11-21
申请号:US18655680
申请日:2024-05-06
Applicant: Palantir Technologies Inc.
Inventor: Alex Dhillon , Alec Schneider , Casey Patton , Ka-Wing Courtney Tam , Harshil Mattoo , Oliver Madine
IPC: G06F9/50
Abstract: A system may receive a representation of a process, wherein the representation of the process includes: a plurality of states, and one or more transitions among states of the plurality of states. A system may receive a plurality of data objects, wherein each of the data objects is associated with a respective set of properties. A system may determine for each of the plurality of data objects, respective state information associated with the data objects. A system may cause generation of an interactive graphical user interface including: a graph-based visualization of at least a portion of the plurality of states and the one or more transitions, wherein the graph-based visualization is generated based at least in part on at least a portion of the plurality of data objects and associated properties and state information.
-
公开(公告)号:US12147657B2
公开(公告)日:2024-11-19
申请号:US17168542
申请日:2021-02-05
Applicant: Palantir Technologies Inc.
Inventor: Matthew Julius Wilson , Tom Alexander , Daniel Cervelli , Trevor Fountain , Quentin Spencer-Harper , Daniel Horbatt , Guillem Palou Visa , Dylan Scott , Trevor Sontag , Kevin Verdieck , Alexander Ryan , Brian Lee , Charles Shepherd , Emily Nguyen
IPC: G06F3/048 , G06F3/04817 , G06F3/04842 , G06F3/04847 , G06F16/29 , G06T11/20
Abstract: Various systems and methods are provided that display various geographic maps and depth graphs in an interactive user interface in substantially real-time in response to input from a user in order to determine information related to measured data points, depth levels, and geological layers and provide the determined information to the user in the interactive user interface. For example, a computing device may be configured to retrieve data from one or more databases and generate one or more interactive user interfaces. The one or more interactive user interfaces may display the retrieved data in a geographic map, a heat map, a cross-plot graph, or one or more depth graphs. The user interface may be interactive in that a user may manipulate any of the graphs to identify trends or current or future issues.
-
公开(公告)号:US12147647B2
公开(公告)日:2024-11-19
申请号:US17445037
申请日:2021-08-13
Applicant: Palantir Technologies Inc.
Inventor: Galen Marchetti , Henrique Valer , Pedro Sanzovo
IPC: G06F3/0482 , G06N5/04 , G06Q10/0635
Abstract: Systems and methods are disclosed herein for reducing a risk of associating with a client that may engage in illegal activity. A system accesses data associated with an entity for a given context, applies a plurality of AI models to the data based on the context to generate a plurality of AI assessments. Data for showing risk factors, assessments of the risk factors, and data for evaluating risk factors can be transmitted for rendering in a user interface in a display device. Analyst feedback can be received and used to update the AI models.
-
公开(公告)号:US20240378308A1
公开(公告)日:2024-11-14
申请号:US18781232
申请日:2024-07-23
Applicant: Palantir Technologies Inc.
Inventor: Paul Thoren , Benjamin Gazzard , David Meiklejohn , Kevin Ng , Matthew Fedderly , Rhys Brett-Bowen
Abstract: A system with an interactive user interface for a plurality of users to author an electronic document simultaneously is described. The system displays visual feedback on the interface to prevent the users from interfering with one another. The system displays data from a remote database linked into the document based on unique identifiers. The data is displayed as an “artifact.” The system monitors and tracks each user's access category level, as well as the access category level of each piece of data pulled from the remote database. The system compares a user's category level to the data from the database to make visible only the portions of the document the user has the appropriate access category level to view and/or modify. The portions of the document that have a higher category level than the user will be hidden from the user either in part or completely. Also, there may be an indicator to the user of such redacted or hidden content from the user's viewer.
-
-
-
-
-
-
-
-
-