-
公开(公告)号:US12210509B2
公开(公告)日:2025-01-28
申请号:US18589078
申请日:2024-02-27
Applicant: Palantir Technologies Inc.
Inventor: Matthew Fedderly , Cooper Bills , Geoffrey Bakker , Kunal Marwaha , Nathaniel Klein
IPC: G06F16/23 , G06F40/174
Abstract: A computer-implemented method comprises receiving a front-end configuration including transition specifications and a back-end configuration including workflow transition rules; receiving a state transition initiated by an interaction via a workflow-based interface associated with the front-end configuration; mapping the state transition to a set of back-end commands; detecting a conflict between the transition specifications and the workflow transition rules; updating state transitions defined in the transition specifications or specified in the workflow transition rules according to conflict resolution rules; causing executing the set of back-end commands over a database of data objects.
-
公开(公告)号:US12063218B2
公开(公告)日:2024-08-13
申请号:US18238871
申请日:2023-08-28
Applicant: Palantir Technologies Inc.
Inventor: Peter Wilczynski , Arseny Bogomolov , Alexander Mark , Teofana Hadzhiganeva , Kevin Ng , Nathaniel Klein , Sharon Hao
IPC: H04L9/40
CPC classification number: H04L63/104
Abstract: An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
-
公开(公告)号:US11669513B2
公开(公告)日:2023-06-06
申请号:US17688896
申请日:2022-03-07
Applicant: Palantir Technologies Inc.
Inventor: Matthew Fedderly , Cooper Bills , Geoffrey Bakker , Kunal Marwaha , Nathaniel Klein
IPC: G06F16/23 , G06F40/174
CPC classification number: G06F16/2365 , G06F40/174
Abstract: Software-based technologies for improving structured data collection, presentation, validation, and workflow management processes are disclosed, including the use of interpretable configuration files to define data objects, generate object-level and sub-object-level specifications for a forms-based interface, validation processes and a workflow-based interface. A back-end integration component maps the data objects, validation and workflow processes, and interface specifications to portions of a back-end database system. In one embodiment, a data processing system comprises one or more processors; one or more storage media storing instructions which, when executed by the one or more processors, cause the one or more processors to perform operations comprising causing a first computing device to interpret a configuration file; in response to the first computing device interpreting the configuration file, causing a display device to generate a forms-based interface comprising a data input control element arranged to obtain data in association with a data object that is defined in the configuration file; in response to detecting receipt of a data item by the data input control element of the forms-based interface, executing a data validation process that is, in the configuration file, associated with the data item; in response to validation of the data item by the data validation process, causing, by a second computing device, mapping the data item to a back-end data object; causing, by the second computing device or a third computing device, altering a validation process associated with the back-end data object based on a result of the executing of the validation process associated with the data item in the configuration file; causing storing the data item in a database system in association with the back-end data object.
-
公开(公告)号:US20240241912A1
公开(公告)日:2024-07-18
申请号:US18436898
申请日:2024-02-08
Applicant: Palantir Technologies Inc.
Inventor: Nathaniel Klein , Huanqi Deng , Kevin Whelan , Matthew LeVan , Takashi Okamoto
IPC: G06F16/93 , G06F3/04842 , G06F16/22 , G06F16/951 , H04L67/01
CPC classification number: G06F16/93 , G06F16/2272 , G06F16/951 , G06F3/04842 , H04L67/01
Abstract: Example embodiments relate to a network-based workflow system, employed for receiving workflows, defining one or more data-object types based on the workflows, generating data-objects, assigning a workflow from among the one or more workflows to the data-object, and managing the data-object through various states of based on the workflow. As discussed, a “workflow” refers to orchestrated and repeatable patterns enabled by a systematic organization of resources into processes that transform and modify presentations of data-objects based on corresponding data-object states. A workflow may therefore comprise a set of states, wherein each state is linked to another state by one or more transitions, and wherein the transitions are associated with a set of events which may occur at each state.
-
公开(公告)号:US11785017B2
公开(公告)日:2023-10-10
申请号:US17992737
申请日:2022-11-22
Applicant: Palantir Technologies Inc.
Inventor: Peter Wilczynski , Arseny Bogomolov , Alexander Mark , Teofana Hadzhiganeva , Kevin Ng , Nathaniel Klein , Sharon Hao
CPC classification number: H04L63/104
Abstract: An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
-
公开(公告)号:US11089029B2
公开(公告)日:2021-08-10
申请号:US16803104
申请日:2020-02-27
Applicant: Palantir Technologies Inc.
Inventor: Peter Wilczynski , Arseny Bogomolov , Alexander Mark , Teofana Hadzhiganeva , Kevin Ng , Nathaniel Klein , Sharon Hao
IPC: H04L29/06
Abstract: An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
-
公开(公告)号:US20210029132A1
公开(公告)日:2021-01-28
申请号:US16803104
申请日:2020-02-27
Applicant: Palantir Technologies Inc.
Inventor: Peter Wilczynski , Arseny Bogomolov , Alexander Mark , Teofana Hadzhiganeva , Kevin Ng , Nathaniel Klein , Sharon Hao
IPC: H04L29/06
Abstract: An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
-
公开(公告)号:US20250156399A1
公开(公告)日:2025-05-15
申请号:US19024124
申请日:2025-01-16
Applicant: Palantir Technologies Inc.
Inventor: Matthew Fedderly , Cooper Bills , Geoffrey Bakker , Kunal Marwaha , Nathaniel Klein
IPC: G06F16/23 , G06F40/174
Abstract: A method of managing decoupled front-end and back-end processes is disclosed. The method comprises receiving a first result of user interaction with a first front-end interface; determining that the first result represents a validation of a data item entered via the first front-end interface; mapping the data item in a validated form to a back-end object; causing storing the data item in a database system in association with the back-end object; receiving a second result of user interaction with a second front-end interface; determining that the second result represents a state transition corresponding to executing a query entered via the second front-end interface against the database system; mapping the state transition to a set of back-end commands; causing executing the set of back-end commands over the database system of back-end objects.
-
公开(公告)号:US11928164B2
公开(公告)日:2024-03-12
申请号:US17063993
申请日:2020-10-06
Applicant: Palantir Technologies Inc.
Inventor: Nathaniel Klein , Huanqi Deng , Kevin Whelan , Matthew LeVan , Takashi Okamoto
IPC: G06F16/00 , G06F16/22 , G06F16/93 , G06F16/951 , G06F3/04842 , H04L67/01
CPC classification number: G06F16/93 , G06F16/2272 , G06F16/951 , G06F3/04842 , H04L67/01
Abstract: Example embodiments relate to a network-based workflow system, employed for receiving workflows, defining one or more data-object types based on the workflows, generating data-objects, assigning a workflow from among the one or more workflows to the data-object, and managing the data-object through various states of based on the workflow. As discussed, a “workflow” refers to orchestrated and repeatable patterns enabled by a systematic organization of resources into processes that transform and modify presentations of data-objects based on corresponding data-object states. A workflow may therefore comprise a set of states, wherein each state is linked to another state by one or more transitions, and wherein the transitions are associated with a set of events which may occur at each state.
-
公开(公告)号:US20230093504A1
公开(公告)日:2023-03-23
申请号:US17992737
申请日:2022-11-22
Applicant: Palantir Technologies Inc.
Inventor: Peter Wilczynski , Arseny Bogomolov , Alexander Mark , Teofana Hadzhiganeva , Kevin Ng , Nathaniel Klein , Sharon Hao
IPC: H04L9/40
Abstract: An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
-
-
-
-
-
-
-
-
-