-
公开(公告)号:US10771333B2
公开(公告)日:2020-09-08
申请号:US16361071
申请日:2019-03-21
Applicant: Palantir Technologies Inc.
Inventor: Nicholas Hall , Hamza Muraj , Jason Free , John Montgomery , James Schweiger , Matthew LeVan , Thomas Montague
Abstract: Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.
-
2.
公开(公告)号:US20240394386A1
公开(公告)日:2024-11-28
申请号:US18764766
申请日:2024-07-05
Applicant: Palantir Technologies Inc.
Inventor: Jason Free , Charles Walters , Claude Johnson , Stephen Denney , Drew Tuck , Jerry Sung , Daniel Berkowitz , Quinn Beightol , Melvin Shaw , Charles Smith
Abstract: A computing device, such as a server, has a sealed housing and runs one or more data extraction agents. In some embodiments, the computing device includes one or more processors and memory located inside the sealed housing, the memory stores instructions that when executed by the one or more processors causes the one or more processors to: authenticate with a data recipient system using a prestored security engine and using a shared registration secret uniquely associating the computing device with the data recipient system; retrieve an extraction job specification from an extraction job specification repository associated with the data recipient system; and using the extraction job specification, communicate to one or more client computing devices associated with a client system to extract data records from one or more data stores of the client system. Related methods are also disclosed.
-
公开(公告)号:US11924035B2
公开(公告)日:2024-03-05
申请号:US17863352
申请日:2022-07-12
Applicant: Palantir Technologies Inc.
Inventor: Nicholas Hall , Hamza Muraj , Jason Free , John Montgomery , James Schweiger , Matthew Levan , Thomas Montague
IPC: H04L41/082 , G06F8/65 , G06F9/445 , H04L41/08 , H04L41/085 , H04L41/0859 , H04L67/00 , H04L67/62 , G06F8/70
CPC classification number: H04L41/082 , G06F8/65 , G06F9/44505 , H04L41/08 , H04L41/085 , H04L41/0859 , H04L67/34 , H04L67/62 , G06F8/70
Abstract: Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.
-
公开(公告)号:US11775683B2
公开(公告)日:2023-10-03
申请号:US17385355
申请日:2021-07-26
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , G06F16/903 , G06F16/901 , G06F21/60 , H04L9/40
CPC classification number: G06F21/6254 , G06F16/9014 , G06F16/90335 , G06F21/602 , H04L63/105
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
公开(公告)号:US20190222473A1
公开(公告)日:2019-07-18
申请号:US16361071
申请日:2019-03-21
Applicant: Palantir Technologies Inc.
Inventor: Nicholas Hall , Hamza Muraj , Jason Free , John Montgomery , James Schweiger , Matthew LeVan , Thomas Montague
CPC classification number: H04L41/082 , G06F8/65 , G06F8/70 , G06F9/44505 , H04L41/08 , H04L41/085 , H04L41/0859 , H04L67/325 , H04L67/34
Abstract: Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.
-
公开(公告)号:US20180337821A1
公开(公告)日:2018-11-22
申请号:US15787335
申请日:2017-10-18
Applicant: Palantir Technologies Inc.
Inventor: Nicholas Hall , Hamza Muraj , Jason Free , John Montgomery , James Schweiger , Matthew LeVan , Thomas Montague
CPC classification number: H04L41/082 , G06F8/65 , G06F8/70 , G06F9/44505 , H04L41/08 , H04L41/085 , H04L41/0859 , H04L67/325 , H04L67/34
Abstract: Systems and methods are provided for providing continuous configuration deployment. A configuration definition object may be obtained from a remote datastore. The obtained configuration definition object may be stored in a local datastore. The configuration definition object may be obtained and stored in advance of a scheduled maintenance. The configuration definition object may be obtained in response to the configuration definition object being committed to the remote datastore. The configuration definition object may be used to generate different configuration objects. A configuration object may be generated from the configuration definition object and one or more system characteristics. A service request may be received, and the configuration object may be executed to perform a configuration of a computing system.
-
公开(公告)号:US11080422B2
公开(公告)日:2021-08-03
申请号:US16375721
申请日:2019-04-04
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , G06F16/903 , G06F16/901 , G06F21/60 , H04L29/06
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
8.
公开(公告)号:US20210034767A1
公开(公告)日:2021-02-04
申请号:US16674164
申请日:2019-11-05
Applicant: Palantir Technologies Inc.
Inventor: Jason Free , Charles Walters , Claude Johnson , Stephen Denney , Drew Tuck , Jerry Sung , Daniel Berkowitz , Quinn Beightol , Melvin Shaw , Charles Smith
Abstract: A computing device, such as a server, has a sealed housing and runs one or more data extraction agents. In some embodiments, the computing device includes one or more processors and memory located inside the sealed housing, the memory stores instructions that when executed by the one or more processors causes the one or more processors to: authenticate with a data recipient system using a prestored security engine and using a shared registration secret uniquely associating the computing device with the data recipient system; retrieve an extraction job specification from an extraction job specification repository associated with the data recipient system; and using the extraction job specification, communicate to one or more client computing devices associated with a client system to extract data records from one or more data stores of the client system. Related methods are also disclosed.
-
公开(公告)号:US20200293689A1
公开(公告)日:2020-09-17
申请号:US16375721
申请日:2019-04-04
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , H04L29/06 , G06F21/60 , G06F16/901 , G06F16/903
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
10.
公开(公告)号:US12061709B2
公开(公告)日:2024-08-13
申请号:US16674164
申请日:2019-11-05
Applicant: Palantir Technologies Inc.
Inventor: Jason Free , Charles Walters , Claude Johnson , Stephen Denney , Drew Tuck , Jerry Sung , Daniel Berkowitz , Quinn Beightol , Melvin Shaw , Charles Smith
CPC classification number: G06F21/604 , G06F8/61 , G06F21/6218
Abstract: A computing device, such as a server, has a sealed housing and runs one or more data extraction agents. In some embodiments, the computing device includes one or more processors and memory located inside the sealed housing, the memory stores instructions that when executed by the one or more processors causes the one or more processors to: authenticate with a data recipient system using a prestored security engine and using a shared registration secret uniquely associating the computing device with the data recipient system; retrieve an extraction job specification from an extraction job specification repository associated with the data recipient system; and using the extraction job specification, communicate to one or more client computing devices associated with a client system to extract data records from one or more data stores of the client system. Related methods are also disclosed.
-
-
-
-
-
-
-
-
-