-
公开(公告)号:US10509844B1
公开(公告)日:2019-12-17
申请号:US15642820
申请日:2017-07-06
Applicant: Palantir Technologies Inc.
Inventor: Thomas Mcintyre , Carl Rosen , Eliot Ball , John Chakerian , Joseph Carter , Kevin Today , Marvel Church , Michal Stojek , Ranec Highet , Ronald Highet , Maciej Laska
IPC: G06F16/957 , G06F17/27 , G06T11/20 , G06F3/0484
Abstract: An approach for processing node data from code repository websites to generate patterns is disclosed. Node data can be parsed from a projects webpage or received from a code repository server hosting the repository website. Visualizations can be generated in a browser from the node data. The visualizations can be displayed within the browser and further be used to receive filter instructions. Refined node data can then be exported for further analysis.
-
公开(公告)号:US12079352B2
公开(公告)日:2024-09-03
申请号:US17226014
申请日:2021-04-08
Applicant: Palantir Technologies Inc.
Inventor: Anton Apostolatos , Adam Lieskovský , Florian Diegruber , Francisco Ferreira , Joseph Kane , Joanna Peller , Kelvin Lau , Maciej Laska , Mikael Ibrahim Mofarrej , Max-Philipp Schrader , Philipp Hoefer , Spencer McCollester , Viktor Nordling
CPC classification number: G06F21/604 , G06F16/258
Abstract: A computer-implemented method enforces data security constraints in a data pipeline. The data pipeline takes one or more source datasets as input and performs one or more data transformations on them. The method includes using data defining one or more data security constraints to configure the data pipeline to perform a data transformation on a restricted subset of entries of the source datasets. The restriction is defined by the data defining one or more data security constraints. The method further includes performing the data transformation according to the configuration to produce one or more transformed datasets. The method further includes using the data defining one or more data security constraints to perform a verification on one or more of the transformed datasets to ensure that entries in the one or more of the transformed datasets are restricted as defined by the one or more data security constraints.
-
公开(公告)号:US20220198032A1
公开(公告)日:2022-06-23
申请号:US17226014
申请日:2021-04-08
Applicant: Palantir Technologies Inc.
Inventor: Anton Apostolatos , Adam Lieskovský , Florian Diegruber , Francisco Ferreira , Joseph Kane , Joanna Peller , Kelvin Lau , Maciej Laska , Mikael Ibrahim Mofarrej , Max-Philipp Schrader , Philipp Hoefer , Spencer McCollester , Viktor Nordling
Abstract: A computer-implemented method enforces data security constraints in a data pipeline. The data pipeline takes one or more source datasets as input and performs one or more data transformations on them. The method includes using data defining one or more data security constraints to configure the data pipeline to perform a data transformation on a restricted subset of entries of the source datasets. The restriction is defined by the data defining one or more data security constraints. The method further includes performing the data transformation according to the configuration to produce one or more transformed datasets. The method further includes using the data defining one or more data security constraints to perform a verification on one or more of the transformed datasets to ensure that entries in the one or more of the transformed datasets are restricted as defined by the one or more data security constraints.
-
-