-
公开(公告)号:US20210350026A1
公开(公告)日:2021-11-11
申请号:US17385355
申请日:2021-07-26
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , G06F16/903 , G06F16/901 , G06F21/60 , H04L29/06
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
公开(公告)号:US20210263920A1
公开(公告)日:2021-08-26
申请号:US17249585
申请日:2021-03-05
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Sean Hacker
IPC: G06F16/2455 , G06F16/23 , G06F16/25 , G06F16/245
Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.
-
3.
公开(公告)号:US20240394378A1
公开(公告)日:2024-11-28
申请号:US18669167
申请日:2024-05-20
Applicant: Palantir Technologies Inc.
Inventor: Benjamin Jackson , David Schlosnagle , Daniel Grim , Ian Reardon , Johnny Huang , Robert Blount , Sean Hacker , Steven McDonald
Abstract: Systems and methods for software product deployment and/or compliance management are provided. In some embodiments, a method includes: receiving an indication of a first payload of a software deployment package; performing a first software scan of the first payload; generating a first integrity file including an indication of integrity based upon the first software scan; and triggering a transfer of the first payload and the first integrity file from a first network domain to a second network domain different from the first network domain.
-
公开(公告)号:US11080422B2
公开(公告)日:2021-08-03
申请号:US16375721
申请日:2019-04-04
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , G06F16/903 , G06F16/901 , G06F21/60 , H04L29/06
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
公开(公告)号:US20200293689A1
公开(公告)日:2020-09-17
申请号:US16375721
申请日:2019-04-04
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , H04L29/06 , G06F21/60 , G06F16/901 , G06F16/903
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
公开(公告)号:US20240211608A1
公开(公告)日:2024-06-27
申请号:US18542294
申请日:2023-12-15
Applicant: Palantir Technologies Inc.
Inventor: Callum Rogers , Fabian Windheuser , Gregory DeArment , Sean Hacker
IPC: G06F21/57
CPC classification number: G06F21/577 , G06F2221/033
Abstract: According to some embodiments, systems and methods for the present disclosure are directed to managing software security including, for example, controlling software deployment via continuous vulnerability scanning. In certain embodiments, a method for managing software security includes the steps of: initiating a vulnerability scan to a software product based on one or more scan parameters; performing the vulnerability scan to the software product to identify one or more security vulnerabilities using one or more scanners; determining a requirement associated with a first identified security vulnerability of the one or more identified security vulnerabilities; determining one or more actions corresponding to the one or more identified security vulnerabilities.
-
公开(公告)号:US20240211249A1
公开(公告)日:2024-06-27
申请号:US18392042
申请日:2023-12-21
Applicant: Palantir Technologies Inc.
Inventor: Sean Hacker , Saahil Madge , Taylor Stearns
Abstract: Systems and methods for using software supply chain information. In some embodiments, a method for using software supply chain to control software operations includes obtaining software supply chain metadata of a software product release before the software product release is deployed. In certain embodiments, the software supply chain metadata includes a collection of software materials. In some embodiments, the method further includes receiving one or more action rules associated with incompliant software materials, searching the software supply chain metadata to identify whether the collection of software materials include any incompliant software material, and deploying the software product release if the collection of software materials does not include any incompliant software material.
-
公开(公告)号:US11775683B2
公开(公告)日:2023-10-03
申请号:US17385355
申请日:2021-07-26
Applicant: Palantir Technologies Inc.
Inventor: John Doyle , Jason Free , Jacob Magid , Michael Rochlin , Sean Hacker
IPC: G06F21/62 , G06F16/903 , G06F16/901 , G06F21/60 , H04L9/40
CPC classification number: G06F21/6254 , G06F16/9014 , G06F16/90335 , G06F21/602 , H04L63/105
Abstract: Generating a first signature value corresponding to a first dataset stored in a first data region having a first access permission level. Determining a signature anonymization value. Truncating the first signature value based on the signature anonymization value. Generating a secure search query for identifying, based on the truncated first signature value, second signature values corresponding to entries of a second dataset stored in one or more second data regions having one or more second access permission levels. Receiving a response to the secure search query including the plurality of second signature values. Determining the entries of the second dataset from the second signature values. Comparing the respective entries of the second dataset to the at least a portion of the first dataset. Generating one or more notifications based on the comparisons indicating a potential match between a particular respective entry of the second dataset and the at least a portion of a first dataset.
-
公开(公告)号:US11704322B2
公开(公告)日:2023-07-18
申请号:US17249585
申请日:2021-03-05
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Sean Hacker
IPC: G06F16/2455 , G06F16/23 , G06F16/245 , G06F16/25
CPC classification number: G06F16/2456 , G06F16/23 , G06F16/245 , G06F16/25
Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.
-
公开(公告)号:US10963465B1
公开(公告)日:2021-03-30
申请号:US15801591
申请日:2017-11-02
Applicant: Palantir Technologies Inc.
Inventor: Samuel Jones , Sean Hacker
IPC: G06F16/2455 , G06F16/245 , G06F16/23 , G06F16/25
Abstract: Systems and methods for rapid importation of data including temporally tracked object recognition. One of the methods includes receiving datasets each indicating information associated with one or more objects. Information indicating unique identifying information associated with the objects is accessed, and an updated dataset joining information from datasets that is associated with each object is generated. The updated dataset is maintained to include most recent versions of each of the datasets, with one or more datasets being replaced with more recent versions, and with one or more other datasets being propagated to be the most recent versions. Queries received from clients are responded to, with the queries indicating requests for specific information related to objects.
-
-
-
-
-
-
-
-
-