Patents by Inventor Dayang Shi

Dayang Shi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240146758
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Application
    Filed: December 21, 2023
    Publication date: May 2, 2024
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
  • Patent number: 11882145
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Grant
    Filed: June 21, 2022
    Date of Patent: January 23, 2024
    Assignee: Palantir Technologies Inc.
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
  • Publication number: 20230306382
    Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
    Type: Application
    Filed: June 2, 2023
    Publication date: September 28, 2023
    Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
  • Patent number: 11710104
    Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
    Type: Grant
    Filed: October 21, 2021
    Date of Patent: July 25, 2023
    Assignee: Palantir Technologies Inc.
    Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
  • Publication number: 20230031440
    Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
    Type: Application
    Filed: October 7, 2022
    Publication date: February 2, 2023
    Inventors: Robert Speare, Dayang Shi, Spencer Lake
  • Patent number: 11494068
    Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
    Type: Grant
    Filed: November 25, 2020
    Date of Patent: November 8, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Robert Speare, Dayang Shi, Spencer Lake
  • Publication number: 20220321595
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Application
    Filed: June 21, 2022
    Publication date: October 6, 2022
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
  • Patent number: 11418529
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Grant
    Filed: March 6, 2019
    Date of Patent: August 16, 2022
    Assignee: Palantir Technologies Inc.
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi
  • Publication number: 20220044173
    Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
    Type: Application
    Filed: October 21, 2021
    Publication date: February 10, 2022
    Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
  • Patent number: 11182710
    Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
    Type: Grant
    Filed: November 20, 2019
    Date of Patent: November 23, 2021
    Assignee: Palantir Technologies Inc.
    Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
  • Publication number: 20210081101
    Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
    Type: Application
    Filed: November 25, 2020
    Publication date: March 18, 2021
    Inventors: Robert Speare, Dayang Shi, Spencer Lake
  • Publication number: 20210004742
    Abstract: A computing system accesses one or more data sources to determine maintenance optimization data associated with an asset within a set of assets. The maintenance optimization data may include one or more of: upcoming maintenance events for the asset, such as may be predicted based on analysis of historical maintenance information of the asset, a time series of predicted value of the asset over a time period around the upcoming maintenance event, such as within a few days or hours of the maintenance event, and/or a recommended window of time to initiate and/or perform upcoming maintenance events, which may be based on a combination of the expected upcoming maintenance events, and the time series of predicted value of the particular asset, for example.
    Type: Application
    Filed: November 20, 2019
    Publication date: January 7, 2021
    Inventors: Dayang Shi, Kirat Singh, Marie Kindblom, Michael Weisz
  • Patent number: 10877654
    Abstract: User interfaces are provided for improved data optimization. A model user interface can be used to generate models based on a historical data file based on modeling details and filters specified by a user. The user can save the models and apply the models to optimize a data file. The user can specify optimization details and see visualizations of the results.
    Type: Grant
    Filed: September 27, 2018
    Date of Patent: December 29, 2020
    Assignee: Palantir Technologies Inc.
    Inventors: Robert Speare, Dayang Shi, Spencer Lake
  • Publication number: 20200204578
    Abstract: A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.
    Type: Application
    Filed: March 6, 2019
    Publication date: June 25, 2020
    Inventors: Elliot Colquhoun, Abhishek Agarwal, Andrew Eggleton, Brandon Helms, Carl Ambroselli, Cem Zorlular, Daniel Kelly, Gautam Punukollu, Jeffrey Tsui, Morten Kromann, Nikhil Seetharaman, Raj Krishnan, Samuel Jones, Tareq Alkhatib, Dayang Shi