Patents by Inventor Harkirat Singh
Harkirat Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10884730Abstract: A method for software application optimization using natural language-based queries. The method includes obtaining a user-provided query. The user-provided query includes a constraint to be used for an identification of an application element that matches the constraint, from a set of application elements of a software application. The user-provided query is a string that includes a human language sentence. The method further includes deriving a formalized query from the user-provided query by translating the user-provided query into a syntactic construct of segmented sentence elements and obtaining the application element that matches the constraint. Obtaining the application element that matches the constraint includes deriving a pattern representation of the user-provided query from the formalized query and identifying the application element that matches the pattern representation of the user-provided query from the plurality of application elements.Type: GrantFiled: December 20, 2018Date of Patent: January 5, 2021Assignee: OPEN TEXT CORPORATIONInventors: Sachin Gopaldas Totale, Harkirat Singh Lamba, Deepali Kishnani, Pulkit Manocha, Samir Yasin Vaidya, Roshan Prakash Salvi
-
Patent number: 10873603Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.Type: GrantFiled: March 16, 2018Date of Patent: December 22, 2020Assignee: Palantir Technologies Inc.Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
-
Publication number: 20200349152Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.Type: ApplicationFiled: July 20, 2020Publication date: November 5, 2020Inventors: HUW PRYCE, James Neale, Robert Fink, Jared Newman, Graham Dennis, Viktor Nordling, Artur Jonkisz, Daniel Fox, Felix de Souza, Harkirat Singh, Mark Elliot
-
Publication number: 20200304522Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.Type: ApplicationFiled: June 11, 2020Publication date: September 24, 2020Inventors: Harkirat Singh, Geoffrey Stowe, Brendan Weickert, Matthew Sprague, Michael Kross, Adam Borochoff, Parvathy Menon, Michael Harris
-
Patent number: 10776360Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification has a source repository identifier that identifies a source repository including a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction includes a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.Type: GrantFiled: September 29, 2018Date of Patent: September 15, 2020Assignee: PALANTIR TECHNOLOGIES INC.Inventors: Huw Pryce, James Neale, Robert Fink, Jared Newman, Graham Dennis, Viktor Nordling, Artur Jonkisz, Daniel Fox, Felix de Souza, Harkirat Singh, Mark Elliot
-
Patent number: 10721268Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.Type: GrantFiled: January 3, 2019Date of Patent: July 21, 2020Assignee: Palantir Technologies Inc.Inventors: Harkirat Singh, Brendan Weickert, Matthew Sprague, Michael Kross, Adam Borochoff, Parvathy Menon, Michael Harris
-
Publication number: 20200220884Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.Type: ApplicationFiled: March 18, 2020Publication date: July 9, 2020Inventors: Juan Ricafort, Harkirat Singh, Philip Martin
-
Patent number: 10609046Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.Type: GrantFiled: February 8, 2018Date of Patent: March 31, 2020Assignee: Palantir Technologies Inc.Inventors: Juan Ricafort, Harkirat Singh, Philip Martin
-
Publication number: 20190158509Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.Type: ApplicationFiled: January 3, 2019Publication date: May 23, 2019Inventors: Harkirat Singh, Brendan Weickert, Matthew Sprague, Michael Kross, Adam Borochoff, Parvathy Menon, Michael Harris
-
Publication number: 20190121634Abstract: A method for software application optimization using natural language-based queries. The method includes obtaining a user-provided query. The user-provided query includes a constraint to be used for an identification of an application element that matches the constraint, from a set of application elements of a software application. The user-provided query is a string that includes a human language sentence. The method further includes deriving a formalized query from the user-provided query by translating the user-provided query into a syntactic construct of segmented sentence elements and obtaining the application element that matches the constraint. Obtaining the application element that matches the constraint includes deriving a pattern representation of the user-provided query from the formalized query and identifying the application element that matches the pattern representation of the user-provided query from the plurality of application elements.Type: ApplicationFiled: December 20, 2018Publication date: April 25, 2019Inventors: Sachin Gopaldas Totale, Harkirat Singh Lamba, Deepali Kishnani, Pulkit Manocha, Samir Yasin Vaidya, Roshan Prakash Salvi
-
Patent number: 10264014Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.Type: GrantFiled: October 30, 2015Date of Patent: April 16, 2019Assignee: PALANTIR TECHNOLOGIES INC.Inventors: Geoff Stowe, Harkirat Singh, Stefan Bach, Matthew Sprague, Michael Kross, Adam Borochoff, Parvathy Menon, Michael Harris
-
Publication number: 20190052648Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster. Further, cluster metascores may be generated based on various cluster scores associated with a cluster. Clusters may be ranked based on cluster metascores. Various embodiments may enable an analyst to discover various insights related to data clusters, and may be applicable to various tasks including, for example, tax fraud detection, beaconing malware detection, malware user-agent detection, and/or activity trend detection, among various others.Type: ApplicationFiled: October 30, 2015Publication date: February 14, 2019Inventors: Geoff Stowe, Harkirat Singh, Stefan Bach, Matthew Sprague, Michael Kross, Adam Borochoff, Parvathy Menon, Michael Harris
-
Publication number: 20190034488Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.Type: ApplicationFiled: September 29, 2018Publication date: January 31, 2019Inventors: HUW PRYCE, James Neale, Robert Fink, Jared Newman, Graham Dennis, Viktor Nordling, Artur Jonkisz, Daniel Fox, Felix de Souza, Harkirat Singh, Mark Elliot
-
Patent number: 10191734Abstract: A method for software application optimization using natural language-based queries. The method includes obtaining a user-provided query. The user-provided query includes a constraint to be used for an identification of an application element that matches the constraint, from a set of application elements of a software application. The user-provided query is a string that includes a human language sentence. The method further includes deriving a formalized query from the user-provided query by translating the user-provided query into a syntactic construct of segmented sentence elements and obtaining the application element that matches the constraint. Obtaining the application element that matches the constraint includes deriving a pattern representation of the user-provided query from the formalized query and identifying the application element that matches the pattern representation of the user-provided query from the plurality of application elements.Type: GrantFiled: December 15, 2015Date of Patent: January 29, 2019Assignee: Open Text CorporationInventors: Sachin Gopaldas Totale, Harkirat Singh Lamba, Deepali Kishnani, Pulkit Manocha, Samir Yasin Vaidya, Roshan Prakash Salvi
-
Publication number: 20180337952Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.Type: ApplicationFiled: March 16, 2018Publication date: November 22, 2018Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
-
Patent number: 10133782Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.Type: GrantFiled: August 1, 2016Date of Patent: November 20, 2018Assignee: Palantir Technologies Inc.Inventors: Huw Pryce, James Neale, Robert Fink, Jared Newman, Graham Dennis, Viktor Nordling, Artur Jonkisz, Daniel Fox, Felix de Souza, Harkirat Singh, Mark Elliot
-
Publication number: 20180159874Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.Type: ApplicationFiled: February 8, 2018Publication date: June 7, 2018Inventors: Juan Ricafort, Harkirat Singh, Philip Martin
-
Patent number: 9930055Abstract: Various systems and methods are provided that detect malicious network tunneling. For example, VPN logs and data connection logs may be accessed. The VPN logs may list client IP addresses that have established a VPN connection with an enterprise network. The data connection logs may list client IP addresses that have requested connections external to the enterprise network and remote IP addresses to which connections are requested. The VPN logs and the data connection logs may be parsed to identify IP addresses that are present in the VPN logs as a client IP address and in the data connection logs as a remote IP address. If an IP address is so present, user data and traffic data associated with the IP address may be retrieved to generate a risk score. If the risk score exceeds a threshold, an alert to be displayed in a GUI is generated.Type: GrantFiled: August 4, 2016Date of Patent: March 27, 2018Assignee: Palantir Technologies Inc.Inventors: Juan Ricafort, Harkirat Singh, Philip Martin
-
Patent number: 9923925Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.Type: GrantFiled: April 10, 2015Date of Patent: March 20, 2018Assignee: Palantir Technologies Inc.Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
-
Publication number: 20180032575Abstract: Computer-implemented techniques for data extraction are described. The techniques include a method and system for retrieving an extraction job specification, wherein the extraction job specification comprises a source repository identifier that identifies a source repository comprising a plurality of data records; a data recipient identifier that identifies a data recipient; and a schedule that indicates a timing of when to retrieve the plurality of data records. The method and system further include retrieving the plurality of data records from the source repository based on the schedule, creating an extraction transaction from the plurality of data records, wherein the extraction transaction comprises a subset of the plurality of data records and metadata, and sending the extraction transaction to the data recipient.Type: ApplicationFiled: August 1, 2016Publication date: February 1, 2018Inventors: HUW PRYCE, James Neale, Robert Fink, Jared Newman, Graham Dennis, Viktor Nordling, Artur Jonkisz, Daniel Fox, Felix de Souza, Harkirat Singh, Mark Elliot