Patents by Inventor Peter Maag

Peter Maag has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180173216
    Abstract: Systems, methods, and non-transitory computer-readable media can be configured to perform receiving a notification of a maintenance event associated with a resource. The method includes retrieving historic maintenance data in relation to the resource with which the fault is associated, the maintenance information originating from a time period preceding the time of the maintenance event. The method includes identifying at least a portion of the retrieved historic maintenance data as being indicative of the maintenance event. The method also includes causing the portion of the retrieved historic maintenance data identified as being indicative of the maintenance event to be stored as a precursor signal of the maintenance event. The method also includes causing future maintenance data received from a plurality of resources related to the resource with which the maintenance event is associated to be monitored to predict a future occurrence of the maintenance event in the plurality of resources.
    Type: Application
    Filed: December 11, 2017
    Publication date: June 21, 2018
    Inventors: Ezra Spiro, Andre Frederico Cavalheiro Menck, Peter Maag, Thomas Powell
  • Publication number: 20180174067
    Abstract: Systems, methods, non-transitory computer readable media can be configured to access a plurality of sensor logs corresponding to a first machine, each sensor log spanning at least a first period; access first computer readable logs corresponding to the first machine, each computer readable log spanning at least the first period, the computer readable logs comprising a maintenance log comprising a plurality of maintenance task objects, each maintenance task object comprising a time and a maintenance task type; determine a set of statistical metrics derived from the sensor logs; determine a set of log metrics derived from the computer readable logs; and determine, using a risk model that receives the statistical metrics and log metrics as inputs, fault probabilities or risk scores indicative of one or more fault types occurring in the first machine within a second period.
    Type: Application
    Filed: December 14, 2017
    Publication date: June 21, 2018
    Inventors: Ezra Spiro, Andre Frederico Cavalheiro Menck, Anshuman Prasad, Arthur Thouzeau, Caroline Henry, Charles Shepherd, Joanna Peller, Jennifer Yip, Marco Diciolla, Matthew Todd, Peter Maag, Spencer Tank, Thomas Powell
  • Publication number: 20180173813
    Abstract: A method of processing sensor logs is described. The method includes accessing a first sensor log and a corresponding first reference log. Each of the first sensor log and the first reference log includes a series of measured values of a parameter according to a first time series. The method also includes accessing a second sensor log and a corresponding second reference log. Each of the second sensor log and the second reference log includes a series of measured values of a parameter according to a second time series. The method also includes dynamically time warping the first reference log and/or and second reference log by a first transformation between the first time series and a common time-frame and/or a second transformation between the second time series and the common time-frame. The method also includes generating first and second warped sensor logs by applying the or each transformation to the corresponding ones of the first and second sensor logs.
    Type: Application
    Filed: December 12, 2017
    Publication date: June 21, 2018
    Inventors: Ezra Spiro, Andre Frederico Cavalheiro Menck, Peter Maag, Thomas Powell
  • Patent number: 9923925
    Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.
    Type: Grant
    Filed: April 10, 2015
    Date of Patent: March 20, 2018
    Assignee: Palantir Technologies Inc.
    Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
  • Publication number: 20180052597
    Abstract: Embodiments of the present disclosure relate to a data analysis system configured to implement cross-application coordination between a chart creation tool and a data analysis workspace, in order to create one or more charts from customized sets of data points, synchronize chart manipulations between charts, and drill down into the metadata of data points in the created charts. The user uses the data analysis workspace to select, remove, or cherry-pick data items to be used to create a chart, which may be transmitted from the workspace to the chart creation tool as data points. In addition, the user may select the data points in the chart to retrieve one or more identifiers to be transmitted back to the workspace, where they are used to identify the data items associated with the data points, and retrieve the full metadata of the data items.
    Type: Application
    Filed: October 12, 2017
    Publication date: February 22, 2018
    Inventors: Christopher Stokes, Peter Maag, Tom O'Brien, Naytri Shroff, Maciej Albin, Alexis Daboville
  • Publication number: 20180005331
    Abstract: Systems and techniques for sharing healthcare fraud data are described herein. Healthcare fraud detection schemes and/or fraud data may be automatically shared, investigated, enabled, and/or used by entities. A healthcare fraud detection scheme may be enabled on different entities comprising different computing systems to combat similar healthcare fraud threats, instances, and/or attacks. Healthcare fraud detection schemes and/or fraud data may be modified to redact sensitive information and/or configured through access controls for sharing.
    Type: Application
    Filed: May 16, 2017
    Publication date: January 4, 2018
    Inventors: Lekan Wang, Melody Hildebrandt, Tayler Cox, Chris Burchhardt, Casey Ketterling, Ajay Sudan, Robert McGrew, Jacob Albertson, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
  • Publication number: 20170357562
    Abstract: A method and system for data pipeline monitoring receives an event data object and a current status data object from one or more subsystems of a pipeline. The system analyzes the event data object and the current status data object to determine a first and second validation value. The system, in response to determining that either the first or second validation value is not valid, sends a notification.
    Type: Application
    Filed: April 26, 2017
    Publication date: December 14, 2017
    Inventors: Jesse Rickard, Peter Maag, Jared Newman, Giulio Mecocci, Harish Subbanarasimhia, Adrian Marius Dumitran, Andrzej Skrodzki, Jonah Scheinerman, Gregory Slonim, Alexandru Viorel Antihi
  • Publication number: 20170337124
    Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.
    Type: Application
    Filed: August 8, 2017
    Publication date: November 23, 2017
    Inventors: Peter Maag, Jacob Albertson, Jared Newman, Matthew Lynch, Maciej Albin, Viktor Nordling
  • Patent number: 9817563
    Abstract: Embodiments of the present disclosure relate to a data analysis system configured to implement cross-application coordination between a chart creation tool and a data analysis workspace, in order to create one or more charts from customized sets of data points, synchronize chart manipulations between charts, and drill down into the metadata of data points in the created charts. The user uses the data analysis workspace to select, remove, or cherry-pick data items to be used to create a chart, which may be transmitted from the workspace to the chart creation tool as data points. In addition, the user may select the data points in the chart to retrieve one or more identifiers to be transmitted back to the workspace, where they are used to identify the data items associated with the data points, and retrieve the full metadata of the data items.
    Type: Grant
    Filed: December 29, 2014
    Date of Patent: November 14, 2017
    Assignee: PALANTIR TECHNOLOGIES INC.
    Inventors: Christopher Stokes, Peter Maag, Tom O'Brien, Naytri Shroff, Maciej Albin, Alexis Daboville
  • Patent number: 9772934
    Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.
    Type: Grant
    Filed: October 7, 2015
    Date of Patent: September 26, 2017
    Assignee: Palantir Technologies Inc.
    Inventors: Peter Maag, Jacob Albertson, Jared Newman, Matthew Lynch, Maciej Albin, Viktor Nordling
  • Publication number: 20170220403
    Abstract: Discussed herein are embodiments of methods and systems which allow engineers or administrators to create modular plugins which represent the logic for various fault detection tests that can be performed on data pipelines and shared among different software deployments. In some cases, the modular plugins each define a particular test to be executed against data received from the pipeline in addition to one or more configuration points. The configuration points represent configurable arguments, such as variables and/or functions, referenced by the instructions which implement the tests and that can be set according to the specific operation environment of the monitored pipeline.
    Type: Application
    Filed: October 7, 2015
    Publication date: August 3, 2017
    Inventors: Peter Maag, Jacob Albertson, Jared Newman, Matthew Lynch, Maciej Albin, Viktor Nordling
  • Patent number: 9678850
    Abstract: A method and system for data pipeline monitoring receives an event data object and a current status data object from one or more subsystems of a pipeline. The system analyzes the event data object and the current status data object to determine a first and second validation value. The system, in response to determining that either the first or second validation value is not valid, sends a notification.
    Type: Grant
    Filed: August 1, 2016
    Date of Patent: June 13, 2017
    Assignee: Palantir Technologies Inc.
    Inventors: Jesse Rickard, Peter Maag, Jared Newman, Giulio Mecocci, Harish Subbanarasimhia, Adrian Marius Dumitran, Andrzej Skrodzki, Jonah Scheinerman, Gregory Slonim, Alexandru Viorel Antihi
  • Publication number: 20170134425
    Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.
    Type: Application
    Filed: April 10, 2015
    Publication date: May 11, 2017
    Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
  • Publication number: 20160335342
    Abstract: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data stored in a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical first number of data items included in a corresponding local version of the first grouping; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of the corresponding local version of the first grouping to determine which data items have changed; extract the changed data items of the first grouping; and forward the extracted data items to a destination system.
    Type: Application
    Filed: July 26, 2016
    Publication date: November 17, 2016
    Inventors: William Fisher, Peter Maag
  • Patent number: 9449074
    Abstract: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data stored in a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical first number of data items included in a corresponding local version of the first grouping; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of the corresponding local version of the first grouping to determine which data items have changed; extract the changed data items of the first grouping; and forward the extracted data items to a destination system.
    Type: Grant
    Filed: March 10, 2016
    Date of Patent: September 20, 2016
    Assignee: PALANTIR TECHNOLOGIES INC.
    Inventors: William Fisher, Peter Maag
  • Patent number: 9292388
    Abstract: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data stored in a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical first number of data items included in a corresponding local version of the first grouping; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of the corresponding local version of the first grouping to determine which data items have changed; extract the changed data items of the first grouping; and forward the extracted data items to a destination system.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: March 22, 2016
    Assignee: Palantir Technologies Inc.
    Inventors: William Fisher, Peter Maag
  • Patent number: 9230280
    Abstract: In various embodiments, systems, methods, and techniques are disclosed for generating a collection of clusters of related data from a seed to assist in detection of financial malfeasance. Seeds may be generated based on seed generation strategies or rules. Clusters may be generated by, for example, retrieving a seed, adding the seed to a first cluster, retrieving a clustering strategy or rules, and adding related data (such as trades, emails or chat messages) and/or data entities to the cluster based on the clustering strategy. Various cluster scores may be generated based on attributes of data in a given cluster, and the clusters may be displayed and ranked based on their scores. Various embodiments may enable an analyst to review clusters of trades, emails and/or chat messages that are the most likely to reveal financial malfeasance.
    Type: Grant
    Filed: May 15, 2014
    Date of Patent: January 5, 2016
    Assignee: Palantir Technologies Inc.
    Inventors: Peter Maag, Tom O'Brien, Phil Cross, Suran Peter Tosirisuk
  • Publication number: 20150269030
    Abstract: According to certain aspects, a computer system may be configured to obtain information indicating a plurality of groupings of data stored in a data source, the information indicating a number of data items included in each of the plurality of groupings; determine a first grouping of the plurality of groupings including one or more data items that have changed by comparing a first number of data items included in the first grouping and a historical first number of data items included in a corresponding local version of the first grouping; access data items included in the first grouping from the data source; compare the data items included in the first grouping to data items of the corresponding local version of the first grouping to determine which data items have changed; extract the changed data items of the first grouping; and forward the extracted data items to a destination system.
    Type: Application
    Filed: December 23, 2014
    Publication date: September 24, 2015
    Inventors: William Fisher, Peter Maag
  • Publication number: 20150235334
    Abstract: Systems and techniques for sharing healthcare fraud data are described herein. Healthcare fraud detection schemes and/or fraud data may be automatically shared, investigated, enabled, and/or used by entities. A healthcare fraud detection scheme may be enabled on different entities comprising different computing systems to combat similar healthcare fraud threats, instances, and/or attacks. Healthcare fraud detection schemes and/or fraud data may be modified to redact sensitive information and/or configured through access controls for sharing.
    Type: Application
    Filed: October 20, 2014
    Publication date: August 20, 2015
    Inventors: Lekan Wang, Melody Hildebrandt, Tayler Cox, Chris Burchhardt, Casey Ketterling, Ajay Sudan, Bob McGrew, Jacob Albertson, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball
  • Patent number: 9009827
    Abstract: Systems and techniques for sharing security data are described herein. Security rules and/or attack data may be automatically shared, investigated, enabled, and/or used by entities. A security rule may be enabled on different entities comprising different computing systems to combat similar security threats and/or attacks. Security rules and/or attack data may be modified to redact sensitive information and/or configured through access controls for sharing.
    Type: Grant
    Filed: May 16, 2014
    Date of Patent: April 14, 2015
    Assignee: Palantir Technologies Inc.
    Inventors: Jacob Albertson, Melody Hildebrandt, Harkirat Singh, Shyam Sankar, Rick Ducott, Peter Maag, Marissa Kimball