Palantir Technologies Inc.
SYSTEMS AND METHODS FOR PROVIDING NETWORK-BASED PERMISSIONING USING SECURITY NODE HASH IDENTIFIERS

Last updated:

Abstract:

Systems and methods generate a first security node hash identifier by performing a first hash operation, such as a one-way hash, on a first data resource identifier associated with a first data resource, such as a data set, produced by a data resource platform. The systems and methods generate a dependent second security node hash identifier by performing a second hash operation on a second data resource identifier associated with a dependent second data resource produced by the data resource platform and on the first security node hash identifier, receive an access request for access to the dependent second data resource; and in response to the access request, grant permission to access the dependent second data resource to a user associated with the access request based on the dependent second security node hash identifier.

Status:
Application
Type:

Utility

Filling date:

3 Jan 2020

Issue date:

29 Apr 2021