- Denver CO, US Arseny Bogomolov - Arlington VA, US Alexander Mark - New York NY, US Teofana Hadzhiganeva - Bethesda MD, US Kevin Ng - New York NY, US Nathaniel Klein - Washington DC, US Sharon Hao - Redwood City CA, US
International Classification:
H04L 9/40
Abstract:
An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
Unified Data Model And Interface For Databases Storing Disparate Types Of Data
- Denver CO, US Sharon Hao - Redwood City CA, US Will Deuschle - Orchard Park NY, US Ernest Zeidman - Palo Alto CA, US
International Classification:
G06F 16/21 G06F 16/28 G06F 16/248
Abstract:
Systems, methods, and non-transitory computer readable media may be configured to access first database and a second database. The first database may be structured for a first data type, and may include a first data of the first data type. The second database may be structured for a second data type different from the first datatype, and may include a second data of the second data type. The second data may be associated with the first data. A first information request relating to the first data and a second information request relating to the second data may be received. A first response to the first information request may be determined based on the second data. A second response to the second information request may be determined based on the first data. An interface, through which the first response or the second response is accessible, may be provided.
- Palo Alto CA, US Andrew Elder - New York NY, US Caitlin Colgrove - Palo Alto CA, US Daniel O'Malley - Palo Alto CA, US Hannah Korus - Palo Alto CA, US Michael Barone - Washington DC, US Sharon Hao - Redwood City CA, US William Rhyne - Menlo Park CA, US
Systems and methods are provided for integrated data analysis. At least one object that is responsive to a first search query is determined. The object is stored in an object model that is managed by a first computing platform, and the at least one object is associated with one or more properties. One or more data sets that are responsive to a second search query are determined. The data sets are managed by a second computing platform. The one or more data sets are determined related to the at least one object. The at least one object is updated to include at least one property that references at least one analysis that relies on the one or more data sets.
- Palo Alto CA, US Arseny Bogomolov - Arlington VA, US Alexander Mark - New York NY, US Teofana Hadzhiganeva - Bethesda MD, US Kevin Ng - New York NY, US Nathaniel Klein - Washington DC, US Sharon Hao - Redwood City CA, US
International Classification:
H04L 29/06
Abstract:
An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
- Palo Alto CA, US Arseny Bogomolov - Arlington VA, US Alexander Mark - New York NY, US Teofana Hadzhiganeva - Bethesda MD, US Kevin Ng - New York NY, US Nathaniel Klein - Washington DC, US Sharon Hao - Redwood City CA, US
International Classification:
H04L 29/06
Abstract:
An example method of enforcing granular access policy for embedded artifacts comprises: detecting an association of an embedded artifact with a resource container; associating the embedded artifact with at least a subset of an access control policy associated with the resource container; and responsive to receiving an access request to access the embedded artifact, applying the access control policy associated with the resource container for determining whether the access request is grantable.
Systems, Methods, User Interfaces And Algorithms For Performing Database Analysis And Search Of Information Involving Structured And/Or Semi-Structured Data
- Palo Alto CA, US Alexander Mark - New York NY, US Sharon Hao - Redwood City CA, US David Cohen - Mountain View CA, US Andrew Elder - New York NY, US Daniel Lidor - Washington DC, US Joel Ossher - Oakton VA, US Christopher Richbourg - Arlington VA, US Joshua Zavilla - Washington DC, US Kevin Zhang - Palo Alto CA, US
International Classification:
G06F 16/248 G06F 3/0482
Abstract:
Implementations for searching and analyzing large, object-oriented data sets in an efficient manner involving innovative user interface features and/or search algorithm functionality are disclosed. In one exemplary embodiment, a system may search for information and/or relationships based on specified search criteria and return results that may be displayed dynamically and further filtered or analyzed. Systems may involve object oriented database(s) and a software layer including a specialized user interface between the user and the database(s). The user interface may comprise various tools as well as predefined and configurable features that enable effective search of the data as well as display of search results that are configurable and readily managed to provide immediate and useful search results. The user interface may display the search results and various associated graphical representations and models, and/or provide tools enabling dynamic manipulation and display of search results or underlying object models, among other things.
System Architecture For Enabling Efficient Inter-Application Communications
- Palo Alto CA, US Christopher Hammett - Washington DC, US Lloyd Ho - Palo Alto CA, US Sharon Hao - Redwood City CA, US
International Classification:
H04L 29/08 G06F 8/76 G06F 8/51
Abstract:
A system architecture can be used to facilitate communication among applications that are native and/or non-native to an application environment. The system architecture can include a first application environment executed on a client-side computing device. The first application environment can execute software applications that are native thereto. The first application environment can further execute software applications that are native thereto, but which software applications themselves comprise second application environments of types different from the first application environment, and which software applications can therefore execute additional software applications that are non-native to the first application environment. The first application environment can further execute a computation engine that is configured to store and execute instructions received from the first software application, the second software application, or both.
Systems And Interactive User Interfaces For Automatic Generation Of Temporal Representation Of Data Objects
- Palo Alto CA, US Sharon Hao - San Jose CA, US Bradley Engel - Gaithersburg MD, US Xinyi Wang - Ithaca NY, US Jack Grossman - Palo Alto CA, US Gregory Martin - Royal Oak MI, US Andrew Elder - Cherry Hills Village CO, US Ryan Xie - Fremont CA, US Brian Hamilton - Arlington VA, US Joshua Zavilla - Washington DC, US Christopher Richbourg - Arlington VA, US Ryan Beiermeister - Washington DC, US Marc Frankel - New York City NY, US
Computer-implemented systems and methods are disclosed for automatically generating and displaying a chronology of events, where events may be represented by data objects in one or more databases. Events/data objects may be identified as relevant to an investigation or analysis based on specified criteria. A timeline may be generated based on the identified set of relevant events, and interactive user interfaces may be generated and displayed that present the events as a timeline and a list. Events may be selected from the timeline or the list, may be identified as key events in the chronology, and additional events related to a selected event may be determined and added to the chronology. Timelines may be compared to other data sets, including other timelines, other event lists, and other relevant data.