US 12,289,397 B2
Systems and methods for selective access to logs
Vaughan Shanks, Kew (AU); and Andrew Lampert, Pascoe Vale South (AU)
Assigned to Palantir Technologies Inc., Denver, CO (US)
Filed by Palantir Technologies Inc., Denver, CO (US)
Filed on Aug. 15, 2023, as Appl. No. 18/234,224.
Application 18/234,224 is a continuation of application No. 17/481,221, filed on Sep. 21, 2021, granted, now 11,728,975.
Application 17/481,221 is a continuation of application No. 15/991,366, filed on May 29, 2018, granted, now 11,133,925, issued on Sep. 28, 2021.
Claims priority of provisional application 62/595,857, filed on Dec. 7, 2017.
Prior Publication US 2023/0388108 A1, Nov. 30, 2023
Int. Cl. H04L 9/08 (2006.01); G06F 21/62 (2013.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04W 12/04 (2021.01); H04W 12/06 (2021.01); H04W 12/08 (2021.01)
CPC H04L 9/0825 (2013.01) [G06F 21/62 (2013.01); H04L 9/083 (2013.01); H04L 9/0894 (2013.01); H04L 9/3226 (2013.01); H04L 63/0435 (2013.01); H04W 12/04 (2013.01); H04W 12/06 (2013.01); H04W 12/08 (2013.01); G06F 2221/2101 (2013.01); G06F 2221/2107 (2013.01)] 14 Claims
OG exemplary drawing
 
8. A method comprising:
creating a public key and a secret key corresponding to a role, wherein the public key and the secret key are configured to encrypt and decrypt, respectively, one or more dataset keys;
creating a dataset or obtaining an indication that the dataset has been created;
generating a dataset key in response to creating the dataset or obtaining the indication that the dataset has been created, wherein the dataset key is configured to encrypt and decrypt the dataset;
encrypting the dataset into an encrypted dataset using the dataset key;
encrypting the dataset key into an encrypted dataset key using the public key;
receiving a request to access the dataset, the request indicating the role and an identifier for the dataset;
transmitting the encrypted dataset key in response to receiving the request to access the dataset;
decrypting the encrypted dataset key using the secret key, wherein the decrypting of the encrypted dataset key causes generation of the dataset key;
decrypting the encrypted dataset using the dataset key, wherein the decrypting of the encrypted dataset causes generation of the dataset or a copy of the dataset;
in response to receiving an indication that the dataset or the copy of the dataset has been accessed, generating a log, wherein the log comprises different portions having different security parameters or different access privileges;
encrypting the log using the dataset key;
storing the encrypted log with the dataset or the copy of the dataset in a storage; and
deactivating the dataset key upon the log being encrypted.