US20180182052A1 - Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment - Google Patents

Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment Download PDF

Info

Publication number
US20180182052A1
US20180182052A1 US15/848,807 US201715848807A US2018182052A1 US 20180182052 A1 US20180182052 A1 US 20180182052A1 US 201715848807 A US201715848807 A US 201715848807A US 2018182052 A1 US2018182052 A1 US 2018182052A1
Authority
US
United States
Prior art keywords
data
shareable
rules
requestor
owner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US15/848,807
Inventor
Timothy Panagos
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microshare Inc
Original Assignee
Microshare Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microshare Inc filed Critical Microshare Inc
Priority to US15/848,807 priority Critical patent/US20180182052A1/en
Publication of US20180182052A1 publication Critical patent/US20180182052A1/en
Assigned to Microshare, Inc. reassignment Microshare, Inc. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Panagos, Timothy
Assigned to ACQUIOM AGENCY SERVICES LLC, AS COLLATERAL AGENT reassignment ACQUIOM AGENCY SERVICES LLC, AS COLLATERAL AGENT SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: Microshare, Inc.
Priority to US17/930,163 priority patent/US20230076019A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/308Payment architectures, schemes or protocols characterised by the use of specific devices or networks using the Internet of Things
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0282Rating or review of business operators or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Definitions

  • a shared dataset is stored by the owner on a hard drive or similar computer storage media. As the data is shared it may be transmitted over a network connection to a remote computer system where it must also be stored on computer storage media. For each act of sharing, the consumption of network resources and storage resources is duplicated creating unnecessary costs for all participants. The desirability of each of these transactions is managed either by ad-hoc human decisions (as with email or FTP of files) or through computer software logic that must be embedded in both the sending computer system and the receiving computer system (as with APIs or SDKs).
  • the invention described herein eliminates the need for duplicative storage of data and network traffic making the act of sharing data computationally efficient. And by centralizing the computational decision logic in a single computer system it allows for owners to centrally manage their data assets to eliminate the need to update the software code of multiple computer systems in order to enact a change.
  • the embodiments described herein ensure that sharing logic remains flexible, data sharing is fast and efficient by streamlining access decisions into a single core system component.
  • a method and system for storing, managing, and sharing data stored in a computational system that includes at least one shareable asset that makes data from source content accessible by remote computer systems connected through a network; one or more owners with joint rights of ownership to at least one shareable asset stored on a computer system; a requestor that requests at least one shareable asset via a computer network; a policy fabric executing as computer code on a computation device that (1) assigns static and dynamic ownership rights to shareable assets; (2) contains rules, encoded as logic suitable for execution by a software process executing on a computational device, contributed by one or more owners which express the intent of each owner relative to the disposition of the underlying shared asset with respect to attributes of shareable assets, attributes of requests and requestors, and contextual reference information as derived computationally through network requests, computationally derived and stored digital content; and (3) applies the applicable rules when a requestor requests access to a shareable asset with protections for potentially conflicting interests of multiple owners; and a network message containing only approved digital content representing raw or filtered data or computationally generated derivates
  • FIGS. 1A-1C show area conceptual diagram of the system components.
  • FIG. 2 is a flowchart of an embodiment showing a method for handling data owned by multiple parties.
  • FIG. 3 is a flowchart of an embodiment showing a method for fulfilling multi-party sharing of data owned by multiple parties.
  • FIG. 4 is a flowchart of an embodiment showing a method for limiting visibility of sensitive data in multi-party sharing of data.
  • FIG. 5 is a flowchart of an embodiment showing a method for deriving dynamic ownership attributions using contextual cues.
  • FIG. 6 is a flowchart of an embodiment showing a method for resolving potentially conflicting intents when sharing data in a multi-owner situation.
  • FIG. 7 is a flowchart of an embodiment showing a method for storing unrelated data in a multi-tenant system.
  • FIG. 8 is a flowchart of an embodiment showing a method for combining both raw data and derived Views in a multi-owner situation for multi-party sharing.
  • FIG. 9 is a flowchart of an embodiment showing a method for offering aggregated data in a data marketplace.
  • FIG. 10 is a flowchart of an embodiment showing a method for capturing multi-party terms and conditions in a Microcontract.
  • FIG. 11 is a flowchart of an embodiment showing a method for enforcing terms and conditions over time in a Microcontract.
  • the method and system includes a computer system implementation of a policy fabric and sharing system that combines computer data storage, computer processing, and computer networking components.
  • the system grants or denies network access to stored digital data and digitally representable assets using a computer process capable of interpreting human contributed, computer executable rules along with context provided by computational derived, network accessible, or locally stored data to mimic human decision making.
  • This creates a computational system which allows a both a single device or cluster of devices to provide centralized storage, computer processing, and network bandwidth needed to fulfill the data ingestion and digestion for an ecosystem of network-connected computer systems with diverse rights and interests in the underlying digital data.
  • the system governs the contribution, access, and marketing of large amounts of shareable information in multi-tenant, multi-party transactions.
  • the system contributes to improved network performance by limiting bandwidth requirements, which also contributes to improving computing device performance through the use of fewer computational resources. Bothe of these further use less energy than traditional data sharing techniques.
  • the system also may include a software-defined data store described in more detail below.
  • the system may:
  • the Policy Fabric may be the system of:
  • the Policy Fabric may respond to the introduction of a new Shareable by:
  • the Policy Fabric may fulfill incoming Requests with a set of Shareables by:
  • the Policy Fabric may be a distributed software system coded in the Scala programming language with both centralized processing on a core set of servers as well as decentralized processing on network leaf nodes which may be comprised on sensor devices, home network components, smart appliances, mobile devices, home or office computing devices, and/or distributed servers.
  • Any Turing complete programming language including microcomputer assembly language, may be used to embody the Policy Fabric.
  • the Policy Fabric may use JSON-based messages and RESTful API calls to create new Shareables, make Requests, and fulfill Microshares.
  • SDK Software Development Kit
  • XML XML
  • SOAP Web Services & RPC-like integration protocol
  • Shareables and their Ownership Indexes may be created through invocation of real-time APIs or through batch processes of Source Content.
  • Shareables may be digital assets such as loT sensor datum, files, audit records, transaction records, images, videos, or any physical asset whose ownership can be represented through Ownership Attributes in Ownership Indexes with physical inventory control such as RFID or loT sensors to track and monitor disposition in real-world.
  • a set of default Rules may be established to apply to any Shareable without specific rules established by the Owner of the Shareable. Shareables may thus be protected by a set of unalterable Rules.
  • a Weighting Algorithm may be used to determine the most applicable of the given Rules for the purposes of generating accurate Audit and triggering the creation of Microcontracts which may convey Payment Events.
  • One dimension that may be used in the selection of a TRUE are the terms and conditions specified by the resulting Microcontract such as the length of time granted or the relative price set by the Owner of the triggered Rule.
  • the naming standard for Record Types may create a “Dewey Decimal” system for marking a Shareable as belonging to a given domain of data by industry, function, and systemic relationship.
  • “Like” types are alternative indexes of Shareables that have been determined to bear strong relationships to the target Record Type based on elements such as the frequency of their association in usages, similarity of underlying structure, and designation by a trusted source.
  • “Like”-types may be used to allow for the discovery of new Shareable sources in the course of a Request consummation.
  • “Like”-type Rules are typically limited to idempotent (non-persisting) Operation matches (e.g. Read or Query).
  • Rules that relate to a specific domain, record type, or other bundle of Ownership Attributes may be grouped into a Ruleset. Rulesets may be cached inside the runtime system to improve the performance against larger numbers of similar Shareables.
  • Rulesets may also be authored centrally and distributed automatically to execute closer to either the source of the Shareables or the target of consumption to offload processing and improve the speed of execution. Rulesets will be specifically encrypted in-storage and will include a “digital fingerprint” using a hash algorithm, such as SHA-256, to prove that the Ruleset has not been tampered with.
  • SHA-256 hash algorithm
  • Rulesets may be stored as data, as executable software code, or both.
  • Rules may be set to block information sharing between parties where Rules define Contextual Conditions such as those required in the Gramm-Leach-Bliley Act which prevents the sharing of certain customer information between lines of business in financial institutions.
  • the Shareable content itself may be stored in an encrypted format to prevent unintended disclosures.
  • Shareables may be cloned using different disposable private keys to allow for controlled views across multiple parties without the loss of the Owner's master private key.
  • Microcontracts may be rendered into a smart contract enforcement system such as the blockchain-based Ethereum using a Turing complete scripting language, such as Solidity, to encode specific executable Rulesets.
  • a smart contract enforces that the terms of the contract will be honored by the Owner to the Requestor because it ensures that the contracted Rules cannot be revoked by the Owner until their terms are met.
  • Microcontracts rendered in this way may preserve a Ruleset and the implied Operation Grant rights until terms and conditions have been met such as expiration of specified time period, number of invocations, or payment status.
  • Rulesets preserved in public blockchain implementations may be ‘locked’ using encryption keys to ensure party-to-party privacy.
  • the system herein helps manage the volume of information that must be consumed, categorized, and consummated and makes that data immediately available to an end user like a business to generate value from the information while respecting the rights of multiple owners of the data or stake-holding parties.
  • Data Owners 100 include data contributors such as loT networked devices 100 a that may include data sensors, mobile devices, operational systems 100 b , and transactional systems 100 c . Data may be consumed by Requestors 101 through multiple device actuators 101 a , analytics pipelines 101 b , and applications 101 c . Both sets of users 100 and 101 may interact with the system architecture 120 through either a graphical user interface or through system APIs 110 mediated by an API Manager 102 . The API Manager interfaces with the Authorization Manager 103 to determine the identity of Owners 100 and Requestors 101 based on supplied credentials. Identities may be managed through a combination of local and external identity management systems existing either in an Enterprise 107 or in the cloud 108 .
  • data contributors such as loT networked devices 100 a that may include data sensors, mobile devices, operational systems 100 b , and transactional systems 100 c . Data may be consumed by Requestors 101 through multiple device actuators 101 a , analytics pipelines 101 b , and applications 101 c .
  • the Policy Fabric 104 which evaluates user-defined policy Rules to manage the sharing of data right, mediates requests to store or retrieve data.
  • Data is logically managed by a Virtual Data Lake 105 that abstracts the details of local 106 , remote enterprise 107 , and remote cloud 108 data storage configurations. It may also use a distributed database such as a blockchain 109 to store indelible Rulesets in the form of Microcontracts. Data may flow from multiple Owners 100 to multiple Requestors 101 through the core architecture that ensures that proper governance is observed.
  • Each data element may have unique ownership rights that may be managed to ensure regulatory compliance, satisfy contractual obligations, or capture value from downstream applications of the data.
  • data that has multiple owners it is said to be multi-owner.
  • data has multiple (non-owner) consumers it is said to be multi-party.
  • the system manages data in the context of both multi-owner and multi-party contexts simultaneously.
  • Each system component may represent a collection of one or more computer storage, processing, and network resources dedicated to a function of the system.
  • Two example interaction diagrams are provided to show common interaction signals between components for scenarios where 1) FIG. 1B new datum is stored and indexed in the system and 2) FIG. 1C data is requested by a third-party via networked computer.
  • FIG. 1B begins with the originating (or Owner) system 10 represented by a sensor, transactional computer system, mobile phone, or other digital data generating device sending an Authorization API request 11 to the system.
  • This Authorization API request 11 includes some verifiable credentials which may include username/password, cryptographic key exchange, or biometric parameters that can be used to positively identify the end user or system.
  • the request 11 is handled by the API Manager component 20 .
  • the API Manager passes the credential authentication signal 21 to the Authorization Manager 30 , which will determine if the asserted identity belongs to a foreign organization or a local individual. Based on the determination, the Authorization Manager 30 will either make a request 31 via network-enabled API to a remote Identity Manager 40 or invoke a local computer process representing a local Identity Manager 40 .
  • the Identity Manager 40 will lookup the asserted user in the user storage and determine if the supplied credentials confirm that identity. If the identity is confirmed (ie. The supplied password matches that stored for the asserted username.), then the Identity Manager 40 will return 41 all of the stored attributes of the confirmed user. The Authorization Manager 30 will then generate and transmit a unique token 32 representing that session through the API Manager 20 and through another signal 22 to the Owner 10 . The token may be set to expire in some finite amount of time. The Authorization Manager 30 persists to disk storage or maintain an in-memory lookup structure to retain the linkage between the user information and the authorization token.
  • FIG. 1B continues with the originating system 10 making one or more network API calls to POST 12 or create new data entries into the system.
  • the API Manager 20 confirms that the supplied token is still valid and retrieves stored Owner Attributes from the Authorization Manager 30 in authentication 23 and owner attribute return 33 steps.
  • the API Manager 20 then sends a message containing the data to be stored (source content) and the Owner Attributes 24 to the Virtual Data Lake 50 .
  • the Virtual Data Lake 50 sends a message via network or in-process communication 51 to the Policy Fabric component 70 .
  • the Policy Fabric component 70 applies logic (attribution function) 71 to the packaged request to determine an array of Owners based on the Rules established by the primary Owner.
  • the array of Owner Attributes with 1 or more Owner data structures is returned by message 72 to the Virtual Data Lake.
  • the Virtual Data Lake 70 will then cause to be stored the source content and the Index Object by calling one or more Data Storage components 60 .
  • the Data Storage component 60 exchanges object save 52 and save response 61 signals with the Virtual Data Lake 50 and is responsible for the durable maintenance of the digital information on disk, in-memory, or similar digital media.
  • the Virtual Data Lake 50 will send an acknowledgement message back to the API Manager 20 .
  • the API Manager 20 will respond to the POST API call via a network message 25 to the originating system 10 .
  • FIG. 1C begins when a Requestor 00 operating a computing system capable of consuming digital data makes an Authorization request 01 which is handled in the system as described above, where like numbers represent like signals and logic responses.
  • the Identity Manager used in this exchange may or may not be the same as used to identify and describe the original creator. It is assumed that Identities are managed by many participating organizations each operating a computer system component capable of authenticating and authorizing their own end users and systems. Each Owner/Requestor may be authenticated by their own unique organizational associations.
  • FIG. 1C continues when the requesting system sends a network-enable API request message to the API Manager to GET, query or retrieve some set of data 02 based on some combination of unique identifiers (foreign keys), query parameters, search tags, keywords, or data classifications.
  • the API Manager 20 formats these parameters into a Shareable Query and sends a message 25 to the Virtual Data Lake 50 for fulfillment.
  • the Virtual Data Lake 50 executes a query 53 against stored Index Objects using the Data Storage component 60 .
  • the Data Storage component 60 returns a collection of zero to many candidate data elements 62 . This set of candidates is sent as a stream or aggregate data structure 54 to the Policy Fabric 70 .
  • the Policy Fabric 70 first uses the unique set of Ownership Attributes from each of the elements in the candidate list to query 73 a Rule Storage component 80 that represents a persistent data storage technology and may or may not be the same as the Data Storage component 60 .
  • the candidate rules are returned 81 to the Policy Fabric 70 .
  • the Policy Fabric 70 will make a query 74 to any associated distributed data stores (such as a blockchain provider) 90 to determine if there are associated Smart Contracts (Microcontracts) relating to the candidate elements and the data store 90 returns candidate Rules 91 .
  • the Policy Fabric 70 will aggregate the Rules from both sources 80 , 90 and call the evaluation function 75 to determine where each element in the candidate list is granted based on the Rules and the context established by the Policy Fabric 70 .
  • the result is a filtered list of elements that comply with all of the applicable Rules.
  • This filtered collection is sent as a stream or aggregate data structure 76 via computer message to the Virtual Data Lake 50 .
  • the Virtual Data Lake 50 will annotate the collection to create a Microshare and return this data structure 55 to the API Manager 20 .
  • the API Manager returns the Microshare content in a digital format that complies with the request (typically as JSON, XML, or some compressed or encrypted binary format) via network message 25 .
  • An example in the realm of healthcare involves an entry into an Electronic Medical Record (EMR).
  • EMR Electronic Medical Record
  • a Physician enters notes into an EMR User Interface 200 , and the EMR authenticates to the system using an API to establish the Physician's identity 201 .
  • the authentication may be based on credentials which may include some combination of username and password; private security keys; certificates; or biometric markers.
  • the Physician provides username and password to their EMR system whose underlying identity management is performed using an Active Directory repository.
  • the system may receive a request via API executed by the EMR system to authorize the Requestor for system access.
  • the system may reflect the provided attributes back to the Active Directory identity management system and use the resulting data to ascribe attributes (Requestor Attributes) to the Physician as a Requestor and potential Owner.
  • the Ownership Attributes may capture the Role (physician), authentication strength, and identifying organization (medical company).
  • the system may receive data from the EMR 202 .
  • the description of the process of authentication leading to Requestor Attributes or Ownership Attributes will be omitted from subsequent examples since it is repetitive.
  • the entry may be contributed BY 203 the physician, creating a Shareable 204 , stored according to a configured logic 205 .
  • the entry may be ABOUT 206 the patient.
  • the system may assign BY and ABOUT as Ownership Designations based on these relationships and stores them in an Index Object 207 for later use.
  • This single record is “owned” by both the physician and the patient—the BY and the ABOUT parties.
  • Each has rights of access and disposition of the data.
  • the patient however, has no ownership claim to every record stored in the same EMR repository.
  • each notional row has a potentially different ABOUT owner.
  • the EMR record in this case, is said to be multi-owner.
  • the system attributes data, process, and document ownership in a multi-owner way by annotating or indexing each individual data asset (notionally each row).
  • Annotations may be added or tagged to any kind of data from documents to sensor readings.
  • Annotations allow assets to be tracked and managed across cloud and on premise storage locations and technologies giving a one-source-of-truth view of co-owned content.
  • Annotations may include:
  • the EMR entry may be annotated with information that describes both the BY owner and the ABOUT owner. This information might be stored with the EMR entry or in a completely separate index database.
  • the system allows every owner the ability to capture their intent or policy regarding the disposition of the shareable asset by any third-party Requestor (typically a non-owner).
  • This disposition is usually described as an act of sharing (ie. Reading or Querying) but includes any logical operation (Operational Grant) on either the data itself (eg. READ, WRITE, DELETE), a digitally mediated transaction (eg. BUY, SELL, RENT), and the digitally represented physical asset (eg. UNLOCK, OPEN, SHUTOFF).
  • Intent is captured in the form of a number of Rules—an computer executable language or interpretable instruction set—that express the intent to grant operations based on attributes of the data, attributes of the request, and on attributes of the general environment.
  • a patient may create a Rule that grants Read-only access to their medical records 300 (those that are ABOUT them) created by any medical professional (written BY any owner) to any verified employee of their own Primary Care Physician.
  • This Rule will typically convey to the PCP rights to read without changing ownership.
  • the patient could create another Rule that extends access, contextually, to any other physician if the patient is currently located inside of that physician's hospital 301 (based on reported location of a mobile phone or other location-sensing device 308 , 309 ).
  • the system may find all the candidate Shareables 304 and candidate Rules 305 and evaluates them in the context of current Request 306 .
  • the second Rule 301 would allow for fast data sharing in the event of an treatment event or emergency.
  • the system may determine a) if the current Requestor has a role of Physician 307 by looking at the Request Attributes and then b) if a Contextual Cue exists that signals that the patient is currently located within the confines of a hospital 307 , 308 . If these conditions apply then the data is accumulated into a Microshare 310 and returned to the hospital's patient system for review by medical staff 312 .
  • the response to the Requestor (medical staff) 312 may limited to only the resulting Microshare contents 310 which is guaranteed to contain only data allowed by the Rules.
  • the EMR record in this case, is said to also be multi-party because rights have been provisionally granted to non-owners.
  • the system may grant contextual access with fluid rules to make it easy to mash-up insights from multiple sources dynamically. Aggregations, redactions, and other data operations (Views) are captured in the system by Owners in such a way that Rules may be applied to them independently of the data upon which they act.
  • the system applies to any mechanism for creating predefined queries or views without respect to the language used to define them or the underlying technology used to enact them.
  • a Home Owner may wish to share home security usage metrics (utility consumption, time spent in the home, for example) with their home insurer in exchange for a discount.
  • the Smart Home systems send data streams 400 to the system, which allocates ownership to the home owner 401 , creates a Shareable 402 , and stores both the sensor data 403 and the Index Objects 404 that describe the Shareable in terms of searchable metadata.
  • the Home Owner creates a View that calculates the average daily activation time for the security devices 405 .
  • the Home Owner may create a Rule to grant EXECUTE rights to that View for an authenticated employee of an insurance company, for example, with a role of Underwriter 406 . Notice that the Home Owner does not assign the insurance company a role as a co-owner but only grants provisional access rights which may be revoked at any time.
  • License terms are conveyed to the insurance company Requestor creating a legal contract which may be used later to pursue damages based on misuse 414 .
  • the legal contract may be entered into as terms of requesting and granting the request.
  • the Underwriter can make requests 407 to retrieve current usage data at any time. After the Request is received 407 , the system may request authentication 408 and find Shareables related to the homeowner and security domain 409 .
  • the system retrieves stored Rules that apply to the Smart Home data 410 and includes both Rules that apply to underlying data 410 a and 410 c . In this example, the system may determine 411 that there are no Rules providing access to underlying data 410 b so the response to the Underwriter 415 may be
  • the applicable Rules include a check against the Authenticated details of the Requestor to establish that the request is originating from an employee of AAACo with a role assignment of Underwriter 412 .
  • the Home Owner shared the desired minimal insight required to fulfill their obligation to the Home Insurer without sacrificing privacy. For example, while the Home Owner may have shared at what times the home was occupied, it may not have shared information regarding how many people were at home, their ages, or their locations in the home, thus protecting certain aspects of their privacy.
  • the entire process of evaluating Rules against criteria is captured in an Exhaustive Audit 416 to provide a detailed record of the transaction.
  • the system includes the Policy Fabric Rules Engine that ensures consistent application of the data ownership rules.
  • the Policy Fabric allows for negotiation and consummation of data sharing partnerships in microseconds. This is called a Microshare(s).
  • Microshares users or user devices can both share and gain access to the shareable assets of others without the need for fixed integrations or protracted security configurations.
  • Shareable assets may be on-cloud or on-premise: Both are protected by the Policy Fabric's security rules and enabled by Enterprise-friendly integration capabilities.
  • the annotation schema may be used to determine what data can be shared and what data must remain private by defining rules that fire against contextual data to determine how to handle requests for access. Rules serve as knobs and dials that can set a granular privacy stance. Rules bridge the gaps between exclusive (locked-down) and publicly owned assets (wide open).
  • data may be made available by opening and closing virtual doors and windows rather than moving data. These virtual doors may be available to allow multi-source, sub-second analytics that can factor data on-cloud and on premise with complete security. Without the need to move the data, an Owner's information is rented and not sold because access can be limited in time or condition to make the most of your monetization opportunities.
  • the system makes Shareables useful by multiple parties by providing a network-enabled Application Programming Interface (API)—a single integration style for all types of data.
  • API Application Programming Interface
  • the system provides a single, consistent API/SDK regardless of the format, technology, or source of the information.
  • the single API allows the discovery of new data assets and the integrating of new insights without requiring elaborate integrations or slow provisioning. Relationships between data creators and data consumers can be fluid and governed by the Rules/Views established by owners and the parameters to the API Requests alone. System tools can even allow M 2 M processes to use automated discovery to find and incorporate information in robotic automation decisions without human intervention. Requestors and Owners may interact with the system through API, SDK, batch file import/export, or through graphical user interfaces.
  • the engine may be purchased by the manufacturer of buses (among others) and is installed into a bus by which is sold to a leasing company.
  • the leasing company leases the bus to a tour operator. That tour operator sells seats on that bus to consumers.
  • the bus is driven through multiple jurisdictions with interest in the safety of citizens and apportionment of infrastructure costs. Each party to the bus's operation has a different stake in the information collected by the single engine warranty sensor.
  • the engine manufacturer might be considered an originating owner 501 .
  • the embedded sensor(s) within the engine may channel the data to the system where it is noted as being owned by the engine manufacturer.
  • the system Policy Fabric must first determine which engine the reporting sensor is installed in using a Contextual Cue provided by the engine manufacturer 504 which provides a lookup between sensor ID and engine ID. Additional owners may be attributed by walking through additional Conditional Cues such as the bills of sale 505 provided by the engine manufacturer to determine that the sensor was sold to the bus manufacturer 506 . Upon such a determination, the bus manufacturer may be added to the index as a secondary owner 507 . This process is repeated in a loop as successive relationships in the supply chain are discovered by the Policy Fabric 508 .
  • the sales data of the bus manufacturer may be used to determine that the leasing company is also an owner.
  • the current lease data is accessed to determine which tour operator is also an owner of this data.
  • the sensor data is now clearly multi-owner 509 .
  • Each of these co-owners may set their own Rules which, in turn, grant access to appropriate section of data to third-party maintenance companies or asset insurers.
  • the sensor data is multi-party—being shared by owners with interested non-owners.
  • FIG. 6 shows further logic in this continuing scenario.
  • the operators of the municipal bus terminal in Anyport, USA may be able to Query the system to determine the location, direction, and maintenance history of any buses that are within 2 miles of the terminal location 600 .
  • the systems received the Query 601 , checks for authorization 602 , finds relevant Shareables 603 and identifies applicable rules 604 .
  • the system evaluates 601 the Rules set by the operator (set in step 600 ) and begins an audit of each record/Rule combination considered 610 .
  • the audit record may contain an entry for each datum in combination with each applicable Rule and includes relevant Contextual Cue.
  • the audit stream contains enough detail that the transactions can be recreated in retrospect.
  • the auditing process 610 may be executing in-parallel to the evaluation steps 605 607 608 609 .
  • the evaluation involves checking if a requestor is a government employee 606 , locating a Contextual Cue about a bus location 607 , and checking a bus location proximate to the Requestor 608 . From this, the system creates a collection of each datum whose Operational Grant was accepted by the Rules as filtered through the defined View to create a Microshare 609 .
  • the system Prior to returning data to a government Requestor, the system will confirm that the Operational Grants contemplated do not violate the Rules established by other owners 611 . If a conflict is found, the system may execute a remediation workflow to determine a satisfactory resolution. The system may attempt to automatically resolve the conflict 612 by applying logic provided by other owners. If an automated solution cannot be found, a human workflow will be triggered 613 which the system will manage to determine the disposition of the conflicting request. The final result may be a compensating action defined within the resolution workflow 614 which may result in a situational Grant or a denial of the Grant.
  • the Rules may e applied in such a way that the leasing company is be able to make Requests to view the subset of the data that is generated only by their buses.
  • data from engines installed in, say, farm equipment may be unavailable to this bus/transportation branch of the supply chain.
  • Contextual Cues may be provided in the form of supporting operational data such as bills of sale and bills of lading.
  • the tour operator should be able to Request location and performance information for the buses that they operate and not those of their competitors. Consumers should be able to Request location information for the buses that they are waiting for.
  • FIG. 7 shows another use case where a renter rents an apartment from a building owner that equipped the unit with a smart refrigerator. That renter buys a network-connected, clothes washing machine.
  • the data from each of the connected devices may be shared directly to the individual manufacturers (as is often the case today) 701 , 707 . Assume that the renter may want to receive a discount from their electric company, but this discount requires energy usage statistics from all major appliances be made available in real-time. This sets up this use case.
  • the manufacturers (A & B) are automatically marked as the primary owners 702 , 708 for both the refrigerator and washing machine respectively when the data is received through the loT network.
  • the system stores relevant Shareables according to the logic 703 , 710 .
  • the landlord is attributed as the second owner of all refrigerator/washing machine data 705 , 712 in any of their buildings.
  • the system stores Index Objects for each owner associated with the Shareable.
  • FIG. 8 continues this utility use case.
  • the landlord may create a View that filters the refrigerator data to remove any data not associated with the requesting renter's apartment 801 .
  • the landlord may further create a Rule that grants EXECUTE access to the View for any of the renters 802 .
  • the renter can make a Rule that includes the electric consumption statistics from both machines and allocates a Rule that grants access to the electric company 803 .
  • the system considers the Request 804 in context of both the raw data from the washing machine (of which the renter is an owner) AND the View mediated data from the refrigerator (of which the renter is an allowed party) 806 (after confirming that the renter is authorized 805 ).
  • the systems finds Shareables 810 , identifies Rules 807 , evaluates Rules 808 , and confirms that Requestor is authorized (see first example for details) 809 and that the data is not someone else's 810 .
  • the system executes the View 811 using the authority of the View owner, in this case, the landlord. This creates a new data stream derived from underlying data that both the renter and the utility company are unable to see.
  • the system combines the two types of data together to create a single Microshare 812 .
  • the Renter may also grant access to all of the underlying data to the landlord who uses it to manage noise disturbances predicted by machine vibration statistics.
  • the Rules granting the landlord access to the data from the washing machine and the renter access to the data from the refrigerator may also expire.
  • the property owner imports the data 901 to create Shareables.
  • the property owner defines an unlimited number of Views 902 to create anonymized, aggregated, or filtered derivatives from the underlying Shareables.
  • Each View receives its own set of Rules to govern the share-ability with Requestors.
  • an Owner may also create a set of sample-only Views 903 may be created with looser set of sharing Rules 904 than those defined for the complete Views. This may allow the Owner to share a limited sample set of the data allowing potential Requestors to evaluate the data for suitability.
  • the Rules encapsulate additional terms and conditions that must be met before the Shareable can be accessed by a Requestor.
  • the terms may outline the details of payment on a per building per month basis.
  • the conditions may place restrictions on the Requestor such as a requirement to have a Dun and Bradstreet entry which does not be list the requesting organization as a commercial property owner.
  • Requestors make requests 905 and those that are authorized 906 and meet the criteria 907 , 908 , 909 may be shown a sample of the data as generated by the property owners sample View 903 . Following the location of Contextual Cues 910 , Requestor clearance 911 , Microshare creation 912 , the system responds 913 . The response includes details of the Terms and Conditions which the a requestor may consider prior to fulfilling a transaction 914 .
  • a local utility company wishes to buy a year-long view of building information from 10 regional commercial property managers (including the property manager mentioned above) for the purposes of capacity planning across commercially zoned areas. If the utility company decides to enter into a Microcontract with the property owner, a new request may be issued 1000 as shown in FIG. 10 .
  • the Microcontract is intended to establish irrevocable access to the expected volume of sensor data for the agreed-upon price following these defined terms and conditions captured by the owner as Rules 910 , 911 .
  • the system After verifying that the Requestor is authorized 1001 , the system finds Shareables 1002 and to ensure that both parties comply with the Microcontract, the Rules governing the intended sharing are encoded 1003 , 1004 in a specialized digital envelop which is stored as a protected data type with joint ownership by both parties.
  • the system may encode terms and conditions in the form of a Microcontract.
  • the system prevents the Microcontract from being updated or deleted by either owner without mutual approval.
  • the Microcontract may optionally be registered to a blockchain system 1006 to provide additional protections from tampering. In this event, the Rules reflecting the preserved Terms and Conditions in the Microcontract may be converted into executable computer code using a Turing-complete programming language to create what is known in the blockchain industry as a Smart Contract 1007 .
  • the resulting Smart Contract may then be sent as a transaction using the established APIs of the chosen blockchain implementation 1008 .
  • the system may respond to both the Requestor and the Owner with a notification of the initialization of the Microcontract that includes details of any optional Smart Contract publications 1009 .
  • FIG. 11 further describes the Microcontract described in FIG. 10 .
  • the Microcontract may be regarded as a master set of Rules that supersedes any Rule established thereafter 1103 , 1104 , 1105 by the data owner as long as all Terms and Conditions remain in effect 1107 .
  • the system may receive a request for building data 1100 , check for authorization 1101 , find Shareables related to the building company 1102 .
  • the policy engine may confirm that payments are current, that the buyer maintains appropriate classifications in D&B, and that the volume and scope of the data remains at advertised levels 1106 .
  • the system may create Microshares containing build data 1108 followed by a Microshare list 1109 , and a detailed audit record of each Grant 1110 that may be processed after the fact to create billing events 1111 or to establish compliance for fulfillment of legal discovery or regulatory reporting requirements.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Bioethics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Educational Administration (AREA)
  • Primary Health Care (AREA)
  • Automation & Control Theory (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

Methods and systems for storing, managing, and sharing data includes at least one shareable asset that shares data from source content; one or more owners with joint rights of ownership to at least one shareable asset; a requestor that requests at least one shareable asset; and a policy fabric that (1) assigns static and dynamic ownership rights to shareable assets; (2) contains rules contributed by one or more owners which express the intent of each owner relative to the disposition of the underlying shared asset with respect to attributes of shareable assets, attributes of requests and requestors, and contextual reference information ; and (3) applies the applicable rules when a requestor requests access to a shareable asset with protections for potentially conflicting interests of multiple owners.

Description

    BACKGROUND
  • Internet of Things, mobile computing, and multitenant cloud-based computing is driving massive increases in volume, variety, and velocity of data. Digital systems must increasingly manage data that whose logical or legal rights can be ascribed simultaneously to multiple parties. These rights must also be considered fluid due to the impact of changing regulations and ever-evolving relationships between data collecting and data consuming entities. All of these factors have raised new challenges in the governance of underlying data that are unmet by models for access sharing based on single, static ownership models. More sophistication is necessary to ensure that the disposition of data for operational, marketing, and analytic purposes follows the intents and rights of its various stakeholders.
  • In the currently implemented computing systems, the act of sharing data requires an excess of storage space, network traffic, and CPU processing cycles. Typically, a shared dataset is stored by the owner on a hard drive or similar computer storage media. As the data is shared it may be transmitted over a network connection to a remote computer system where it must also be stored on computer storage media. For each act of sharing, the consumption of network resources and storage resources is duplicated creating unnecessary costs for all participants. The desirability of each of these transactions is managed either by ad-hoc human decisions (as with email or FTP of files) or through computer software logic that must be embedded in both the sending computer system and the receiving computer system (as with APIs or SDKs). In these cases, a change in the logic of sharing requires that multiple computer system be updated before the change can be rendered into practice. Furthermore, by allowing the data to be copied to a remotely controlled computer system, the original owner of that data loses knowledge and control of additional uses for that duplicated data.
  • SUMMARY OF THE EMBODIMENTS
  • The invention described herein eliminates the need for duplicative storage of data and network traffic making the act of sharing data computationally efficient. And by centralizing the computational decision logic in a single computer system it allows for owners to centrally manage their data assets to eliminate the need to update the software code of multiple computer systems in order to enact a change. The embodiments described herein ensure that sharing logic remains flexible, data sharing is fast and efficient by streamlining access decisions into a single core system component.
  • A method and system for storing, managing, and sharing data stored in a computational system that includes at least one shareable asset that makes data from source content accessible by remote computer systems connected through a network; one or more owners with joint rights of ownership to at least one shareable asset stored on a computer system; a requestor that requests at least one shareable asset via a computer network; a policy fabric executing as computer code on a computation device that (1) assigns static and dynamic ownership rights to shareable assets; (2) contains rules, encoded as logic suitable for execution by a software process executing on a computational device, contributed by one or more owners which express the intent of each owner relative to the disposition of the underlying shared asset with respect to attributes of shareable assets, attributes of requests and requestors, and contextual reference information as derived computationally through network requests, computationally derived and stored digital content; and (3) applies the applicable rules when a requestor requests access to a shareable asset with protections for potentially conflicting interests of multiple owners; and a network message containing only approved digital content representing raw or filtered data or computationally generated derivates.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIGS. 1A-1C show area conceptual diagram of the system components.
  • FIG. 2 is a flowchart of an embodiment showing a method for handling data owned by multiple parties.
  • FIG. 3 is a flowchart of an embodiment showing a method for fulfilling multi-party sharing of data owned by multiple parties.
  • FIG. 4 is a flowchart of an embodiment showing a method for limiting visibility of sensitive data in multi-party sharing of data.
  • FIG. 5 is a flowchart of an embodiment showing a method for deriving dynamic ownership attributions using contextual cues.
  • FIG. 6 is a flowchart of an embodiment showing a method for resolving potentially conflicting intents when sharing data in a multi-owner situation.
  • FIG. 7 is a flowchart of an embodiment showing a method for storing unrelated data in a multi-tenant system.
  • FIG. 8 is a flowchart of an embodiment showing a method for combining both raw data and derived Views in a multi-owner situation for multi-party sharing.
  • FIG. 9 is a flowchart of an embodiment showing a method for offering aggregated data in a data marketplace.
  • FIG. 10 is a flowchart of an embodiment showing a method for capturing multi-party terms and conditions in a Microcontract.
  • FIG. 11 is a flowchart of an embodiment showing a method for enforcing terms and conditions over time in a Microcontract.
  • DETAILED DESCRIPTION OF THE EMBODIMENTS
  • The method and system includes a computer system implementation of a policy fabric and sharing system that combines computer data storage, computer processing, and computer networking components. The system grants or denies network access to stored digital data and digitally representable assets using a computer process capable of interpreting human contributed, computer executable rules along with context provided by computational derived, network accessible, or locally stored data to mimic human decision making. This creates a computational system which allows a both a single device or cluster of devices to provide centralized storage, computer processing, and network bandwidth needed to fulfill the data ingestion and digestion for an ecosystem of network-connected computer systems with diverse rights and interests in the underlying digital data. The system governs the contribution, access, and marketing of large amounts of shareable information in multi-tenant, multi-party transactions.
  • The system contributes to improved network performance by limiting bandwidth requirements, which also contributes to improving computing device performance through the use of fewer computational resources. Bothe of these further use less energy than traditional data sharing techniques.
  • The system also may include a software-defined data store described in more detail below.
  • The system may:
      • create a flexible but consistent means to classify assets;
      • separate the location and technology of storage from the attributes necessary to classify the assets;
      • provide a flexible mechanism to rapidly deploy integrated connections between collaborative parties without the need for fixed integrations or traditional legal agreements; and
      • allow asset owners to reflect their intentions for protecting and sharing their assets using a concise, electronic language that can be automatically evaluated at speeds necessary to make new connections and temporary contracts during the lifecycle of a data query.
  • Introductory System Component Definitions
      • A Contextual Condition may be an element of environmental data that can be severally or jointly evaluated in both current and historical form.
      • A Contextual Cue may be data that reflects an asserted fact about the environment that may be factored into the derivation of a Contextual Condition.
      • Data Quality rating is a system derived attribute that captures several dimensions of reliability of the publishing authority that may include:
      • Confirmation of organizational attribution
      • Status of login
      • Use of known/approved apps
      • Past history of use
      • User ratings
      • Domain-specific or Custom Conditional Cues may be defined to set new units of context for specific use-cases.
      • An Exhaustive Audit is a digital record that captures the composition of each Microshare with details that include Request Attributes, Contextual Cues, evaluated Rule contents, source of Rulesets considered, Microcontract terms and conditions, and Operations Grants.
      • Home Storage is the intended master data store for Source Content. Home Storage may be on-cloud, on premise, distributed in-whole or in-part, kept on offline media or otherwise persisted.
      • Index Objects may be collections of Ownership Attributes that are kept separate from the Source Content used where direct annotation of the Source Content is impossible or undesirable. Index Objects turn normal data/documents/digital process into a Shareable asset by creating an annotated, virtual pointer to the content which aggregates a configurable set of Contextual Cues for efficient evaluation of Contextual Conditions.
      • A Microcontract may be a specific collection of mutual terms and conditions that govern the performance of Operations on Shareables as expressed in a set of Rules. Microcontracts may involve exchange of payment or other value exchange as a condition of fulfillment.
      • A Microshare may be the inclusion (or exclusion) of a number of Shareables from one or many Owners aggregated together as the result of the creation or existence of Microcontracts into a single unified result set upon which Operations may be performed.
      • A Microshare may be conveyed as data (encrypted or unencrypted), displayed in a graphic user interface, provided as a response to an API call in real-time, provisioned as a downloadable file for batch purposes, rendered into hardcopy through printing or any other means of information transmission.
      • An Operation may be an action that can be carried out against a Shareable typically but not limited to Read, Write (Create or Update), Delete, Query/Search, Execute, and Copy.
      • An Operation may be an action that can be carried out against a Shareable typically but not limited to Buy, Sell, Rent, Open, Close, Lock, Unlock, TurnOn, and TurnOff.
      • An Owner of a Shareable may be an entity empowered to specify rules that may be applied to a single or set of Shareables. Primary Ownership is usually conferred through the act of origination or creation of a Shareable. Secondary Ownerships are often derived by the context, both internal and external to the Shareable. Either condition may change with changing conditions.
      • An Operation Grant may be an allowed Operation issued to a Requestor in response to a Request.
      • Ownership Attribute may be a Contextual Cue that can be ascribed to a single or set of Shareables used to define Ownership on the basis of Contextual Condition evaluations.
      • Ownership Attributes include (but are not limited to):
      • Creator's User identifier (often email address)
      • Organization unit represented by dot delimited reverse DNS format which includes top level domain, some number of hierarchical subgroups, and some number of user roles. E.g. com.comcast, com.comcast.cable, com.comcast.cable.admin.
      • Unique identifier (appid or apikey) of the App or API originator used during the authorization of the creation.
      • Location information captured as latitude/longitude, postal code, mailing address or similar
      • Time of creation, update
      • Demographic Attributes of the SUBJECT of the Source Content whether a person, device, legal entity, physical object, physical location, or other ascribable entity.
      • Demographic Attributes of the REPORTING Entity of the Source Content whether a person, device, legal entity, physical object, physical location, or other ascribable entity.
      • Ownership Designation tagging the type of ownership that is described using an arbitrary label used to attribute specific rights and to resolve future conflicts (see Multi-Owner Shareable). E.g. PRIMARY, BY, ABOUT, BUYER, ORIGINATOR
      • Multi-Party Shareable is a Shareable upon which one or more Rules have been defined to create Operation Grants to third-party Requestors (non-owners).
      • Ownership Indexes may create a searchable index of Ownership Attributes associated to Shareables. Index Objects can be said to be:
      • Local if decorating the Shareable object itself,
      • Remote if the Shareable stored in the original form elsewhere but the index object is Local, and
      • Hybrid if the Shareable stored in the original form elsewhere but the index object decorated with additional Conditional Cues to improve searchability is Local.
      • Ownership Indexes may be stored centrally and/or distributed to leaf nodes in a distributed network architecture.
      • Request Attribute may be a Contextual Cue that can be ascribed to a Request to set context for Contextual Condition evaluations.
      • Request Attributes related to Request/Requestor may include (but are not limited to):
      • Requestor's User identifier (often email address)
      • Requestor's organization unit represented by dot delimited reverse DNS format which includes top level domain, some number of hierarchical subgroups, and some number of user roles. E.g. com.comcast, com.comcast.cable, com.comcast.cable.admin
      • Unique identifier (appid or apikey) of the App or API making the Request.
      • Location of the Requestor captured as latitude/longitude, postal code, mailing address or similar
      • Time of request
      • Operation requested
      • Authentication source and strength
      • Validated emergency state, which is an additional set of Contextual Conditions which triggers upon detection of an emergency or exception situations. These conditions are often subject to conditional granting that require some form of human confirmation depending on the Rule and Sensitivity of the Shareable. These Attributes may be marked with the Request or be recognized as a precondition to the Request.
      • Multi-Owner Shareable is a Shareable with more than one set of Owner Attributes that must be considered.
      • A Request may be an expressed desire to perform an Operation against one or more Shareables.
      • A Requestor may be an entity expressing the intent to operate against one or more Shareables by performing a Request.
      • A Rule may be a codification of Contextual Conditions that capture an Owner's intent relative to Operation Grants to be allowed upon a Shareable asset in context of a specific Request and Requestor.
      • Sensitivity Category may be manual set or automatically derived either at time of creation or as a latter matter of analytics based on common Digital Loss Prevention (DLP) conventions that search for contents such as credit card numbers, SSNs, or other sensitive/controlled/regulated information. Sensitivity Categories may be defined in any way with an unlimited number of classifications as dictated by the needs of the owner. Minimally captured as:
      • Red—highest sensitivity
      • Yellow—middle sensitivity
      • Green—low sensitivity
      • A Software-defined Datastore may be a virtual database view that behaves as a single, private collection of data provided to a Requestor (data consumer) in a point in time as the result of the automatic aggregation of Microshares.
      • A Shareable is Source Content that may be annotated as being owned and can be considered a Shareable asset whether the asset is shared or kept private and whether the asset is purely digital or a digital representation of a physical object.
      • Source Content is a single datum or group of data, documents, processes or other digitally represented assets including physical objects that can be digital tracked and may be contributed by systems or platforms, created by a publisher of such datum.
      • A View may allow for the redaction of some or all the information contained in a Shareable that can be used to further filter content to limit the scope of an Operation Grant (usually an idempotent Operation).
  • Policy Fabric
  • The Policy Fabric may be the system of:
      • attributing Ownership Attributes to Shareables (one or more set is possible as with Multi-Owner Shareables; examples may include privacy and security attributes),
      • storing Shareables with Ownership Attributes as either embedded data or as a separate Index Object with routing of Source Content to its home location,
      • recording Rules to codify an Owner's intent,
      • acceptance of Requests decorated with Request Attributes,
      • algorithmic selection of Rules based on the evaluation of Contextual Conditions against Ownership Attributes that relate to Ownership properties of known Shareables,
      • algorithmic application of selected Rules that determine Operation Grants based on the evaluation of Contextual Conditions against Request Attributes that relate to the Request and/or Requestor to create a Microshare,
      • algorithmic and human-mediated means to manage the resolution of conflicting intents in multi-owner conditions.
      • compensating actions for conflicts for destructive grants (eg. Update, Delete) may be resolved by either cloning or approval requests workflows,
      • compensating actions for third-party sharing may be resolved through creation of anonymizing Views or approval request workflows.
  • The Policy Fabric may respond to the introduction of a new Shareable by:
      • attributing Ownership Attributes to the Shareable,
      • storing the Shareable object annotated with Ownership Attributes in a one or more schema-less data stores, or
      • storing the Ownership Attributes and an optional subset of additional Contextual Cues into an Index Object in a schema-less data store and routing the storage command to the Home Storage based on the conditions setup by the Owner of the Source Content.
  • The Policy Fabric may fulfill incoming Requests with a set of Shareables by:
      • determining the group of candidate Shareables based on Contextual Cues contained in the Request,
      • collecting a group of candidate Rules based on the Ownership Attributes of the candidate Shareables,
      • for each group of candidate Shareables that possess the same Ownership Attributes, determining the set of Rules which govern Operation Grants based on Ownership and Contextual Conditions,
      • evaluating the Contextual Conditions contained in the applicable Rules by factoring Contextual Cues against the algorithms described in each Rule to determine a grant of an Operation,
      • creating an Audit record capturing the Microcontact creation (Rule with relevant Conditional Conditions and Conditional Cues),
      • exercising the resulting Microshare by carrying out the Operation Grant activity in accordance with the Microcontract, and
      • triggering follow-on activities resulting from the Microshare execution or Microcontract creation such as but not limited to payment exchange or human notification.
  • The Policy Fabric may be a distributed software system coded in the Scala programming language with both centralized processing on a core set of servers as well as decentralized processing on network leaf nodes which may be comprised on sensor devices, home network components, smart appliances, mobile devices, home or office computing devices, and/or distributed servers.
  • Any Turing complete programming language, including microcomputer assembly language, may be used to embody the Policy Fabric.
  • Alternative systems deployments that include self-contained software modules, hardware-based and/or micro-coded logic intended for general purpose or special purpose microprocessors.
  • The Policy Fabric may use JSON-based messages and RESTful API calls to create new Shareables, make Requests, and fulfill Microshares.
  • Alternative means of integration with the Policy Fabric such as Software Development Kit (SDK) libraries, XML, SOAP or alternative Web Services & RPC-like integration protocol.
  • Shareables
  • Shareables and their Ownership Indexes may be created through invocation of real-time APIs or through batch processes of Source Content.
  • Shareables may be digital assets such as loT sensor datum, files, audit records, transaction records, images, videos, or any physical asset whose ownership can be represented through Ownership Attributes in Ownership Indexes with physical inventory control such as RFID or loT sensors to track and monitor disposition in real-world.
  • Rules
  • A set of default Rules may be established to apply to any Shareable without specific rules established by the Owner of the Shareable. Shareables may thus be protected by a set of unalterable Rules.
      • A TRUE grant state may be the expression of a Rule that allows a Requestor to execute an Operation Grant against a Shareable through a Microshare.
      • A FALSE grant state may be the expression of a Rules that denies a Requestor to execute an Operation Grant against a Shareable through a Microshare.
      • A MAYBE grant state is the expression outcome of a Rule that seeks additional processing through the collection of additional Contextual Cues or the firing of subsequent Contextual Conditions.
  • In evaluating applicable Rules against a Request there are two stances: LOOSE (default) stance and STRICT (optional):
      • LOOSE—By default, any Rule (except the Default rule in the event that other Rules are found to be applicable) determined to be applicable may result in a TRUE grant state for the Microshare.
      • STRICT—It is optionally configurable to require that ALL applicable rules return a TRUE grant state prior to performing the requested Operation.
  • In the event of multiple TRUE grant states for a given Request, a Weighting Algorithm may be used to determine the most applicable of the given Rules for the purposes of generating accurate Audit and triggering the creation of Microcontracts which may convey Payment Events. One dimension that may be used in the selection of a TRUE are the terms and conditions specified by the resulting Microcontract such as the length of time granted or the relative price set by the Owner of the triggered Rule.
  • To narrow the set of applicable Rules in a large field of potential Rule candidates, the following criteria may be used in a first pass:
      • Shareable Type
      • Record Type (describes the domain of the underlying datum) (see also “like” types)
      • Operation grant
      • License terms describes the legal rights conveyed through the granting of the Rule to a Requestor. These rights may be textual or encoded for automatic enforcement.
  • The naming standard for Record Types may create a “Dewey Decimal” system for marking a Shareable as belonging to a given domain of data by industry, function, and systemic relationship.
  • “Like” types are alternative indexes of Shareables that have been determined to bear strong relationships to the target Record Type based on elements such as the frequency of their association in usages, similarity of underlying structure, and designation by a trusted source.
  • “Like”-types may be used to allow for the discovery of new Shareable sources in the course of a Request consummation. “Like”-type Rules are typically limited to idempotent (non-persisting) Operation matches (e.g. Read or Query).
  • Rules that relate to a specific domain, record type, or other bundle of Ownership Attributes may be grouped into a Ruleset. Rulesets may be cached inside the runtime system to improve the performance against larger numbers of similar Shareables.
  • Rulesets may also be authored centrally and distributed automatically to execute closer to either the source of the Shareables or the target of consumption to offload processing and improve the speed of execution. Rulesets will be specifically encrypted in-storage and will include a “digital fingerprint” using a hash algorithm, such as SHA-256, to prove that the Ruleset has not been tampered with.
  • Rulesets may be stored as data, as executable software code, or both.
  • In a STRICT implementation, Rules may be set to block information sharing between parties where Rules define Contextual Conditions such as those required in the Gramm-Leach-Bliley Act which prevents the sharing of certain customer information between lines of business in financial institutions.
  • The Shareable content itself may be stored in an encrypted format to prevent unintended disclosures. Shareables may be cloned using different disposable private keys to allow for controlled views across multiple parties without the loss of the Owner's master private key.
  • Microcontracts
  • Microcontracts may be rendered into a smart contract enforcement system such as the blockchain-based Ethereum using a Turing complete scripting language, such as Solidity, to encode specific executable Rulesets. The creation of a smart contract enforces that the terms of the contract will be honored by the Owner to the Requestor because it ensures that the contracted Rules cannot be revoked by the Owner until their terms are met. Microcontracts rendered in this way may preserve a Ruleset and the implied Operation Grant rights until terms and conditions have been met such as expiration of specified time period, number of invocations, or payment status.
  • Rulesets preserved in public blockchain implementations may be ‘locked’ using encryption keys to ensure party-to-party privacy.
  • The publication of rulesets to blockchain smart contracts provides the potential for third-parties to audit the information shared between parties. This provides an indelible audit record of information exchange necessary in certain regulated industries such as Gramm-Leach-Bliley Act compliance in financial institutions.
  • Description
  • The system herein helps manage the volume of information that must be consumed, categorized, and consummated and makes that data immediately available to an end user like a business to generate value from the information while respecting the rights of multiple owners of the data or stake-holding parties.
  • As shown in FIG. 1A, Data Owners 100 include data contributors such as loT networked devices 100 a that may include data sensors, mobile devices, operational systems 100 b, and transactional systems 100 c. Data may be consumed by Requestors 101 through multiple device actuators 101 a, analytics pipelines 101 b, and applications 101 c. Both sets of users 100 and 101 may interact with the system architecture 120 through either a graphical user interface or through system APIs 110 mediated by an API Manager 102. The API Manager interfaces with the Authorization Manager 103 to determine the identity of Owners 100 and Requestors 101 based on supplied credentials. Identities may be managed through a combination of local and external identity management systems existing either in an Enterprise 107 or in the cloud 108.
  • The Policy Fabric 104, which evaluates user-defined policy Rules to manage the sharing of data right, mediates requests to store or retrieve data. Data is logically managed by a Virtual Data Lake 105 that abstracts the details of local 106, remote enterprise 107, and remote cloud 108 data storage configurations. It may also use a distributed database such as a blockchain 109 to store indelible Rulesets in the form of Microcontracts. Data may flow from multiple Owners 100 to multiple Requestors 101 through the core architecture that ensures that proper governance is observed.
  • Each data element may have unique ownership rights that may be managed to ensure regulatory compliance, satisfy contractual obligations, or capture value from downstream applications of the data. When data that has multiple owners, it is said to be multi-owner. When data has multiple (non-owner) consumers, it is said to be multi-party. The system manages data in the context of both multi-owner and multi-party contexts simultaneously.
  • Each system component may represent a collection of one or more computer storage, processing, and network resources dedicated to a function of the system. Two example interaction diagrams are provided to show common interaction signals between components for scenarios where 1) FIG. 1B new datum is stored and indexed in the system and 2) FIG. 1C data is requested by a third-party via networked computer.
  • FIG. 1B begins with the originating (or Owner) system 10 represented by a sensor, transactional computer system, mobile phone, or other digital data generating device sending an Authorization API request 11 to the system. This Authorization API request 11 includes some verifiable credentials which may include username/password, cryptographic key exchange, or biometric parameters that can be used to positively identify the end user or system. The request 11 is handled by the API Manager component 20. The API Manager passes the credential authentication signal 21 to the Authorization Manager 30, which will determine if the asserted identity belongs to a foreign organization or a local individual. Based on the determination, the Authorization Manager 30 will either make a request 31 via network-enabled API to a remote Identity Manager 40 or invoke a local computer process representing a local Identity Manager 40. The Identity Manager 40 will lookup the asserted user in the user storage and determine if the supplied credentials confirm that identity. If the identity is confirmed (ie. The supplied password matches that stored for the asserted username.), then the Identity Manager 40 will return 41 all of the stored attributes of the confirmed user. The Authorization Manager 30 will then generate and transmit a unique token 32 representing that session through the API Manager 20 and through another signal 22 to the Owner 10. The token may be set to expire in some finite amount of time. The Authorization Manager 30 persists to disk storage or maintain an in-memory lookup structure to retain the linkage between the user information and the authorization token.
  • FIG. 1B continues with the originating system 10 making one or more network API calls to POST 12 or create new data entries into the system. The API Manager 20 confirms that the supplied token is still valid and retrieves stored Owner Attributes from the Authorization Manager 30 in authentication 23 and owner attribute return 33 steps. The API Manager 20 then sends a message containing the data to be stored (source content) and the Owner Attributes 24 to the Virtual Data Lake 50. The Virtual Data Lake 50 sends a message via network or in-process communication 51 to the Policy Fabric component 70. The Policy Fabric component 70 applies logic (attribution function) 71 to the packaged request to determine an array of Owners based on the Rules established by the primary Owner. The array of Owner Attributes with 1 or more Owner data structures is returned by message 72 to the Virtual Data Lake. The Virtual Data Lake 70 will then cause to be stored the source content and the Index Object by calling one or more Data Storage components 60. The Data Storage component 60 exchanges object save 52 and save response 61 signals with the Virtual Data Lake 50 and is responsible for the durable maintenance of the digital information on disk, in-memory, or similar digital media. On successful storage, the Virtual Data Lake 50 will send an acknowledgement message back to the API Manager 20. The API Manager 20 will respond to the POST API call via a network message 25 to the originating system 10.
  • FIG. 1C begins when a Requestor 00 operating a computing system capable of consuming digital data makes an Authorization request 01 which is handled in the system as described above, where like numbers represent like signals and logic responses. The Identity Manager used in this exchange may or may not be the same as used to identify and describe the original creator. It is assumed that Identities are managed by many participating organizations each operating a computer system component capable of authenticating and authorizing their own end users and systems. Each Owner/Requestor may be authenticated by their own unique organizational associations.
  • FIG. 1C continues when the requesting system sends a network-enable API request message to the API Manager to GET, query or retrieve some set of data 02 based on some combination of unique identifiers (foreign keys), query parameters, search tags, keywords, or data classifications. The API Manager 20 formats these parameters into a Shareable Query and sends a message 25 to the Virtual Data Lake 50 for fulfillment. The Virtual Data Lake 50 executes a query 53 against stored Index Objects using the Data Storage component 60. The Data Storage component 60 returns a collection of zero to many candidate data elements 62. This set of candidates is sent as a stream or aggregate data structure 54 to the Policy Fabric 70. The Policy Fabric 70 first uses the unique set of Ownership Attributes from each of the elements in the candidate list to query 73 a Rule Storage component 80 that represents a persistent data storage technology and may or may not be the same as the Data Storage component 60. The candidate rules are returned 81 to the Policy Fabric 70. The Policy Fabric 70 will make a query 74 to any associated distributed data stores (such as a blockchain provider) 90 to determine if there are associated Smart Contracts (Microcontracts) relating to the candidate elements and the data store 90 returns candidate Rules 91.
  • The Policy Fabric 70 will aggregate the Rules from both sources 80, 90 and call the evaluation function 75 to determine where each element in the candidate list is granted based on the Rules and the context established by the Policy Fabric 70. The result is a filtered list of elements that comply with all of the applicable Rules. This filtered collection is sent as a stream or aggregate data structure 76 via computer message to the Virtual Data Lake 50. The Virtual Data Lake 50 will annotate the collection to create a Microshare and return this data structure 55 to the API Manager 20. The API Manager returns the Microshare content in a digital format that complies with the request (typically as JSON, XML, or some compressed or encrypted binary format) via network message 25.
  • EXAMPLES
  • Record Entry Into Electronic Medical Record
  • An example in the realm of healthcare (FIG. 3) involves an entry into an Electronic Medical Record (EMR). In such a system, a Physician enters notes into an EMR User Interface 200, and the EMR authenticates to the system using an API to establish the Physician's identity 201. The authentication may be based on credentials which may include some combination of username and password; private security keys; certificates; or biometric markers. In this example, the Physician provides username and password to their EMR system whose underlying identity management is performed using an Active Directory repository. The system may receive a request via API executed by the EMR system to authorize the Requestor for system access. The system may reflect the provided attributes back to the Active Directory identity management system and use the resulting data to ascribe attributes (Requestor Attributes) to the Physician as a Requestor and potential Owner. For the purposes of this example, the Ownership Attributes may capture the Role (physician), authentication strength, and identifying organization (medical company). Once authenticated, the system may receive data from the EMR 202. The description of the process of authentication leading to Requestor Attributes or Ownership Attributes will be omitted from subsequent examples since it is repetitive.
  • The entry may be contributed BY 203 the physician, creating a Shareable 204, stored according to a configured logic 205. The entry may be ABOUT 206 the patient. The system may assign BY and ABOUT as Ownership Designations based on these relationships and stores them in an Index Object 207 for later use. By regulation and logic, this single record is “owned” by both the physician and the patient—the BY and the ABOUT parties. Each has rights of access and disposition of the data. The patient, however, has no ownership claim to every record stored in the same EMR repository. Thus stored, each notional row has a potentially different ABOUT owner. The EMR record, in this case, is said to be multi-owner.
  • The system attributes data, process, and document ownership in a multi-owner way by annotating or indexing each individual data asset (notionally each row). Annotations may be added or tagged to any kind of data from documents to sensor readings. Annotations allow assets to be tracked and managed across cloud and on premise storage locations and technologies giving a one-source-of-truth view of co-owned content.
  • Annotations may include:
      • Organizational affiliation,
      • App/Sensor origin,
      • Name of originating entity, name of data subject,
      • Location of generation,
      • Time of generation, and
      • Customizable tags.
  • To follow the example, the EMR entry may be annotated with information that describes both the BY owner and the ABOUT owner. This information might be stored with the EMR entry or in a completely separate index database.
  • The system allows every owner the ability to capture their intent or policy regarding the disposition of the shareable asset by any third-party Requestor (typically a non-owner). This disposition is usually described as an act of sharing (ie. Reading or Querying) but includes any logical operation (Operational Grant) on either the data itself (eg. READ, WRITE, DELETE), a digitally mediated transaction (eg. BUY, SELL, RENT), and the digitally represented physical asset (eg. UNLOCK, OPEN, SHUTOFF). Intent is captured in the form of a number of Rules—an computer executable language or interpretable instruction set—that express the intent to grant operations based on attributes of the data, attributes of the request, and on attributes of the general environment.
  • To continue the example, a patient may create a Rule that grants Read-only access to their medical records 300 (those that are ABOUT them) created by any medical professional (written BY any owner) to any verified employee of their own Primary Care Physician. This Rule will typically convey to the PCP rights to read without changing ownership. The patient could create another Rule that extends access, contextually, to any other physician if the patient is currently located inside of that physician's hospital 301 (based on reported location of a mobile phone or other location-sensing device 308, 309). When a Requestor sends a request for medical data relating to the patient 302, the system may find all the candidate Shareables 304 and candidate Rules 305 and evaluates them in the context of current Request 306. The second Rule 301 would allow for fast data sharing in the event of an treatment event or emergency. To determine if the Rule applies in a given context, the system may determine a) if the current Requestor has a role of Physician 307 by looking at the Request Attributes and then b) if a Contextual Cue exists that signals that the patient is currently located within the confines of a hospital 307, 308. If these conditions apply then the data is accumulated into a Microshare 310 and returned to the hospital's patient system for review by medical staff 312. The response to the Requestor (medical staff) 312 may limited to only the resulting Microshare contents 310 which is guaranteed to contain only data allowed by the Rules. The EMR record, in this case, is said to also be multi-party because rights have been provisionally granted to non-owners.
  • The system may grant contextual access with fluid rules to make it easy to mash-up insights from multiple sources dynamically. Aggregations, redactions, and other data operations (Views) are captured in the system by Owners in such a way that Rules may be applied to them independently of the data upon which they act. The system applies to any mechanism for creating predefined queries or views without respect to the language used to define them or the underlying technology used to enact them.
  • Home Owner
  • For example as shown in FIG. 4, a Home Owner may wish to share home security usage metrics (utility consumption, time spent in the home, for example) with their home insurer in exchange for a discount. The Smart Home systems send data streams 400 to the system, which allocates ownership to the home owner 401, creates a Shareable 402, and stores both the sensor data 403 and the Index Objects 404 that describe the Shareable in terms of searchable metadata. To protect potentially sensitive information represented by the raw data collected from the home security system, the Home Owner creates a View that calculates the average daily activation time for the security devices 405.
  • The Home Owner may create a Rule to grant EXECUTE rights to that View for an authenticated employee of an insurance company, for example, with a role of Underwriter 406. Notice that the Home Owner does not assign the insurance company a role as a co-owner but only grants provisional access rights which may be revoked at any time.
  • License terms are conveyed to the insurance company Requestor creating a legal contract which may be used later to pursue damages based on misuse 414. The legal contract may be entered into as terms of requesting and granting the request. The Underwriter can make requests 407 to retrieve current usage data at any time. After the Request is received 407, the system may request authentication 408 and find Shareables related to the homeowner and security domain 409. The system retrieves stored Rules that apply to the Smart Home data 410 and includes both Rules that apply to underlying data 410 a and 410 c. In this example, the system may determine 411 that there are no Rules providing access to underlying data 410 b so the response to the Underwriter 415 may be
  • dynamically assembled 413 414 to include the aggregation but not the underlying rows of data that are factored into it. In this example, the applicable Rules include a check against the Authenticated details of the Requestor to establish that the request is originating from an employee of AAACo with a role assignment of Underwriter 412. In so doing, the Home Owner shared the desired minimal insight required to fulfill their obligation to the Home Insurer without sacrificing privacy. For example, while the Home Owner may have shared at what times the home was occupied, it may not have shared information regarding how many people were at home, their ages, or their locations in the home, thus protecting certain aspects of their privacy. The entire process of evaluating Rules against criteria is captured in an Exhaustive Audit 416 to provide a detailed record of the transaction.
  • The system includes the Policy Fabric Rules Engine that ensures consistent application of the data ownership rules. Built with Multi-party Collaboration as the default environment, the Policy Fabric allows for negotiation and consummation of data sharing partnerships in microseconds. This is called a Microshare(s). With Microshares, users or user devices can both share and gain access to the shareable assets of others without the need for fixed integrations or protracted security configurations. Shareable assets may be on-cloud or on-premise: Both are protected by the Policy Fabric's security rules and enabled by Enterprise-friendly integration capabilities.
  • The annotation schema may be used to determine what data can be shared and what data must remain private by defining rules that fire against contextual data to determine how to handle requests for access. Rules serve as knobs and dials that can set a granular privacy stance. Rules bridge the gaps between exclusive (locked-down) and publicly owned assets (wide open).
  • As rules determine applicability, data may be made available by opening and closing virtual doors and windows rather than moving data. These virtual doors may be available to allow multi-source, sub-second analytics that can factor data on-cloud and on premise with complete security. Without the need to move the data, an Owner's information is rented and not sold because access can be limited in time or condition to make the most of your monetization opportunities.
  • The system makes Shareables useful by multiple parties by providing a network-enabled Application Programming Interface (API)—a single integration style for all types of data. The system provides a single, consistent API/SDK regardless of the format, technology, or source of the information. The single API allows the discovery of new data assets and the integrating of new insights without requiring elaborate integrations or slow provisioning. Relationships between data creators and data consumers can be fluid and governed by the Rules/Views established by owners and the parameters to the API Requests alone. System tools can even allow M2M processes to use automated discovery to find and incorporate information in robotic automation decisions without human intervention. Requestors and Owners may interact with the system through API, SDK, batch file import/export, or through graphical user interfaces.
  • Use Cases
  • Industrial IOT in Supply Chain with Multiple Stakeholders
  • Consider a multi-purpose sensor installed by the manufacturer of a diesel engine (FIG. 5) for the primary purpose of monitoring the engine's warranty compliance. The sensor's data is forwarded by API to the system which receives it and begins the process of attribution and storage 500. In the supply chain, the engine may be purchased by the manufacturer of buses (among others) and is installed into a bus by which is sold to a leasing company. The leasing company leases the bus to a tour operator. That tour operator sells seats on that bus to consumers. The bus is driven through multiple jurisdictions with interest in the safety of citizens and apportionment of infrastructure costs. Each party to the bus's operation has a different stake in the information collected by the single engine warranty sensor.
  • With the system described herein, the engine manufacturer might be considered an originating owner 501. The embedded sensor(s) within the engine may channel the data to the system where it is noted as being owned by the engine manufacturer. The system Policy Fabric must first determine which engine the reporting sensor is installed in using a Contextual Cue provided by the engine manufacturer 504 which provides a lookup between sensor ID and engine ID. Additional owners may be attributed by walking through additional Conditional Cues such as the bills of sale 505 provided by the engine manufacturer to determine that the sensor was sold to the bus manufacturer 506. Upon such a determination, the bus manufacturer may be added to the index as a secondary owner 507. This process is repeated in a loop as successive relationships in the supply chain are discovered by the Policy Fabric 508. The sales data of the bus manufacturer may be used to determine that the leasing company is also an owner. The current lease data is accessed to determine which tour operator is also an owner of this data. The sensor data is now clearly multi-owner 509.
  • Each of these co-owners may set their own Rules which, in turn, grant access to appropriate section of data to third-party maintenance companies or asset insurers. In such a case, the sensor data is multi-party—being shared by owners with interested non-owners.
  • FIG. 6 shows further logic in this continuing scenario. Based on a global Rule put in-place by the bus operator, the operators of the municipal bus terminal in Anyport, USA may be able to Query the system to determine the location, direction, and maintenance history of any buses that are within 2 miles of the terminal location 600. The systems received the Query 601, checks for authorization 602, finds relevant Shareables 603 and identifies applicable rules 604.
  • The system evaluates 601 the Rules set by the operator (set in step 600) and begins an audit of each record/Rule combination considered 610. The audit record may contain an entry for each datum in combination with each applicable Rule and includes relevant Contextual Cue. The audit stream contains enough detail that the transactions can be recreated in retrospect. The auditing process 610 may be executing in-parallel to the evaluation steps 605 607 608 609. The evaluation involves checking if a requestor is a government employee 606, locating a Contextual Cue about a bus location 607, and checking a bus location proximate to the Requestor 608. From this, the system creates a collection of each datum whose Operational Grant was accepted by the Rules as filtered through the defined View to create a Microshare 609.
  • Prior to returning data to a government Requestor, the system will confirm that the Operational Grants contemplated do not violate the Rules established by other owners 611. If a conflict is found, the system may execute a remediation workflow to determine a satisfactory resolution. The system may attempt to automatically resolve the conflict 612 by applying logic provided by other owners. If an automated solution cannot be found, a human workflow will be triggered 613 which the system will manage to determine the disposition of the conflicting request. The final result may be a compensating action defined within the resolution workflow 614 which may result in a situational Grant or a denial of the Grant.
  • Naturally, the Rules may e applied in such a way that the leasing company is be able to make Requests to view the subset of the data that is generated only by their buses. In other contexts, data from engines installed in, say, farm equipment may be unavailable to this bus/transportation branch of the supply chain. Contextual Cues may be provided in the form of supporting operational data such as bills of sale and bills of lading. Likewise, the tour operator should be able to Request location and performance information for the buses that they operate and not those of their competitors. Consumers should be able to Request location information for the buses that they are waiting for.
  • Digital Homes
  • FIG. 7 shows another use case where a renter rents an apartment from a building owner that equipped the unit with a smart refrigerator. That renter buys a network-connected, clothes washing machine. The data from each of the connected devices may be shared directly to the individual manufacturers (as is often the case today) 701, 707. Assume that the renter may want to receive a discount from their electric company, but this discount requires energy usage statistics from all major appliances be made available in real-time. This sets up this use case.
  • Using the system, the manufacturers (A & B) are automatically marked as the primary owners 702, 708 for both the refrigerator and washing machine respectively when the data is received through the loT network. The system stores relevant Shareables according to the logic 703, 710. Based on warranty data 704, 711, the landlord is attributed as the second owner of all refrigerator/ washing machine data 705, 712 in any of their buildings. Finally, the system stores Index Objects for each owner associated with the Shareable.
  • FIG. 8 continues this utility use case. The landlord may create a View that filters the refrigerator data to remove any data not associated with the requesting renter's apartment 801. The landlord may further create a Rule that grants EXECUTE access to the View for any of the renters 802. The renter can make a Rule that includes the electric consumption statistics from both machines and allocates a Rule that grants access to the electric company 803. The system considers the Request 804 in context of both the raw data from the washing machine (of which the renter is an owner) AND the View mediated data from the refrigerator (of which the renter is an allowed party) 806 (after confirming that the renter is authorized 805).
  • As in previous examples, the systems finds Shareables 810, identifies Rules 807, evaluates Rules 808, and confirms that Requestor is authorized (see first example for details) 809 and that the data is not someone else's 810. The system executes the View 811 using the authority of the View owner, in this case, the landlord. This creates a new data stream derived from underlying data that both the renter and the utility company are unable to see. The system combines the two types of data together to create a single Microshare 812.
  • As a condition of the lease, the Renter may also grant access to all of the underlying data to the landlord who uses it to manage noise disturbances predicted by machine vibration statistics. When the lease expires, the Rules granting the landlord access to the data from the washing machine and the renter access to the data from the refrigerator may also expire.
  • Digital Data Exchange for Multiple Real Estate Holdings
  • Consider an owner of many commercial real estate properties as shown in FIG. 9. The owner installs sensors to monitor energy usage and occupancy across all properties. The owner creates Shareables from relevant data streams related to these. As the information Owner, the commercial real estate owner may create additional revenue by selling the data to non-competitive businesses.
  • Using the system, the property owner imports the data 901 to create Shareables. The property owner defines an unlimited number of Views 902 to create anonymized, aggregated, or filtered derivatives from the underlying Shareables. Each View receives its own set of Rules to govern the share-ability with Requestors. In the event of a discovery process, an Owner may also create a set of sample-only Views 903 may be created with looser set of sharing Rules 904 than those defined for the complete Views. This may allow the Owner to share a limited sample set of the data allowing potential Requestors to evaluate the data for suitability. The Rules encapsulate additional terms and conditions that must be met before the Shareable can be accessed by a Requestor. The terms may outline the details of payment on a per building per month basis. The conditions may place restrictions on the Requestor such as a requirement to have a Dun and Bradstreet entry which does not be list the requesting organization as a commercial property owner.
  • Requestors make requests 905 and those that are authorized 906 and meet the criteria 907, 908, 909 may be shown a sample of the data as generated by the property owners sample View 903. Following the location of Contextual Cues 910, Requestor clearance 911, Microshare creation 912, the system responds 913. The response includes details of the Terms and Conditions which the a requestor may consider prior to fulfilling a transaction 914.
  • For the purposes of this example, a local utility company wishes to buy a year-long view of building information from 10 regional commercial property managers (including the property manager mentioned above) for the purposes of capacity planning across commercially zoned areas. If the utility company decides to enter into a Microcontract with the property owner, a new request may be issued 1000 as shown in FIG. 10. The Microcontract is intended to establish irrevocable access to the expected volume of sensor data for the agreed-upon price following these defined terms and conditions captured by the owner as Rules 910, 911. After verifying that the Requestor is authorized 1001, the system finds Shareables 1002 and to ensure that both parties comply with the Microcontract, the Rules governing the intended sharing are encoded 1003, 1004 in a specialized digital envelop which is stored as a protected data type with joint ownership by both parties. The system may encode terms and conditions in the form of a Microcontract. The system prevents the Microcontract from being updated or deleted by either owner without mutual approval. The Microcontract may optionally be registered to a blockchain system 1006 to provide additional protections from tampering. In this event, the Rules reflecting the preserved Terms and Conditions in the Microcontract may be converted into executable computer code using a Turing-complete programming language to create what is known in the blockchain industry as a Smart Contract 1007. The resulting Smart Contract may then be sent as a transaction using the established APIs of the chosen blockchain implementation 1008. The system may respond to both the Requestor and the Owner with a notification of the initialization of the Microcontract that includes details of any optional Smart Contract publications 1009.
  • The Microcontract
  • FIG. 11 further describes the Microcontract described in FIG. 10. The Microcontract may be regarded as a master set of Rules that supersedes any Rule established thereafter 1103, 1104, 1105 by the data owner as long as all Terms and Conditions remain in effect 1107. The system may receive a request for building data 1100, check for authorization 1101, find Shareables related to the building company 1102. Using external data streams to create context sources—the policy engine may confirm that payments are current, that the buyer maintains appropriate classifications in D&B, and that the volume and scope of the data remains at advertised levels 1106. As in other examples, the system may create Microshares containing build data 1108 followed by a Microshare list 1109, and a detailed audit record of each Grant 1110 that may be processed after the fact to create billing events 1111 or to establish compliance for fulfillment of legal discovery or regulatory reporting requirements.
  • While the invention has been described with reference to the embodiments above, a person of ordinary skill in the art would understand that various changes or modifications may be made thereto without departing from the scope of the claims.

Claims (23)

1. A system that improves speed of a computer network including a system for storing, managing, and sharing data comprising:
at least one shareable asset that represents data from source content;
one or more owners with joint rights of ownership to the at least one shareable asset;
a requestor that requests data from the at least one shareable asset; and
a policy fabric that:
assigns both static and dynamic ownership rights to shareable assets;
contains rules contributed by the one or more owners regarding attributes of shareable assets including at least access rights to the shareable assets;
identifies applicable rules; and
applies the applicable rules when the requestor requests access to a shareable asset with protections for potentially conflicting interests of multiple owners.
2. The system of claim 1, wherein the source content includes a single datum or group of data, documents, processes or other digitally represented assets including physical objects that can be digital tracked.
3. The system of claim 1, wherein the source content is generated by sensors.
4. The system of claim 1, wherein the source content is contributed by other digital systems.
5. The system of claim 1, wherein assigning of attributes to shareable assets includes an annotation for each shareable asset.
6. The system of claim 5, wherein the annotations allow for shareable assets to be tracked and managed.
7. The system of claim 5, wherein the annotations allows for attribution of ownership to multiple parties.
8. The system of claim 5, wherein the annotations allows for attribution of ownership may be based on context of the data itself or data from external sources.
9. The system of claim 5, wherein the annotations are selected from a group consisting of: organizational affiliation, app/sensor origin, name of originating entity, name of data subject, location of generation, time of generation, and customizable tags.
10. The system of claim 1, wherein application of rules may allow for potential grant of contextual access to the data from the source content.
11. The system of claim 8, wherein potential grants of contextual access are accomplished according to the rules and provide for multi-party collaboration.
12. The system of claim 1, wherein the policy fabric provides privacy and security settings that can be set by source content creators.
13. The system of claim 1, wherein the policy fabric provides for contractual arrangements between shareable assets.
14. The system of claim 13, wherein the contractual arrangements are rendered into machine executable smart contracts.
15. The system of claim 14, wherein the smart contracts are records on a blockchain.
16. The system of claim 1, wherein the policy fabric provides rules for exchange of payment between system users.
17. The system of claim 1, further comprising a datastore that provides single, private collection of data to a requestor in a point in time as a result of the automatic aggregation of a data sharing.
18. The system of claim 1, further comprising a data quality rating that rates reliability of a publisher of source content according to the following attributes: confirmation of organizational attribution, status of login, use of known/approved apps, past history of use, and user ratings.
19. The system of claim 1, wherein the requestor's request includes attributes selected from a list consisting of requestor's user identifier, requestor's organization unit, unique identifier, location of the requestor, time of request, operation requested, and/or validated emergency state.
20. The system of claim 1, wherein the policy fabric applies rules algorithmically to apply selected rules that determine whether to grant a request to access based on an evaluation of contextual conditions against request attributes.
21. The system of claim 18, wherein the policy fabric may automatically mediate between conflicting intents resulting from the attribution of multiple owners.
22. The system of claim 18, wherein the policy fabric creates an exhaustive audit record of the outcome of each rule evaluation to include rule content, context of owner, context of requestor, external context, requested operation grants, and past requests.
23. The system of claim 18, wherein the outcome of requests may result in financial compensation that may be apportioned across multiple owners.
US15/848,807 2016-12-20 2017-12-20 Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment Pending US20180182052A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/848,807 US20180182052A1 (en) 2016-12-20 2017-12-20 Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment
US17/930,163 US20230076019A1 (en) 2016-12-20 2022-09-07 Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662436662P 2016-12-20 2016-12-20
US15/848,807 US20180182052A1 (en) 2016-12-20 2017-12-20 Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/930,163 Continuation US20230076019A1 (en) 2016-12-20 2022-09-07 Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment

Publications (1)

Publication Number Publication Date
US20180182052A1 true US20180182052A1 (en) 2018-06-28

Family

ID=62630654

Family Applications (2)

Application Number Title Priority Date Filing Date
US15/848,807 Pending US20180182052A1 (en) 2016-12-20 2017-12-20 Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment
US17/930,163 Pending US20230076019A1 (en) 2016-12-20 2022-09-07 Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment

Family Applications After (1)

Application Number Title Priority Date Filing Date
US17/930,163 Pending US20230076019A1 (en) 2016-12-20 2022-09-07 Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment

Country Status (2)

Country Link
US (2) US20180182052A1 (en)
WO (1) WO2024054237A1 (en)

Cited By (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255583A (en) * 2018-07-27 2019-01-22 深圳市元征科技股份有限公司 A kind of information sharing method, device, relevant device and medium
US20190036778A1 (en) * 2017-07-26 2019-01-31 International Business Machines Corporation Using blockchain smart contracts to manage dynamic data usage requirements
US10250592B2 (en) 2016-12-19 2019-04-02 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances using cross-license authentication
US10298635B2 (en) * 2016-12-19 2019-05-21 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances using a wrapper application program interface
US20190163891A1 (en) * 2013-05-08 2019-05-30 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
US20190197532A1 (en) * 2017-12-27 2019-06-27 International Business Machines Corporation Private resource discovery and subgroup formation on a blockchain
US10375130B2 (en) 2016-12-19 2019-08-06 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances by an application using a wrapper application program interface
US10510051B2 (en) 2016-10-11 2019-12-17 Ricoh Company, Ltd. Real-time (intra-meeting) processing using artificial intelligence
US10553208B2 (en) 2017-10-09 2020-02-04 Ricoh Company, Ltd. Speech-to-text conversion for interactive whiteboard appliances using multiple services
US10552546B2 (en) 2017-10-09 2020-02-04 Ricoh Company, Ltd. Speech-to-text conversion for interactive whiteboard appliances in multi-language electronic meetings
US10572858B2 (en) 2016-10-11 2020-02-25 Ricoh Company, Ltd. Managing electronic meetings using artificial intelligence and meeting rules templates
WO2020096161A1 (en) * 2018-11-08 2020-05-14 엘지전자 주식회사 Method and apparatus for security communication in wireless communication system
US10757148B2 (en) 2018-03-02 2020-08-25 Ricoh Company, Ltd. Conducting electronic meetings over computer networks using interactive whiteboard appliances and mobile devices
US10860985B2 (en) 2016-10-11 2020-12-08 Ricoh Company, Ltd. Post-meeting processing using artificial intelligence
US10956875B2 (en) 2017-10-09 2021-03-23 Ricoh Company, Ltd. Attendance tracking, presentation files, meeting services and agenda extraction for interactive whiteboard appliances
US20210166246A1 (en) * 2017-09-20 2021-06-03 James Fournier Internet data usage control system
US11030585B2 (en) 2017-10-09 2021-06-08 Ricoh Company, Ltd. Person detection, person identification and meeting start for interactive whiteboard appliances
US20210211280A1 (en) * 2018-06-29 2021-07-08 Cloudentity, Inc. Data stream identity
US11062271B2 (en) 2017-10-09 2021-07-13 Ricoh Company, Ltd. Interactive whiteboard appliances with learning capabilities
CN113228011A (en) * 2018-12-29 2021-08-06 上海诺基亚贝尔股份有限公司 Data sharing
CN113407928A (en) * 2021-07-14 2021-09-17 西安电子科技大学 Multi-owner RFID authentication method based on block chain
US11178186B2 (en) * 2020-03-19 2021-11-16 International Business Machines Corporation Policy rule enforcement decision evaluation with conflict resolution
US11210640B2 (en) * 2019-12-19 2021-12-28 The Boeing Company Blockchain for asset management
US11216750B2 (en) 2018-05-06 2022-01-04 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set
US20220058282A1 (en) * 2020-08-24 2022-02-24 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US20220076237A1 (en) * 2018-12-20 2022-03-10 Stora Enso Oyj Method and arrangement for recycling a packaging purchased from a smart fridge
US11307735B2 (en) 2016-10-11 2022-04-19 Ricoh Company, Ltd. Creating agendas for electronic meetings using artificial intelligence
US20220138325A1 (en) * 2020-10-29 2022-05-05 EMC IP Holding Company LLC Secure enclave pathing configuration for data confidence fabrics
CN114581005A (en) * 2022-03-02 2022-06-03 国网山东省电力公司临沂供电公司 Storage, inspection and distribution integrated management and control method based on big data application
US11379615B2 (en) 2018-11-08 2022-07-05 At&T Intellectual Property I, L.P. Event-based community creation for data sharing platform
US11403628B2 (en) 2017-10-20 2022-08-02 Hewlett Packard Enterprise Development Lp Authenticating and paying for services using blockchain
US11463241B2 (en) 2017-10-20 2022-10-04 Hewlett Packard Enterprise Development Lp Transmitting or receiving blockchain information
US11494836B2 (en) 2018-05-06 2022-11-08 Strong Force TX Portfolio 2018, LLC System and method that varies the terms and conditions of a subsidized loan
WO2022238983A1 (en) * 2021-05-14 2022-11-17 Goldman Sachs & Co. LLC Blockchain with joint claims on tokens
US11544782B2 (en) 2018-05-06 2023-01-03 Strong Force TX Portfolio 2018, LLC System and method of a smart contract and distributed ledger platform with blockchain custody service
US11550299B2 (en) 2020-02-03 2023-01-10 Strong Force TX Portfolio 2018, LLC Automated robotic process selection and configuration
US11582040B2 (en) * 2017-10-20 2023-02-14 Hewlett Packard Enterprise Development Lp Permissions from entities to access information
US20230076019A1 (en) * 2016-12-20 2023-03-09 Microshare, Inc. Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment
US11604890B2 (en) 2017-10-20 2023-03-14 Hewlett Packard Enterprise Development Lp Accessing information based on privileges
US11669627B1 (en) * 2020-10-13 2023-06-06 Wells Fargo Bank, N.A. System for data access token management
US20230283488A1 (en) * 2022-03-01 2023-09-07 DLT Global, Inc. Blockchain rules engine
US20230328093A1 (en) * 2020-08-24 2023-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Technique for Determining a Safety-Critical State
US11895238B1 (en) * 2022-08-15 2024-02-06 Expel, Inc. Systems and methods for intelligently constructing, transmitting, and validating spoofing-conscious digitally signed web tokens using microservice components of a cybersecurity threat mitigation platform
GB2622295A (en) * 2022-09-07 2024-03-13 Microshare Inc Smart pest trap as IOT in policy fabric and sharing system for enabling multi-party data processing in an IOT environment
US11982993B2 (en) 2020-02-03 2024-05-14 Strong Force TX Portfolio 2018, LLC AI solution selection for an automated robotic process
JP7530143B2 (en) 2019-09-06 2024-08-07 インターナショナル・ビジネス・マシーンズ・コーポレーション Cognitive-enabled blockchain-based resource forecasting
US12175478B2 (en) * 2017-09-20 2024-12-24 Portable Data Corporation Internet data usage control system
US12184781B2 (en) 2017-07-10 2024-12-31 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using owner consent contracts
CN119272338A (en) * 2024-12-06 2025-01-07 新能康技术有限公司 A personal data sharing management method based on big data
US12210992B2 (en) * 2022-10-28 2025-01-28 Hitachi, Ltd. Multi-party business collaboration platform for electrification ecosystems
US12298877B2 (en) 2022-02-10 2025-05-13 Bank Of America Corporation System and method for providing automatic diagnostics of API configuration
US12306951B2 (en) * 2020-10-29 2025-05-20 EMC IP Holding Company LLC Secure enclave pathing configuration for data confidence fabrics

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113079555B (en) * 2019-04-22 2022-11-15 Oppo广东移动通信有限公司 Network resource sharing method and related device
EP4530954A1 (en) * 2023-09-29 2025-04-02 Siemens AG Österreich System and method for handling sovereign datasets with shared ownership

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020048369A1 (en) * 1995-02-13 2002-04-25 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20030191719A1 (en) * 1995-02-13 2003-10-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20040054630A1 (en) * 1995-02-13 2004-03-18 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20050060584A1 (en) * 1995-02-13 2005-03-17 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US7149698B2 (en) * 1999-05-27 2006-12-12 Accenture, Llp Business alliance identification in a web architecture Framework
US7451005B2 (en) * 1991-12-23 2008-11-11 Hoffberg Steven M Vehicular information system and method
US7697719B2 (en) * 1993-11-18 2010-04-13 Digimarc Corporation Methods for analyzing electronic media including video and audio
US7917749B2 (en) * 1995-02-13 2011-03-29 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7962750B1 (en) * 1998-08-13 2011-06-14 International Business Machines Corporation System for tracking end-user electronic content usage
US8171032B2 (en) * 1994-11-29 2012-05-01 Pinpoint, Incorporated Providing customized electronic information
US8484751B2 (en) * 1994-11-23 2013-07-09 Contentguard Holdings, Inc. System and method for permitting use of content
US8904181B1 (en) * 2001-03-23 2014-12-02 David P. Felsher System and method for secure three-party communications
US9031985B2 (en) * 2000-01-18 2015-05-12 B# On Demand, Llc More subscription media on demand
US9195845B2 (en) * 1995-02-13 2015-11-24 Intertrust Technologies Corporation Trusted and secure techniques for item delivery and execution

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5828751A (en) * 1996-04-08 1998-10-27 Walker Asset Management Limited Partnership Method and apparatus for secure measurement certification
US5884224A (en) * 1997-03-07 1999-03-16 J.R. Simplot Company Mobile mounted remote sensing/application apparatus for interacting with selected areas of interest within a field
US6724312B1 (en) * 1999-07-21 2004-04-20 Daniel Barber Pest control apparatus and methods
US7348890B2 (en) * 1999-07-21 2008-03-25 Dow Agrosciences Llc Pest control techniques
US6724395B1 (en) * 2000-03-24 2004-04-20 Nvidia Corporation System, method and article of manufacture for anisotropic texture sampling
US6385544B1 (en) * 2001-02-05 2002-05-07 Agenor Mafra-Neto Method for pest management and crop certification utilizing network accessible database
DE602004012409T2 (en) * 2003-06-16 2009-04-23 Ronnau Development Aps PEST CONTROL SYSTEM
US20090102600A1 (en) * 2006-04-04 2009-04-23 Noe Robert G Pest Electrocution Device with Infrared Detector
US20130144863A1 (en) * 2011-05-25 2013-06-06 Forensic Logic, Inc. System and Method for Gathering, Restructuring, and Searching Text Data from Several Different Data Sources
US8896451B2 (en) * 2011-12-23 2014-11-25 Plurasense, Inc. Beetle sensing device and method of use
US11083183B2 (en) * 2015-06-03 2021-08-10 Servicepro.Net Llc Sensor station system for pest monitoring
US20180182052A1 (en) * 2016-12-20 2018-06-28 Microshare, Inc. Policy Fabric And Sharing System For Enabling Multi-Party Data Processing In An IoT Environment
US20200037053A1 (en) * 2018-07-27 2020-01-30 IoT Networks, Inc. Low Power Remote Monitoring System With Pyroelectric Infrared Sensor And False Detect Discriminator
CA3066816A1 (en) * 2019-09-18 2021-03-18 Sightline Innovation Inc. Systems and methods for sharing data assets via a computer-implemented data trust

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7451005B2 (en) * 1991-12-23 2008-11-11 Hoffberg Steven M Vehicular information system and method
US7697719B2 (en) * 1993-11-18 2010-04-13 Digimarc Corporation Methods for analyzing electronic media including video and audio
US8484751B2 (en) * 1994-11-23 2013-07-09 Contentguard Holdings, Inc. System and method for permitting use of content
US8171032B2 (en) * 1994-11-29 2012-05-01 Pinpoint, Incorporated Providing customized electronic information
US20050060584A1 (en) * 1995-02-13 2005-03-17 Intertrust Technologies Corp. Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US20040054630A1 (en) * 1995-02-13 2004-03-18 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US7917749B2 (en) * 1995-02-13 2011-03-29 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US20020048369A1 (en) * 1995-02-13 2002-04-25 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20030191719A1 (en) * 1995-02-13 2003-10-09 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US9195845B2 (en) * 1995-02-13 2015-11-24 Intertrust Technologies Corporation Trusted and secure techniques for item delivery and execution
US7962750B1 (en) * 1998-08-13 2011-06-14 International Business Machines Corporation System for tracking end-user electronic content usage
US7149698B2 (en) * 1999-05-27 2006-12-12 Accenture, Llp Business alliance identification in a web architecture Framework
US9031985B2 (en) * 2000-01-18 2015-05-12 B# On Demand, Llc More subscription media on demand
US8904181B1 (en) * 2001-03-23 2014-12-02 David P. Felsher System and method for secure three-party communications

Cited By (141)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190163891A1 (en) * 2013-05-08 2019-05-30 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
US10628571B2 (en) * 2013-05-08 2020-04-21 Jpmorgan Chase Bank, N.A. Systems and methods for high fidelity multi-modal out-of-band biometric authentication with human cross-checking
US11307735B2 (en) 2016-10-11 2022-04-19 Ricoh Company, Ltd. Creating agendas for electronic meetings using artificial intelligence
US10510051B2 (en) 2016-10-11 2019-12-17 Ricoh Company, Ltd. Real-time (intra-meeting) processing using artificial intelligence
US10860985B2 (en) 2016-10-11 2020-12-08 Ricoh Company, Ltd. Post-meeting processing using artificial intelligence
US10572858B2 (en) 2016-10-11 2020-02-25 Ricoh Company, Ltd. Managing electronic meetings using artificial intelligence and meeting rules templates
US10375130B2 (en) 2016-12-19 2019-08-06 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances by an application using a wrapper application program interface
US10298635B2 (en) * 2016-12-19 2019-05-21 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances using a wrapper application program interface
US10250592B2 (en) 2016-12-19 2019-04-02 Ricoh Company, Ltd. Approach for accessing third-party content collaboration services on interactive whiteboard appliances using cross-license authentication
US20230076019A1 (en) * 2016-12-20 2023-03-09 Microshare, Inc. Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment
US12184781B2 (en) 2017-07-10 2024-12-31 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using owner consent contracts
US20190036778A1 (en) * 2017-07-26 2019-01-31 International Business Machines Corporation Using blockchain smart contracts to manage dynamic data usage requirements
US10601665B2 (en) * 2017-07-26 2020-03-24 International Business Machines Corporation Using blockchain smart contracts to manage dynamic data usage requirements
US20210166246A1 (en) * 2017-09-20 2021-06-03 James Fournier Internet data usage control system
US12175478B2 (en) * 2017-09-20 2024-12-24 Portable Data Corporation Internet data usage control system
US11727414B2 (en) * 2017-09-20 2023-08-15 Portable Data Corporation Internet data usage control system
US10552546B2 (en) 2017-10-09 2020-02-04 Ricoh Company, Ltd. Speech-to-text conversion for interactive whiteboard appliances in multi-language electronic meetings
US11645630B2 (en) 2017-10-09 2023-05-09 Ricoh Company, Ltd. Person detection, person identification and meeting start for interactive whiteboard appliances
US11030585B2 (en) 2017-10-09 2021-06-08 Ricoh Company, Ltd. Person detection, person identification and meeting start for interactive whiteboard appliances
US10553208B2 (en) 2017-10-09 2020-02-04 Ricoh Company, Ltd. Speech-to-text conversion for interactive whiteboard appliances using multiple services
US11062271B2 (en) 2017-10-09 2021-07-13 Ricoh Company, Ltd. Interactive whiteboard appliances with learning capabilities
US10956875B2 (en) 2017-10-09 2021-03-23 Ricoh Company, Ltd. Attendance tracking, presentation files, meeting services and agenda extraction for interactive whiteboard appliances
US11604890B2 (en) 2017-10-20 2023-03-14 Hewlett Packard Enterprise Development Lp Accessing information based on privileges
US11403628B2 (en) 2017-10-20 2022-08-02 Hewlett Packard Enterprise Development Lp Authenticating and paying for services using blockchain
US11582040B2 (en) * 2017-10-20 2023-02-14 Hewlett Packard Enterprise Development Lp Permissions from entities to access information
US11463241B2 (en) 2017-10-20 2022-10-04 Hewlett Packard Enterprise Development Lp Transmitting or receiving blockchain information
US12032716B2 (en) 2017-10-20 2024-07-09 Hewlett Packard Enterprise Development Lp Accessing information based on privileges
US20190197532A1 (en) * 2017-12-27 2019-06-27 International Business Machines Corporation Private resource discovery and subgroup formation on a blockchain
US11315110B2 (en) * 2017-12-27 2022-04-26 International Business Machines Corporation Private resource discovery and subgroup formation on a blockchain
US10757148B2 (en) 2018-03-02 2020-08-25 Ricoh Company, Ltd. Conducting electronic meetings over computer networks using interactive whiteboard appliances and mobile devices
US11657340B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for a biological production process
US11727506B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems and methods for automated loan management based on crowdsourced entity information
US12254427B2 (en) 2018-05-06 2025-03-18 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of machine resources
US12217197B2 (en) 2018-05-06 2025-02-04 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for transaction execution with licensing smart wrappers
US12210984B2 (en) 2018-05-06 2025-01-28 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems to forecast a forward market value and adjust an operation of a task system in response
US12067630B2 (en) 2018-05-06 2024-08-20 Strong Force TX Portfolio 2018, LLC Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information
US11488059B2 (en) 2018-05-06 2022-11-01 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems for providing provable access to a distributed ledger with a tokenized instruction set
US11494836B2 (en) 2018-05-06 2022-11-08 Strong Force TX Portfolio 2018, LLC System and method that varies the terms and conditions of a subsidized loan
US11494694B2 (en) 2018-05-06 2022-11-08 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for creating an aggregate stack of intellectual property
US12033092B2 (en) 2018-05-06 2024-07-09 Strong Force TX Portfolio 2018, LLC Systems and methods for arbitrage based machine resource acquisition
US11538124B2 (en) 2018-05-06 2022-12-27 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for smart contracts
US11544782B2 (en) 2018-05-06 2023-01-03 Strong Force TX Portfolio 2018, LLC System and method of a smart contract and distributed ledger platform with blockchain custody service
US11544622B2 (en) 2018-05-06 2023-01-03 Strong Force TX Portfolio 2018, LLC Transaction-enabling systems and methods for customer notification regarding facility provisioning and allocation of resources
US11928747B2 (en) 2018-05-06 2024-03-12 Strong Force TX Portfolio 2018, LLC System and method of an automated agent to automatically implement loan activities based on loan status
US11829907B2 (en) 2018-05-06 2023-11-28 Strong Force TX Portfolio 2018, LLC Systems and methods for aggregating transactions and optimization data related to energy and energy credits
US11829906B2 (en) 2018-05-06 2023-11-28 Strong Force TX Portfolio 2018, LLC System and method for adjusting a facility configuration based on detected conditions
US11580448B2 (en) 2018-05-06 2023-02-14 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for royalty apportionment and stacking
US11823098B2 (en) 2018-05-06 2023-11-21 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods to utilize a transaction location in implementing a transaction request
US11586994B2 (en) 2018-05-06 2023-02-21 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for providing provable access to a distributed ledger with serverless code logic
US11816604B2 (en) 2018-05-06 2023-11-14 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market price prediction and sale of energy storage capacity
US11599940B2 (en) 2018-05-06 2023-03-07 Strong Force TX Portfolio 2018, LLC System and method of automated debt management with machine learning
US11599941B2 (en) 2018-05-06 2023-03-07 Strong Force TX Portfolio 2018, LLC System and method of a smart contract that automatically restructures debt loan
US11216750B2 (en) 2018-05-06 2022-01-04 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set
US11605127B2 (en) * 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic consideration of jurisdiction in loan related actions
US11605124B2 (en) 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC Systems and methods of smart contract and distributed ledger platform with blockchain authenticity verification
US11605125B2 (en) 2018-05-06 2023-03-14 Strong Force TX Portfolio 2018, LLC System and method of varied terms and conditions of a subsidized loan
US11810027B2 (en) 2018-05-06 2023-11-07 Strong Force TX Portfolio 2018, LLC Systems and methods for enabling machine resource transactions
US11790286B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for fleet forward energy and energy credits purchase
US11610261B2 (en) 2018-05-06 2023-03-21 Strong Force TX Portfolio 2018, LLC System that varies the terms and conditions of a subsidized loan
US11609788B2 (en) 2018-05-06 2023-03-21 Strong Force TX Portfolio 2018, LLC Systems and methods related to resource distribution for a fleet of machines
US11620702B2 (en) 2018-05-06 2023-04-04 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing information on a guarantor for a loan
US11625792B2 (en) 2018-05-06 2023-04-11 Strong Force TX Portfolio 2018, LLC System and method for automated blockchain custody service for managing a set of custodial assets
US11631145B2 (en) 2018-05-06 2023-04-18 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic loan classification
US11636555B2 (en) 2018-05-06 2023-04-25 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing condition of guarantor
US11790287B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy and energy storage transactions
US11790288B2 (en) 2018-05-06 2023-10-17 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy transactions optimization
US11645724B2 (en) 2018-05-06 2023-05-09 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing information on loan collateral
US11776069B2 (en) 2018-05-06 2023-10-03 Strong Force TX Portfolio 2018, LLC Systems and methods using IoT input to validate a loan guarantee
US11657339B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set for a semiconductor fabrication process
US11657461B2 (en) 2018-05-06 2023-05-23 Strong Force TX Portfolio 2018, LLC System and method of initiating a collateral action based on a smart lending contract
US11769217B2 (en) 2018-05-06 2023-09-26 Strong Force TX Portfolio 2018, LLC Systems, methods and apparatus for automatic entity classification based on social media data
US11763214B2 (en) 2018-05-06 2023-09-19 Strong Force TX Portfolio 2018, LLC Systems and methods for machine forward energy and energy credit purchase
US11669914B2 (en) 2018-05-06 2023-06-06 Strong Force TX Portfolio 2018, LLC Adaptive intelligence and shared infrastructure lending transaction enablement platform responsive to crowd sourced information
US11676219B2 (en) 2018-05-06 2023-06-13 Strong Force TX Portfolio 2018, LLC Systems and methods for leveraging internet of things data to validate an entity
US11681958B2 (en) 2018-05-06 2023-06-20 Strong Force TX Portfolio 2018, LLC Forward market renewable energy credit prediction from human behavioral data
US11687846B2 (en) 2018-05-06 2023-06-27 Strong Force TX Portfolio 2018, LLC Forward market renewable energy credit prediction from automated agent behavioral data
US11688023B2 (en) 2018-05-06 2023-06-27 Strong Force TX Portfolio 2018, LLC System and method of event processing with machine learning
US11710084B2 (en) 2018-05-06 2023-07-25 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for resource acquisition for a fleet of machines
US11715164B2 (en) 2018-05-06 2023-08-01 Strong Force TX Portfolio 2018, LLC Robotic process automation system for negotiation
US11715163B2 (en) 2018-05-06 2023-08-01 Strong Force TX Portfolio 2018, LLC Systems and methods for using social network data to validate a loan guarantee
US11720978B2 (en) 2018-05-06 2023-08-08 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing a condition of collateral
US11763213B2 (en) 2018-05-06 2023-09-19 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market price prediction and sale of energy credits
US11727320B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Transaction-enabled methods for providing provable access to a distributed ledger with a tokenized instruction set
US11727319B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems and methods for improving resource utilization for a fleet of machines
US11727504B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC System and method for automated blockchain custody service for managing a set of custodial assets with block chain authenticity verification
US11748822B2 (en) 2018-05-06 2023-09-05 Strong Force TX Portfolio 2018, LLC Systems and methods for automatically restructuring debt
US11727505B2 (en) 2018-05-06 2023-08-15 Strong Force TX Portfolio 2018, LLC Systems, methods, and apparatus for consolidating a set of loans
US11734620B2 (en) 2018-05-06 2023-08-22 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for identifying and acquiring machine resources on a forward resource market
US11734619B2 (en) 2018-05-06 2023-08-22 Strong Force TX Portfolio 2018, LLC Transaction-enabled systems and methods for predicting a forward market price utilizing external data sources and resource utilization requirements
US11734774B2 (en) 2018-05-06 2023-08-22 Strong Force TX Portfolio 2018, LLC Systems and methods for crowdsourcing data collection for condition classification of bond entities
US11741553B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic classification of loan refinancing interactions and outcomes
US11741401B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for enabling machine resource transactions for a fleet of machines
US11741402B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for forward market purchase of machine resources
US11741552B2 (en) 2018-05-06 2023-08-29 Strong Force TX Portfolio 2018, LLC Systems and methods for automatic classification of loan collection actions
US11748673B2 (en) 2018-05-06 2023-09-05 Strong Force TX Portfolio 2018, LLC Facility level transaction-enabling systems and methods for provisioning and resource allocation
US11646875B2 (en) * 2018-06-29 2023-05-09 Cloudentity, Inc. Data stream identity
US20210211280A1 (en) * 2018-06-29 2021-07-08 Cloudentity, Inc. Data stream identity
CN109255583A (en) * 2018-07-27 2019-01-22 深圳市元征科技股份有限公司 A kind of information sharing method, device, relevant device and medium
US11995213B2 (en) 2018-11-08 2024-05-28 AT&T Intellect ual Property I, L.P. Event-based community creation for data sharing platform
US11379615B2 (en) 2018-11-08 2022-07-05 At&T Intellectual Property I, L.P. Event-based community creation for data sharing platform
WO2020096161A1 (en) * 2018-11-08 2020-05-14 엘지전자 주식회사 Method and apparatus for security communication in wireless communication system
US12282911B2 (en) * 2018-12-20 2025-04-22 Intelligent Fridges B.V Method and arrangement for recycling a packaging purchased from a smart fridge
US20220076237A1 (en) * 2018-12-20 2022-03-10 Stora Enso Oyj Method and arrangement for recycling a packaging purchased from a smart fridge
CN113228011A (en) * 2018-12-29 2021-08-06 上海诺基亚贝尔股份有限公司 Data sharing
EP3903212A4 (en) * 2018-12-29 2022-07-13 Nokia Technologies Oy Data sharing
US12170694B2 (en) 2018-12-29 2024-12-17 Nokia Technologies Oy Data sharing
JP7530143B2 (en) 2019-09-06 2024-08-07 インターナショナル・ビジネス・マシーンズ・コーポレーション Cognitive-enabled blockchain-based resource forecasting
US11210640B2 (en) * 2019-12-19 2021-12-28 The Boeing Company Blockchain for asset management
US11982993B2 (en) 2020-02-03 2024-05-14 Strong Force TX Portfolio 2018, LLC AI solution selection for an automated robotic process
US11586178B2 (en) 2020-02-03 2023-02-21 Strong Force TX Portfolio 2018, LLC AI solution selection for an automated robotic process
US11567478B2 (en) 2020-02-03 2023-01-31 Strong Force TX Portfolio 2018, LLC Selection and configuration of an automated robotic process
US11586177B2 (en) 2020-02-03 2023-02-21 Strong Force TX Portfolio 2018, LLC Robotic process selection and configuration
US11550299B2 (en) 2020-02-03 2023-01-10 Strong Force TX Portfolio 2018, LLC Automated robotic process selection and configuration
US11178186B2 (en) * 2020-03-19 2021-11-16 International Business Machines Corporation Policy rule enforcement decision evaluation with conflict resolution
US20230328093A1 (en) * 2020-08-24 2023-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Technique for Determining a Safety-Critical State
US11651096B2 (en) * 2020-08-24 2023-05-16 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US12299161B2 (en) * 2020-08-24 2025-05-13 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US12259994B2 (en) * 2020-08-24 2025-03-25 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US11954222B2 (en) * 2020-08-24 2024-04-09 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US20250021682A1 (en) * 2020-08-24 2025-01-16 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US20250005186A1 (en) * 2020-08-24 2025-01-02 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US20220058282A1 (en) * 2020-08-24 2022-02-24 Burstiq, Inc. Systems and methods for accessing digital assets in a blockchain using global consent contracts
US11669627B1 (en) * 2020-10-13 2023-06-06 Wells Fargo Bank, N.A. System for data access token management
US20230274019A1 (en) * 2020-10-13 2023-08-31 Wells Fargo Bank, N.A. System for data access token management
US12135812B2 (en) * 2020-10-13 2024-11-05 Wells Fargo Bank, N.A. System for data access token management
US20220138325A1 (en) * 2020-10-29 2022-05-05 EMC IP Holding Company LLC Secure enclave pathing configuration for data confidence fabrics
US12306951B2 (en) * 2020-10-29 2025-05-20 EMC IP Holding Company LLC Secure enclave pathing configuration for data confidence fabrics
US11605143B2 (en) 2021-05-14 2023-03-14 Goldman Sachs & Co. LLC Blockchain with joint claims on tokens
WO2022238983A1 (en) * 2021-05-14 2022-11-17 Goldman Sachs & Co. LLC Blockchain with joint claims on tokens
CN113407928A (en) * 2021-07-14 2021-09-17 西安电子科技大学 Multi-owner RFID authentication method based on block chain
US12298877B2 (en) 2022-02-10 2025-05-13 Bank Of America Corporation System and method for providing automatic diagnostics of API configuration
US12206805B2 (en) * 2022-03-01 2025-01-21 Knnx Corp. Blockchain rules engine
US20230283488A1 (en) * 2022-03-01 2023-09-07 DLT Global, Inc. Blockchain rules engine
CN114581005A (en) * 2022-03-02 2022-06-03 国网山东省电力公司临沂供电公司 Storage, inspection and distribution integrated management and control method based on big data application
US11895238B1 (en) * 2022-08-15 2024-02-06 Expel, Inc. Systems and methods for intelligently constructing, transmitting, and validating spoofing-conscious digitally signed web tokens using microservice components of a cybersecurity threat mitigation platform
US12052364B2 (en) 2022-08-15 2024-07-30 Expel, Inc. Systems and methods for intelligently constructing, transmitting, and validating spoofing-conscious digitally signed web tokens using microservice components of a cybersecurity threat mitigation platform
US20240056303A1 (en) * 2022-08-15 2024-02-15 Expel, Inc. Systems and methods for intelligently constructing, transmitting, and validating spoofing-conscious digitally signed web tokens using microservice components of a cybersecurity threat mitigation platform
GB2622295B (en) * 2022-09-07 2025-01-15 Microshare Inc Smart pest trap as IOT in policy fabric and sharing system for enabling multi-party data processing in an IOT environment
GB2622295A (en) * 2022-09-07 2024-03-13 Microshare Inc Smart pest trap as IOT in policy fabric and sharing system for enabling multi-party data processing in an IOT environment
US12210992B2 (en) * 2022-10-28 2025-01-28 Hitachi, Ltd. Multi-party business collaboration platform for electrification ecosystems
CN119272338A (en) * 2024-12-06 2025-01-07 新能康技术有限公司 A personal data sharing management method based on big data

Also Published As

Publication number Publication date
US20230076019A1 (en) 2023-03-09
WO2024054237A1 (en) 2024-03-14

Similar Documents

Publication Publication Date Title
US20230076019A1 (en) Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment
US20240249001A1 (en) System and method for multiparty secure computing platform
CN109074405B (en) Dynamic management of data with context-based processing
US20190347442A1 (en) Method for Personal Data Administration in a Multi-Actor Environment
Vo et al. Internet of blockchains: Techniques and challenges ahead
CN111164629A (en) Methods, apparatus, and computer-readable media for compliance-aware tokenization and control of asset value
US11775681B2 (en) Enforcement flow for pipelines that include entitlements
US11361106B2 (en) Chaining, triggering, and enforcing entitlements
US20210081549A1 (en) Systems and methods for sharing data assets via a computer-implemented data trust
US20230214398A1 (en) Data Privacy Management & Compliance Using Distributed Ledger Technology
Akaichi et al. Usage control specification, enforcement, and robustness: A survey
Ibrahim et al. Towards collaborative security approaches based on the European digital sovereignty ecosystem
US20250077706A1 (en) Universal third party privacy and personal data management system
Dubey et al. Crowd review and attribute-based credit computation for an access control mechanism in cloud data centers
US11238178B2 (en) Blockchain network to protect identity data attributes using data owner-defined policies
US20080027939A1 (en) Method, system, and program product for controlling access to personal attributes across enterprise domains
EP4336398A1 (en) Smart pest trap as iot in policy fabric and sharing system for enabling multi-party data processing in an iot environment
Rashbaum et al. Outrun the lions: a practical framework for analysis of legal issues in the evolution of cloud computing
Maroua et al. Formal approach for authorization in distributed business process related task document role based access control
Eitel et al. Usage control in the industrial data space
US12314445B2 (en) Chaining, triggering, and enforcing entitlements
Jingya Data centered Usage based Protection in a SMACIT context
Yuan et al. A Data-centered Usage Governance: Providing Life-long Protection to Data Exchanged in Virtual Enterprises.
Jaimunk Privacy-preserving Architecture for Cloud-IoT Platform
Kazmi Access control process for a saas provider

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

AS Assignment

Owner name: MICROSHARE, INC., PENNSYLVANIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:PANAGOS, TIMOTHY;REEL/FRAME:047078/0612

Effective date: 20180402

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

AS Assignment

Owner name: ACQUIOM AGENCY SERVICES LLC, AS COLLATERAL AGENT, MINNESOTA

Free format text: SECURITY INTEREST;ASSIGNOR:MICROSHARE, INC.;REEL/FRAME:058059/0035

Effective date: 20211025

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER