专利摘要:
The invention relates to databases for storing and processing data from individuals and organizations, architecture ((graphic) user interfaces, search engines) and methods for using such databases, (graphic) interfaces suitable for use of such databases and methods and underlying technology and related software.
公开号:BE1024521B9
申请号:E20165887
申请日:2016-11-29
公开日:2018-04-09
发明作者:Karel Ribbens;Christos Anagnostakis
申请人:Aztrix Nv;
IPC主号:
专利说明:

DATABASE THAT GUARANTEES THROUGH ITS DESIGN PRIVACY AND METHODS WITH THIS
DATABASE
FIELD OF THE INVENTION
The invention relates to databases for the storage and processing of data from persons and organizations, architecture of ((graphic) user interfaces, underlying components) and the method of operation of such databases, (graphic) interfaces suitable for the use of such databases and methods and the underlying technology and associated software.
BACKGROUND OF THE INVENTION
An individual has his own data such as (contact) data (address data, mobile number (s), e-mail address (s), ...). An individual's individual information can consist of many different characteristics / values / characteristics. The desire to share those characteristics can depend on property to property and also on the group of people / organizations with whom these properties can be shared.
Databases are filled with information, either by the input of information by the relevant person and / or by the input of data from one person by another, and / or by (mass) input of information from other databases. This uncoordinated input can lead to consistency problems and / or inefficient input if optimum use is made of the information already available. Moreover, many of the features (such as country, city or street name) are not unique to a single individual / organization (most of all, the range of features is unique), while other databases with high-quality information about these features exist.
Moreover, the handling of databases with individual information is increasingly regulated from the perspective of privacy via the privacy law.
Object of the invention
The invention provides technological solutions with solutions to the aforementioned problems, more particularly a database structure or system design (subsequently implemented in software) and related methods for handling thereof, built on a well-chosen underlying concept and its use with a special application.
Summary of the invention In a first aspect of the invention, a database is provided for storing and handling data from individuals, in which an individual can choose to have an attribute / context / characteristic for each property (or group of properties or data). assign (such as professional, personal, ...) and can further choose (at the time of entry and / or on request) based on such a feature to make this property accessible to everyone (public), a predefined class (s) from others (selective audience) or even to nobody (private).
In a second aspect of the invention, a database is provided for storing and processing data from individuals, wherein the use of high-quality information (metadata) from other data banks can be used for non-unique and even unique features.
In a third aspect of the invention, various methods for the (intelligent) input / addition of information to a database for storing and processing data of individuals (such as, but not limited to, the databases of the first and / or second aspect of the invention) in a way that complies with privacy legislation by realizing suitable accessibility (privacy by design) and communication flow between the parties involved (the person whose data is entered, the individual who enters it, the same person or another individual the organizations that use the database and / or are willing to provide information for the database).
Brief description of the drawings
The accompanying drawings are used to illustrate the presently preferred non-limiting exemplary embodiments of the present invention. The foregoing and other advantages of the features and objects of the invention will become more apparent and the invention will be better understood from the following detailed description when read in conjunction with the accompanying drawings.
Figure 1 shows the basic concept of the invention and more particularly the graph (node relationship} representation thereof.
Figure 2 shows an exemplary embodiment of Figure 1.
Figure 3 shows an application of the concept of Figure 1 in terms of individuals and contacts. Figure 4 shows the application of the concept of Figure 3.
Figure 5 shows an exemplary embodiment of the application of Figure 4.
Figure 6 illustrates that this concept can also be adapted for the application of data values stored in another system.
Figures 7-12 show the implementation of a privacy policy in the diagrammatic implementation of the invented database. Detailed description of the invention.
The application contains a reference to U.S. Provisional Application No. 62/030242 in its entirety.
The invention relates to databases for storage, handling, management of data / information of an individual, such as address data, wherein this database is suitable for on-line access. The database is adapted for use by individuals and organizations such as companies. Different applications and / or individual-organization relationships have an underlying application and / or reunion-specific database. The invention relates to a generic database usable for a number of applications and / or relationships, and can be tailored to each of the applications and relationships their required requirements, such as the information to be shared (made accessible) or not. The invention relates to technology that supports such databases, such as a graph or diagram approach. With database, every computer system or systems with storage means (computer of different kinds) and related technology and software for handling the stored data thereon.
The use of a kind of virtual (the execution in hardware is not related to this) central database linked to different applications leads to a dynamic context in which the data is life / active / dynamic in the sense that if changed it becomes visible everywhere the associated user wished that this became visible and / or changed. The use of such a central database is supported by various possible ways of entering information, either in the expected manner by the data owner himself, but also by an arrangement based on invitations or by importing or by making suggestions or requests. The use of such a central database requires trust in the system and therefore methods to clean the data by using trusted databases and also ensure privacy by design by only providing access to certain data in full compliance with the policy that a the user. In essence, the user owns his data and controls the data fields for access and the user receives support in setting up such data fields for example in receiving requests and / or acknowledgments of such requests or invitations. in essence, the invention provides concepts and methods for overcoming the problems of having a lack of coherence and / or lack of control / checking capabilities when only data values are used on their own but on the contrary by understanding that the relationships between them are one or more defines contexts that can be used to identify / search / find a person, make suggestions, define control / verification (either implicitly or explicitly) and sharing capabilities.
Hey! the invention has much flexibility to the user to determine this profile (100) (defined as properties (110) as shown in figure 1), in an embodiment of the invention predefined tempiates thereof are made available to categories of users. In an embodiment of the invention, users can define their favorite / custom templates. For each attribute (or group of attributes) an attribute / attribute / context (140) (such as professional, personal, ...) can be assigned. Properties can get a value (120). It is a contribution of the invention to emphasize the difference that is made between the property of the user (person, organization) who is storing data and the value assigned to it. Figure 1 shows the underlying concept of the profile, data and value, and more particularly the graph (node (150), relation (160)) representation thereof to support the invented database are operations. Figure 2 shows an example in which a given is chosen for the first name of a person while a data context is the work environment of that person, so you could expect to label the given and the context with the possible values of the type of information. Figure 3 now shows the use of this concept explained above, in particular that "individual" honors a profile! is with properties that are organized in contexts as registered in the database or database networks as might be the case. A "contact" is a static profile of another party, with properties organized in contexts that you can also find in the address book related to the do-group database. Note again the node / re approach approach, Zoais shown in Figure 4 is a connection between individuals not made directly but through the contact node, indeed "individual 1" has a static "contact" that stands for "individual 2" and can connect "Individual 2" through this contact. Upon connection, this contact becomes a dynamic representation of the connected "individual 2" and its properties, within the correct context (s). When created, shared properties become static again in the "contact". The basic philosophy of the database is to take advantage of the invented "once saved" principle as shown in Figure 5. A "profiei" can have properties and, in certain cases, the ability to check them. Based on these verified properties, we can start making agreements and suggestions, always based on the consent and privacy settings of users, and based on different verification methods, the design of the database and the number of shared objects, a degree of reliability can be determined for a certain profile.
It is worth noting at this stage that the system provides a granuarity to define a data-based privacy policy if the database is adapted so that at least a part of said data fields, individually or in groups, is provided at least one further second data field in which the individual or organization can select (or assign or relate or choose) one or more attributes that define the communication method desired by the individual or organization for determining the accessibility or not (if present) for (a predefined kias of) third parties. This results in a bilaterally possible opt in or opt out procedure.
It should also be noted that in one embodiment of the database (see shown in the right-hand part of Figure 6) that the data values may be part of another system outside the database, in particular the use of a node for a profile points to a property that can then further indicate a value, which can be outside the database itself, makes this possible. Alternatively, the database for storing a number of individual or organization information, comprises several first data fields for each of that person or organization, each for storing or a characteristic of such a person or organization (part of which are the contact details), has been adapted such that the current value is stored by reference only (with the help of a suitable interface).
Note that the concept of centralizing allows control by many users and therefore the amount of links actually represent a measure or metric of the reliability of the underlying data. In an embodiment of the invention, such a measure is shown in the interface with the data and the reliability. In addition, the invention also provides methods for further improving the reliability of the underlying data through suggestions from users to further increase confidence in their data, for example by identifying many isolated data or circular relationships. in an embodiment of the invention, a further selection of a suitable database structure has been proposed. Indeed, given that a database is intended for use by a large number of users and further that many users preferably each have different data fields or properties, and since as mentioned above, many methods work on the database and therefore require a search in the database its special consideration of to do.
Many concepts for databases exist (for example SQL), but according to the present embodiment of the invention a graph-based database has been chosen as a preferred concept, indeed the underlying requirements of the invention namely that verified (by design) data is intended leads to an application of a data mode, where a distinction is made between the attribute of the user (person, organization) whose data is stored and its value assigned, essentially a structure that relates users to attributes and a attribute is then chosen to a value, the user, property and value are a separate node in a graph and the relationship is then represented by the bridges between the nodes. For such a data model, graph-based databases and related search methods are the most suitable, especially since they also allow for a search along the bridges / relationships. This embodiment of the invention therefore provides a fundamental understanding of the true nature of the required data modes and the associated database (either uni-directional or bi-directional using the arrows of the graph) to use search methods, in that said property must be parsed or separated from its value, in space of the data space for nodes that represent people or organizations and arches / bridges or relationships between them, a further assignment is made that represents each of these people or organizations as a group of nodes that represent their properties and relates these properties to stand-alone values. In this way the Complicated connections in society are represented by the chosen data model. Note that the movements can also have different properties, indeed by values as separate items (one-time storage), the operations on the database essentially amount to operations on the relationships. If a value of a property needs a change, it is not the value that is changed, but a reference to another (or new) value is made (allowing the storage of previous information and the retrieval thereof). This also ensures that such changes can be visible on all permitted connections at the same time.
The above embodiment has the advantage that it realizes an ideal match between the defined {but extensible) requirements and technical implementation namely the "one-time saved" principle does not only lead to data reduction (storage size reduction) per se, but ensures that the data in the values can serve as a trusted set of master data, with built-in design consistency and / or privacy. in a further embodiment one or more of the data fields are encrypted, in an exemplary embodiment thereof the encryption is applied to the values and / or the relationships in the graph or diagram databases.
In summary, one or more of the following features of the invention, which can be used individually or in combination, are again indicated below. 1. Public / Private / on request 2. Active (dynamic) ƒ Passive (static) 3. Opt In & Out 4. Privacy by design 5. Verification by various means (applications / connections / networked operation / ...) 6. Add manually ƒ Request Confirmation (invite) ƒ Request 7. One-time storage: based on verified properties ƒ suggestions
One skilled in the art will readily appreciate that various steps of the methods described above can be performed by a programmed computer. In some other embodiments, herein, data carriers for programs, e.g., digital data carriers, which include machine or computer readable code, which include machine-oriented or computer-executable programs of instructions, wherein said instructions perform some or all of the steps of the above-described methods. The program storage devices can be, for example, digital memories, magnetic storage media, such as magnetic disks and magnetic tapes, hard disks, or optically readable digital storage media. The embodiments are also concerned with programmed computers that perform the steps of the methods described above.
Alternatively, one can state that an embodiment of the invention relates to a database for storing information for a number of persons or organizations, said database being constructed such that data used herein is verified by design, meaning that the operations , interfaces and underlying database set-up to realize this. In a preferred embodiment the database is a diagram or graph based data file.
In essence, the database for each of those persons or organizations comprises several first data fields, each for storing a characteristic ƒ property of such a person or organization (part of which is the contact information), the database being based on a data modes, where a distinction is made between the data / properties of the user (person, organization) whose data is stored and the value assigned to it (as described in figures 1 and 2), more specifically a data mode / structure is selected, that user relates to properties and a property relates to a value, where the user, property and value is a separate node in a graph and the relationship is then represented by the bridges between the nodes. Therefore, the invention relates to methods for using / treating a person or organization his / her data stored in such databases based on search methods, using the bridges.
The invention provides technological solutions to the above problems, more particularly a database structure or system design (subsequently implemented in software) and related methods, built on a well-chosen underlying concept, their use with a special application for supporting one or more of the aspects of the invention (accessibility check, high-quality data and / or smart input), in particular by the choice of the specific data modes above and / or the selection of a suitable technological solution in the field of databases, in particular a graph based database.
Ensuring that someone can determine the accessibility as soon as desired (if desired) for (a predefined classes of) third parties of data (the so-called privacy policy) (see Figure 6} by means of mechanisms, related to the property (node), is not the Figure 7-12 shows an illustrative implementation thereof Essentially a specialized node (300) (said access request or otherwise named access control node) is applied, in one embodiment thereof, the node has a dual state (request granted) ), but alternative multi-state embodiments is equally possible. This node is used in combination with the contact node previously defined, in particular a reunion between the contact node and the access control node is made. request to be made on a per-given basis done (and the associated property and value exist) and assigned, instead of copying values (leading to the aforementioned issues of maintenance discussed), a link is made instead of the same value (if this property is indicated as a joint given ).
Although the principles of the invention have been described above in connection with specific embodiments, it will be understood that this description is made by way of example only and not as a limitation on the scope of protection defined by the appended claims. Alternatively formulated, the invention relates to a database system comprising: a graph based database, a query engine for executing queries on the graph based database; one or more applications suitable for requesting and receiving data from the query engine; a memory for storing the machine executable instructions for executing the database system; and a processor for executing the machine executable instructions for the various methods supported for the database system and the associated applications.
Conclusions 1. A database for storing for a plurality of Individuals or organizations their information, the database comprising several first data fields for each of those individuals or organizations, each for storing an item of such an individual or organization (of which a part thereof) their contact information), wherein for at least one part of said data fields, either individually or in group, at least one further second data field is provided, in which the individual or the organization can seiect (or link or reiatify or choose) one or more characteristics that define the communication method desired by the individual or organization for determining accessibility of the data (if desired) for (predefined classes) of third parties; characterized in that the database is a diagram-based data file. The database according to claim 1, wherein the database essentially relates the individual or organization to properties by means of a structure and a property was then chosen to a value, the individual or organization, property and value being a separate node in a graph and the relationship is then preceded by the bridges between the nodes. The database according to claim 1 or 2, wherein the individual or organization can select for a data that is never made accessible to third parties (private), or wherein the individual or organization can select for a data that can always be accessed made to third parties (public). The database according to claim 1, 2 or 3, wherein the individual or organization can select for a fact that it can be made accessible to third parties if the third party belongs to the individual or organization's (professional) network. The database according to claim 1, 2, 3, and 4, wherein the individual or organization can select for a fact that it can be made accessible to third parties if the third party belongs to the person or organization's private network. The use of the database according to claim 1 by a plurality of computer applications. A method for entering an individual or organization of his or her information into the database of claim 1, comprising: entering the data of the individual or organization into the data fields; and selecting a feature for at least one of said data in the second data field; the method also comprising the step of presenting one or more of the input data of an alternative obtainable from a second more reliable database; and after confirming the individual or organization save the suggested alternative in the data field. A method for using an individual or organization his or her stored information in the database of claim 1 by another individual or organization, comprising the steps of: entering one or more data fields to identify the individual; after confirmation by the database that the individual or organization has stored his or her contact information therein; starting a communication method, taking into account the characteristics, stored in the database for the plurality of data of the individual or organization to access one or more of such data, characterized in that the method is based on diagram-based search methods. A method for entering a database, which comprises his / or her information from a number of individuals or organizations, said database being from another individual or organization, in the database of claim 1, comprising the step of performing the method according to claim 8 on a per individual or per organization basis. Method for approving or rejecting access to one or more of the data of an individual or organization by the relevant person or organization, comprising the steps of: receiving from the database of claim 1 according to a communication method taking into account the characteristics stored in the database for the data, requests for this access; and entering an approval or rejection thereof, characterized in that the method is based on diagram based search methods, 11, A computer program product operating on a processor for performing one of the steps of the methods 8-12, 12, A non-temporarily machine-readable storage medium storing the computer program product according to claim 13, 13, A computerized system for handling communication between an individual or organizations using a database of claim 1, where those communications are made by any of the methods 8 -12, the system comprising storage means for the database of claim 1; and means for requests for access and input of approvals or rejections thereof. A method for using an individual or organization his or her information stored in the database of claim 1 by another individual or organization, comprising the steps of: entering one or more data fields to identify the individual or organization; after verification by the database that the individual or an organization's contact details are not stored therein; (conditional} automatic generation of an invitation to the individual or organization to join; the step of generating an invitation to join results in confirming the entered data fields and setting the corresponding second data field. 15, Method of using of an individual or organization his / her data is stored in the database of claim 1 by another individual or organization comprising the steps of: performing an analysis on the database and automatically generating suggestions for linking; the performing of the analysis is performed solely on data verified at trusted databases 16. Method for using an individual or organization his or her data stored in the database of claim 1 by another information-disseminating individual or organization, comprising the steps of : providing a request to the individual or organization to those channels that may be used to provide the information; and adapting according to the response to the request from the associated second data field only to provide access to such features related to the agreed channels, characterized in that the method is based on diagram based search methods, and searches along the bridges / relationships in the graphed based databases.
权利要求:
Claims (2)
[1]
DATABASE THAT IS GUARANTEED THROUGH ITS PRIVACY DESIGN AND METHODS NOT THIS DATABASE Extract The invention relates to databases for storing and processing data of individuals and organizations, architecture ((graphic) user interfaces, search engines) and methods for using such databases, (graphic) interfaces suitable for the use of such databases and methods and underlying technology and related software. Concerning Item V Substantiated statement regarding novelty, inventiveness or industrial applicability; references and explanations to support this statement 1 State of the art 1.1 Reference is made to the following documents: D1 WO 02/48865 A2 (SENTILLION INC [US]) 20 June 2002 (2002-06-20) D2 US 2003/014654 A1 (ADLER STEVEN B [US] ET AL) January 16, 2003 (2003-01-16) D3 US 2003/097485 A1 (HORVITZ ERIC J [US] ET AL) May 22, 2003 (2003-05-22) 2 Novelty and Inventiveness 2.1 In the present independent claim 1, claims 1 and 2 of international application WO2016016192 are combined. In the international provisional report on patentability (separate sheet), an objection to novelty is made against claim 1 of international application WO02016016192 for the following reasons: 2.2 Taking into account the following references to D1, the subject matter is according to the independent claim 1 not new, as is revealed in D1 (where the references in brackets apply to this document): A database (centralized storage location 120 in D1, Figure 4) for storing a plurality of information from individuals or an organization (page 4, lines 23-30), wherein the database comprises several first data fields for each such individual or organization (D1, page 10, lines 3-10), each for storing data from such an individual or organization of which a part defines the contact information thereof (implicitly by the reference to HIPAA in D1, page 3, lines 24-28); wherein at least a further second data field is provided for at least a part of said data fields, either individually or in group, wherein the individual or organization can select or assign or relate or relate to one or more attributes (context data in D1, page 4, lines 5-22) defining the communication method (if any) required by the individual or organization for determining accessibility to predefined classes of third parties (D1, page 4, lines 5-22 and page 14, lines 25 - page 15, line 26).
[2]
2.3 The additional measures (corresponding to those according to claim 2 of international application WO2016016192) are known from D1, page 10, lines 3-10 (see in particular "hierarchical databases, networks and directory systems"). The subject matter of the independent claim 1 is therefore not new. 2.4 In independent claim 11, the computer program product corresponding to the device of claim 1 is defined. Independent claim 11 is therefore not new. 2.5 In independent claim 12, the non-temporary machine-readable storage medium corresponding to the device of claim 1 is defined. Independent claim 12 is therefore not new. 2.6 In independent claim 13, a computerized system corresponding to claim 1 is defined. Independent conclusion 13 is therefore not new. 2.7 Dependent claims 2-10 and 14-16 set out minor changes to the independent claims, all of which, if not directly deductible from the documents quoted in the investigation report, concern routine measures that are usually taken by an expert in the field can be expected. The dependent claims 2-10 and 14-16 therefore do not include inventiveness. 2.8 The measures according to claims 1 - 16 are not provided with reference marks in brackets. 2.9 The known state of the art as disclosed in document D1 is not mentioned in the description, nor is this document mentioned therein.
类似技术:
公开号 | 公开日 | 专利标题
US10181051B2|2019-01-15|Data processing systems for generating and populating a data inventory for processing data access requests
US10997318B2|2021-05-04|Data processing systems for generating and populating a data inventory for processing data access requests
US9424187B1|2016-08-23|Policy-based storage of portions of an object in a multi-tiered storage system
US10848496B2|2020-11-24|System and method for secure individual identification across multiple disparate entities
US20120174194A1|2012-07-05|Role setting apparatus, and role setting method
CN103765466B|2018-04-10|Method and apparatus for determining and being worth using digital asset
US11232077B2|2022-01-25|Method and apparatus for sharing information recorded on blockchain based on anchoring
US20150324896A1|2015-11-12|Presentation of homage tokens
US9754319B2|2017-09-05|Source document framework for accounting systems
US8935474B1|2015-01-13|Policy based storage of object fragments in a multi-tiered storage system
CN106326760A|2017-01-11|Access control rule description method for data analysis
US20130152155A1|2013-06-13|Providing user attributes to complete an online transaction
BE1024521B9|2018-04-09|DATABASE GUARANTEED THROUGH HIS DESIGN PRIVACY AND METHODS WITH THIS DATABASE
JP2004054779A|2004-02-19|Access right management system
US20160253766A1|2016-09-01|System and method for curation of notable work and relating it to involved organizations and individuals
Bănică et al.2013|Cloud-powered e-Health
US11010394B2|2021-05-18|Efficient access of chainable records
JP2020181469A|2020-11-05|Data management device, data management method, program, and data management system
US20210099301A1|2021-04-01|Nested tenancy that permits a hierarchy having a plurality of levels
Maurya et al.2020|Medical Store Locator
Wood2019|The Godwinian letter: William Godwin's epistolary exchanges, 1778-1805
Tong et al.2019|Decentralized Privacy-Preserving Platform for Clinical Data Sharing and Analysis
CN112464625A|2021-03-09|Receipt generation method and device, computer equipment and storage medium
WO2019023534A1|2019-01-31|Data processing systems for generating and populating a data inventory for processing data access requests
JP2000057034A|2000-02-25|Information processing system and recording medium
同族专利:
公开号 | 公开日
ES2833007T3|2021-06-14|
AU2015295521A1|2017-03-16|
US20170243027A1|2017-08-24|
CA2994030A1|2016-02-04|
EP3189463A1|2017-07-12|
PL3189463T3|2021-06-28|
BE1024521B1|2018-03-27|
BE1024521A9|2018-04-04|
BE1024521A1|2018-03-22|
EP3189463B1|2020-08-19|
WO2016016192A1|2016-02-04|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

CA2431491C|2000-12-11|2012-03-20|Sentillion, Inc.|Context management with audit capability|
US7302634B2|2001-03-14|2007-11-27|Microsoft Corporation|Schema-based services for identity-based data access|
US7069427B2|2001-06-19|2006-06-27|International Business Machines Corporation|Using a rules model to improve handling of personally identifiable information|
法律状态:
2018-04-09| FG| Patent granted|Effective date: 20180327 |
优先权:
申请号 | 申请日 | 专利标题
US201462030242P| true| 2014-07-29|2014-07-29|
US62/030,242|2014-07-29|
[返回顶部]