Systems and/or methods for enabling cooperatively-completed rules-based data analytics of potentially sensitive data
First Claim
1. A data analysis system, comprising:
- processing resources, including at least one first hardware processor and a first memory operatively coupled thereto;
a first non-transitory data store comprising sensitive data about a user, as well as a set of data sharing rules, the set of data sharing rules indicating what sensitive data is sharable and one or more conditions identifying when such sensitive data is shareable, and the sensitive data comprising information elements; and
a second non-transitory data store comprising at least one set of analysis rules, the at least one set of analysis rules being system defined and/or defined by an external party separate from the user;
wherein the processing resources are configured to control the data analysis system to at least;
store, to the first data store, sensitive information received from the user and/or electronically retrieved from a data source external to the data analysis system in response to the user providing appropriate credentialing information and/or consent for the external data source;
receive, from the external party, a request to process a first predefined set of sensitive information; and
responsive to a request to process a first predefined set of sensitive information,determine one or more sets of analysis rules to be applied to sensitive information in the first predefined set of sensitive information, based at least in part on the received request;
automatically and programmatically attempt to apply each rule from each determined set of analysis rules to sensitive information in the first predefined set of sensitive information;
store, to the second data store, information about an outcome of the rules that are successfully applied, the information being associated with the sensitive information on which the rules are run; and
for each rule or set of rules that indicates that further action is required;
re-assess an outcome of a respective rule or an outcome of a set of rules, responsive to at least one of;
(a) automatic retrieval of further information from the user performed in connection with applicable data sharing rules, (b) application of a heuristic to sensitive information already in and/or added to the first predefined set of sensitive information, (c) electronic receipt of further information from the user or the external party in response to a system-initiated electronic prompt for responsive information, and (d) a determination as to whether the indication that further action is required for the respective rule or set of rules can be ignored based on input from the external party; and
store, to the second data store, information about an outcome of the respective re-assessed rule or set of rules, the information being associated with the sensitive information on which the respective rule or set of rules is run; and
wherein the system further comprises a portal and/or application programming interface configured to enable the external party to update a given outcome provided by one or more analysis rules for a corresponding item of sensitive information by updating the given outcome to an updated outcome selected from a set of outcomes.
1 Assignment
0 Petitions
Accused Products
Abstract
Certain example embodiments relate to systems and/or methods for providing enhanced control over potentially sensitive data sharable among and/or between different parties. For example, certain example embodiments provide views into computer-enabled workflows managed by external parties, including views into what sensitive data has been accessed, who has accessed it, etc., e.g., throughout the lifecycle of a product granted on the basis of an analysis of such data. A computer-enabled system for automatically assessing received sensitive data in accordance with one or more digitized rule sets also is provided in certain example embodiments, as are computer-mediated tools for helping to automatically, semi-automatically, and/or manually resolve issues detected in the assessments, e.g., via enhanced communication and collaboration, among and/or between parties to a transaction, as well as third-parties who indirectly are involved in the transaction. The data remains secure and traceable, e.g., in accordance with its provider'"'"'s specifications.
300 Citations
83 Claims
-
1. A data analysis system, comprising:
-
processing resources, including at least one first hardware processor and a first memory operatively coupled thereto; a first non-transitory data store comprising sensitive data about a user, as well as a set of data sharing rules, the set of data sharing rules indicating what sensitive data is sharable and one or more conditions identifying when such sensitive data is shareable, and the sensitive data comprising information elements; and a second non-transitory data store comprising at least one set of analysis rules, the at least one set of analysis rules being system defined and/or defined by an external party separate from the user; wherein the processing resources are configured to control the data analysis system to at least; store, to the first data store, sensitive information received from the user and/or electronically retrieved from a data source external to the data analysis system in response to the user providing appropriate credentialing information and/or consent for the external data source; receive, from the external party, a request to process a first predefined set of sensitive information; and responsive to a request to process a first predefined set of sensitive information, determine one or more sets of analysis rules to be applied to sensitive information in the first predefined set of sensitive information, based at least in part on the received request; automatically and programmatically attempt to apply each rule from each determined set of analysis rules to sensitive information in the first predefined set of sensitive information; store, to the second data store, information about an outcome of the rules that are successfully applied, the information being associated with the sensitive information on which the rules are run; and for each rule or set of rules that indicates that further action is required; re-assess an outcome of a respective rule or an outcome of a set of rules, responsive to at least one of;
(a) automatic retrieval of further information from the user performed in connection with applicable data sharing rules, (b) application of a heuristic to sensitive information already in and/or added to the first predefined set of sensitive information, (c) electronic receipt of further information from the user or the external party in response to a system-initiated electronic prompt for responsive information, and (d) a determination as to whether the indication that further action is required for the respective rule or set of rules can be ignored based on input from the external party; andstore, to the second data store, information about an outcome of the respective re-assessed rule or set of rules, the information being associated with the sensitive information on which the respective rule or set of rules is run; and wherein the system further comprises a portal and/or application programming interface configured to enable the external party to update a given outcome provided by one or more analysis rules for a corresponding item of sensitive information by updating the given outcome to an updated outcome selected from a set of outcomes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81)
-
-
82. A data analysis method for use with a data analysis system comprising processing resources, including at least one first hardware processor and a first memory operatively coupled thereto, a first non-transitory data store comprising sensitive data about a user, as well as a set of data sharing rules, the set of data sharing rules indicating what sensitive data is sharable and one or more conditions identifying when such sensitive data is shareable, and the sensitive data comprising information elements, and a second non-transitory data store comprising at least one set of analysis rules, the at least one set of analysis rules being system defined and/or defined by an external party separate from the user, the method comprising:
-
storing, to the first data store, sensitive information received from the user and/or electronically retrieved from a data source external to the data analysis system in response to the user providing appropriate credentialing information and/or consent for the external data source; receiving, from the external party, a request to process a first predefined set of sensitive information; responsive to a request to process a first predefined set of sensitive information, determining one or more sets of analysis rules to be applied to sensitive information in the first predefined set of sensitive information, based at least in part on the received request; automatically and programmatically attempting to apply each rule from each determined set of analysis rules to sensitive information in the first predefined set of sensitive information; storing, to the second data store, information about an outcome of the rules that are successfully applied, the information being associated with the sensitive information on which the rules are run; and for each rule or set of rules that indicates that further action is required; re-assessing an outcome of a respective rule or an outcome of a set of rules, responsive to at least one of;
(a) automatic retrieval of further information from the user performed in connection with applicable data sharing rules, (b) application of a heuristic to sensitive information already in and/or added to the first predefined set of sensitive information, (c) electronic receipt of further information from the user or the external party in response to a system-initiated electronic prompt for responsive information, and (d) a determination as to whether the indication that further action is required for the respective rule or set of rules can be ignored based on input from the external party; andstoring, to the second data store, information about an outcome of the respective re-assessed rule or set of rules, the information being associated with the sensitive information on which the respective rule or set of rules is run; and enabling the external party to update a given outcome provided by one or more analysis rules for a corresponding item of sensitive information by updating the given outcome to an updated outcome selected from a set of outcomes, via a portal and/or application programming interface.
-
-
83. A non-transitory computer readable storage medium tangibly storing instructions that, when executed by a hardware processor of a data analysis system that includes a first data store comprising sensitive data about a user, as well as a set of data sharing rules, the set of data sharing rules indicating what sensitive data is sharable and one or more conditions identifying when such sensitive data is shareable, and the sensitive data comprising information elements, and a second data store comprising at least one set of analysis rules, the at least one set of analysis rules being system defined and/or defined by an external party separate from the user, perform functionality comprising:
-
storing, to the first data store, sensitive information received from the user and/or electronically retrieved from a data source external to the data analysis system in response to the user providing appropriate credentialing information and/or consent for the external data source; receiving, from the external party, a request to process a first predefined set of sensitive information; responsive to a request to process a first predefined set of sensitive information, determining one or more sets of analysis rules to be applied to sensitive information in the first predefined set of sensitive information, based at least in part on the received request; automatically and programmatically attempting to apply each rule from each determined set of analysis rules to sensitive information in the first predefined set of sensitive information; storing, to the second data store, information about an outcome of the rules that are successfully applied, the information being associated with the sensitive information on which the rules are run; and for each rule or set of rules that indicates that further action is required; re-assessing an outcome of a respective rule or an outcome of a set of rules, responsive to at least one of;
(a) automatic retrieval of further information from the user performed in connection with applicable data sharing rules, (b) application of a heuristic to sensitive information already in and/or added to the first predefined set of sensitive information, (c) electronic receipt of further information from the user or the external party in response to a system-initiated electronic prompt for responsive information, and (d) a determination as to whether the indication that further action is required for the respective rule or set of rules can be ignored based on input from the external party; andstoring, to the second data store, information about an outcome of the respective re-assessed rule or set of rules, the information being associated with the sensitive information on which the respective rule or set of rules is run; and enabling the external party to update a given outcome provided by one or more analysis rules for a corresponding item of sensitive information by updating the given outcome to an updated outcome selected from a set of outcomes, via a portal and/or application programming interface.
-
Specification