Data custodian and curation system
First Claim
1. A system comprising:
- a processor;
memory coupled to the processor;
a data repository stored in the memory, the data repository comprising a plurality of private data sets corresponding to different data providers;
an encryption key repository stored in the memory, the encryption key repository comprising a plurality of encryption keys corresponding to the plurality of private data sets; and
instructions stored in the memory, the instructions being executable by the processor to;
access a first private data set in the data repository, wherein the first private data set is associated with a first access condition and is associated with a first data provider;
access a second private data set in the data repository, wherein the second private data set is associated with a second access condition, wherein the second private data set is associated with a second data provider different from the first data provider, andwherein the second private data set is maintained separately from and outside of the first private data set;
derive a new private data set from the first private data set and the second private data set, wherein the new private data set comprises a portion of the first private data set and a portion of the second private data set, and wherein the new private data set resides in the data repository;
make the new private data set available in a marketplace;
establish at least one entitlement for accessing the new private data set via the marketplace; and
control access to the new private data set based on the at least one entitlement such that access to the portion of the first private data set included in the new private data set is associated with the first access condition and access to the portion of the second private data set included in the new private data set is associated with the second access condition, wherein controlling access to the new private data set comprises requesting at least one encryption key from the encryption key repository.
2 Assignments
0 Petitions
Accused Products
Abstract
A data custodian and curation system may store data from a data supplier in encrypted form and may allow users to consume the data when the consumers obtain access to the data through an agreement. The curation system may manage access to the data, even allowing a consumer to use the data as if it were their own, but may track each usage of the data to implement a payment scheme or various usage restrictions. The curation system may encrypt downstream uses of the data and operate as a digital rights management system for the data. The custodian and curation system may operate as a cloud service that may contain encrypted data from many data providers but where the data providers may individually control access to their data in a managed system at any granular level.
-
Citations
20 Claims
-
1. A system comprising:
-
a processor; memory coupled to the processor; a data repository stored in the memory, the data repository comprising a plurality of private data sets corresponding to different data providers; an encryption key repository stored in the memory, the encryption key repository comprising a plurality of encryption keys corresponding to the plurality of private data sets; and instructions stored in the memory, the instructions being executable by the processor to; access a first private data set in the data repository, wherein the first private data set is associated with a first access condition and is associated with a first data provider; access a second private data set in the data repository, wherein the second private data set is associated with a second access condition, wherein the second private data set is associated with a second data provider different from the first data provider, and wherein the second private data set is maintained separately from and outside of the first private data set; derive a new private data set from the first private data set and the second private data set, wherein the new private data set comprises a portion of the first private data set and a portion of the second private data set, and wherein the new private data set resides in the data repository; make the new private data set available in a marketplace; establish at least one entitlement for accessing the new private data set via the marketplace; and control access to the new private data set based on the at least one entitlement such that access to the portion of the first private data set included in the new private data set is associated with the first access condition and access to the portion of the second private data set included in the new private data set is associated with the second access condition, wherein controlling access to the new private data set comprises requesting at least one encryption key from the encryption key repository. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A processor-implemented method, comprising:
-
accessing a first private data set in a data repository, wherein the first private data set is associated with a first access condition and is associated with a first data provider, and wherein the data repository comprises a plurality of private data sets corresponding to different data providers; accessing a second private data set in the data repository, wherein the second private data set is associated with a second access condition, wherein the second private data set is associated with a second data provider different from the first data provider, and wherein the second private data set is maintained separately from and outside of the first private data set; deriving a new private data set from the first private data set and the second private data set, wherein the new private data set comprises a portion of the first private data set merged with a portion of the second private data set, and wherein the new private data set resides in the data repository; making the new private data set available in a marketplace; establishing at least one entitlement for accessing the new private data set via the marketplace; and controlling access to the new private data set based on the at least one entitlement such that access to the portion of the first private data set included in the new private data set is associated with the first access condition and access to the portion of the second private data set included in the new private data set is associated with the second access condition, wherein controlling access to the new private data set comprises requesting at least one encryption key from an encryption key repository that comprises a plurality of encryption keys corresponding to the plurality of private data sets. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-program product for use at a computer system, the computer-program product comprising one or more computer storage devices having stored thereon computer-executable instructions that, when executed at a processor, cause the computer system to perform a method, including the following:
-
access a first private data set in a data repository, wherein the first private data set is associated with a first access condition and is associated with a first data provider, and wherein the data repository comprises a plurality of private data sets corresponding to different data providers; access a second private data set in the data repository, wherein the second private data set is associated with a second access condition, wherein the second private data set is associated with a second data provider different from the first data provider, and wherein the second private data set is maintained separately from and outside of the first private data set; derive a new private data set from the first private data set and the second private data set, wherein the new private data set comprises a portion of the first private data set transformed with a portion of the second private data set, and wherein the new private data set resides in the data repository; make the new private data set available for remote access through a marketplace; establish at least one entitlement for accessing the new private data set via the marketplace; and control remote access to the new private data set through the marketplace based on the at least one entitlement such that access to the portion of the first private data set included in the new private data set is associated with the first access condition and access to the portion of the second private data set included in the new private data set is associated with the second access condition, wherein controlling access to the new private data set comprises requesting at least one encryption key from an encryption key repository that comprises a plurality of encryption keys corresponding to the plurality of private data sets. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification