SECURITY SYSTEMS AND METHODS FOR USE WITH STRUCTURED AND UNSTRUCTURED DATA
First Claim
Patent Images
1. A method of publishing authenticated health care data, the method comprising a computer having a computer readable medium having stored thereon non-transitory instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
- providing a health care record including a first data item and a second data item;
using tag-level encryption to encode a first metadata to the first data item and a second metadata to the second data item, wherein the encoding of the first metadata and the second metadata are different;
authenticating the first metadata item for the first data item and the second metadata item for the second data item;
aggregating the first data item in a first data pool based at least in part on the first metadata;
aggregating the second data item in a second data pool based at least in part on the second metadata;
expressing a relationship between the first data item and the second data item in a file external to the first data pool and the second data pool; and
syndicating the data.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed herein are systems and methods including hardware, software and electronic service components and systems to provide large-scale, reliable, and secure foundations for distributed databases and content management systems combining unstructured and structured data, and allowing post-input reorganization to achieve a high degree of flexibility.
405 Citations
25 Claims
-
1. A method of publishing authenticated health care data, the method comprising a computer having a computer readable medium having stored thereon non-transitory instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
-
providing a health care record including a first data item and a second data item; using tag-level encryption to encode a first metadata to the first data item and a second metadata to the second data item, wherein the encoding of the first metadata and the second metadata are different; authenticating the first metadata item for the first data item and the second metadata item for the second data item; aggregating the first data item in a first data pool based at least in part on the first metadata; aggregating the second data item in a second data pool based at least in part on the second metadata; expressing a relationship between the first data item and the second data item in a file external to the first data pool and the second data pool; and syndicating the data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for publishing data within aggregated data pools, the method comprising a computer having a computer readable medium having stored thereon instructions which, when executed by a processor of the computer, causes the processor to perform the steps of:
-
providing a record including a first data item and a second data item; using tag-level encryption to encode a first metadata to the first data item and a second metadata to the second data item, wherein the encoding of the first metadata and the second metadata are different; authenticating the first metadata item for the first data item and the second metadata item for the second data item using a security function; aggregating the first data item in a first data pool based at least in part on the first metadata; aggregating the second data item in a second data pool based at least in part on the second metadata; expressing a relationship between the first data item and the second data item in a file external to the first data pool and the second data pool; and syndicating the data. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of anonymous publication, comprising:
-
storing data into a plurality of data storage facilities; authenticating an identity of the entity storing the data; de-identifying the data; and syndicating the data. - View Dependent Claims (22, 23, 24, 25)
-
Specification