Systems and methods of precision sharing of big data
First Claim
1. At least one non-transitory computer-readable storage medium storing instructions that, when executed by at least one processor, cause the at least one processor to:
- receive, from a requestor, a requestor query job comprising;
a requestor query step comprising a requestor map step and a requestor reduce step; and
a set of requestor attributes, wherein the set of requestor attributes defines access permission with respect to one or more data sources;
identify a data source based on the set of requestor attributes;
prefix the requestor query job with a query modifier associated with the identified data source, the query modifier comprising;
a requestor filter; and
a data source query modifier step comprising a data source map step and a data source reduce step;
verify that the requestor is authorized to access data elements from the data source based on the requestor filter and set of requestor attributes;
execute, in response to verifying the requestor, the data source map step and the data source reduce step on the data elements from the data source to produce a requestor modifier output;
execute the requestor map step and the requestor reduce step using the requestor modifier output to produce a requestor output;
wherein the requestor attributes includes a certified attribute, and wherein the verify instruction comprises verifying that the requestor is authorized to access data elements from the data source based on the certified attribute and the requestor filter.
1 Assignment
0 Petitions
Accused Products
Abstract
An ecosystem that allows fine-grained multi-party control over access to information stored in one or more data sources of a data provider. A requesting party can submit a query job to the data provider. Resellers in the chain can introduce their own query modifiers to the query job, adding additional data access, data transformation and segmentation functions to the query job. The data provider can append its own query modifier to the query job and execute the query job with all of the query modifiers. Access control for each link in the chain is checked before the query modifier for the link is executed. After execution of all query modifiers and the query job, the results can be provided to the requesting party.
-
Citations
12 Claims
-
1. At least one non-transitory computer-readable storage medium storing instructions that, when executed by at least one processor, cause the at least one processor to:
-
receive, from a requestor, a requestor query job comprising;
a requestor query step comprising a requestor map step and a requestor reduce step; and
a set of requestor attributes, wherein the set of requestor attributes defines access permission with respect to one or more data sources;identify a data source based on the set of requestor attributes; prefix the requestor query job with a query modifier associated with the identified data source, the query modifier comprising;
a requestor filter; and
a data source query modifier step comprising a data source map step and a data source reduce step;verify that the requestor is authorized to access data elements from the data source based on the requestor filter and set of requestor attributes; execute, in response to verifying the requestor, the data source map step and the data source reduce step on the data elements from the data source to produce a requestor modifier output; execute the requestor map step and the requestor reduce step using the requestor modifier output to produce a requestor output; wherein the requestor attributes includes a certified attribute, and wherein the verify instruction comprises verifying that the requestor is authorized to access data elements from the data source based on the certified attribute and the requestor filter. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
Specification