Abstract:
When a user of an interface system defines a workflow, the interface system transmits a notification to a user that is to perform the first step of the workflow. When the user requests to initiate the step of the workflow, the interface system creates a transaction for the workflow step. The user signs the transaction using a cryptographic key pair. The interface system receives the signed transaction and verifies the signature. Once the signature is verified, the step can be performed. The interface system forwards the transaction to a data storage system for storing. For performing the next step in the workflow, the data storage system identifies the user that is to perform the next workflow step. The data storage system creates a notification that identifies the user and the notification is provided to the user. The process repeats until each step of the workflow is performed.
Abstract:
A prediction consensus system receives predicted event values for an event. The predicted event values are generated by various computer models that may have different training schemes and input data. The prediction consensus system generates a consensus value based on the predicted event values after excluding outliers. Outliers are determined among the predicted event values based on statistical measures of the predicted event values as well as observed event values. The predicted event values that appear to be outliers based on the predicted statistical measures may nonetheless be included when they are within the observed statistical measures. This ensures the predicted event values used in the consensus values are not unduly biased towards other predicted event values. Similarly, the identification of event values as accepted or an outlier may be returned as training data for retraining the computer models that generated the predicted event values.
Abstract:
A data storage system creates a data signature for a data element that is to be stored by hashing the data element. The data storage system also creates a sequence signature for the data element and stores the sequence signature in a signature database. The sequence signature is created using the data signature of the data element and the previous sequence signature stored in the signature database. The data storage system transmits a copy of the sequence signature to an anchor system. The anchor system stores the copy as an export anchor and creates an import anchor based on the export anchor and information associated with the present time. The anchor system stores the import anchor and transmits a copy to the data storage system. An audit system uses the export anchor and import anchor to determine whether data stored by the data storage system has been modified.
Abstract:
An event lineage system receives events related to processing a transaction. When event data is received, the event lineage system evaluates a set of lineage rules to generate one or more link signatures to link and associate the event with additional events. When another event related to the transaction occurs, a corresponding lineage rule is applied to that event which generates a link signature to match the prior link signature. To map between events with different schemas, the lineage rules define which event data to use for generating a signature and an ordering of that event data, such that the resulting link signatures are consistent across different schemas and events.
Abstract:
A data structure includes data that allows specific users to access data items that are part of the data structure and allows the users to store data items in association with the data structure. The data structure includes a root node which is the genesis of the data structure. The data structure further includes an access node for each user granted access rights to the data structure. An access node granting a user access rights to the data structure is directly connected to the root node. For a user whose access rights to the data structure are revoked, the data structure includes an additional access node directly connected to the access node that gave the user access rights. The data structure also includes a record node for each data item that is part of the data structure. Each record node is connected to the root node directly or indirectly.
Abstract:
In processing a transaction, a data storage system of a processing system stores and updates a progression created for the transaction that represents a timeline of events that occurred related to the transaction. A progression for a transaction that is processed across multiple processing systems is organized as a chronological chain of segments. Each segment in the progression includes records for events processed by a given processing system prior to the transaction reaching an intermediate state or a terminal state. When the transaction reaches a terminal state, the segmented progression includes records associated with all of the events that occurred in relation to the transaction across multiple processing systems. A segment in the progression is cryptographically linked to a previous segment in the progression using a linking object that includes a transaction signature of the last record stored in the previous segment.
Abstract:
A data integrity system generates a transaction signature associated with a transaction based on transaction data received from a data producer. The transaction signature is unique to the transaction and is generated by applying a hash function to the transaction data. When the transaction data is to be transmitted to a data consumer, the data, integrity system redacts the transaction data based on permission information associated with the data, consumer and transmits the redacted transaction data to the data consumer. To enable the data consumer to verify the integrity of the received data, the data integrity system also transmits a cryptographic assurance that includes at least the transaction signature associated with the transaction. The data consumer verifies the integrity of the received data by independently generating a transaction signature based on the redacted transaction data and matching the independently generated signature with the transaction signature in the cryptographic assurance.
Abstract:
A data integrity system generates a transaction signature associated with a transaction based on transaction data received from a data producer. The transaction signature is unique to the transaction and is generated by applying a hash function to the transaction data. When the transaction data is to be transmitted to a data consumer, the data, integrity system redacts the transaction data based on permission information associated with the data, consumer and transmits the redacted transaction data to the data consumer. To enable the data consumer to verify the integrity of the received data, the data integrity system also transmits a cryptographic assurance that includes at least the transaction signature associated with the transaction. The data consumer verifies the integrity of the received data by independently generating a transaction signature based on the redacted transaction data and matching the independently generated signature with the transaction signature in the cryptographic assurance.
Abstract:
In processing a transaction, a data storage system of a processing system stores and updates a progression created for the transaction that represents a timeline of events that occurred related to the transaction. When an event for a transaction occurs, the data storage system identifies data associated with the event. The data storage system creates an event signature for the event by hashing together the identified data. The data storage system identifies a stored progression of the transaction. The data storage system identifies a transaction signature included in the last record added to the progression. The data storage system creates a transaction signature for the event based on the transaction signature of the last record and the event signature created for the event. The data storage system adds a new record to the progression for the event and includes the transaction signature created for the event in the new record.
Abstract:
A data storage system creates a data signature for a data element that is to be stored by hashing the data element. The data storage system also creates a sequence signature for the data element and stores the sequence signature in a signature database. The sequence signature is created using the data signature of the data element and the previous sequence signature stored in the signature database. The data storage system transmits a copy of the sequence signature to an anchor system. The anchor system stores the copy as an export anchor and creates an import anchor based on the export anchor and information associated with the present time. The anchor system stores the import anchor and transmits a copy to the data storage system. An audit system uses the export anchor and import anchor to determine whether data stored by the data storage system has been modified.