WO2020061812A1 - Method and system for data exchange - Google Patents

Method and system for data exchange Download PDF

Info

Publication number
WO2020061812A1
WO2020061812A1 PCT/CN2018/107608 CN2018107608W WO2020061812A1 WO 2020061812 A1 WO2020061812 A1 WO 2020061812A1 CN 2018107608 W CN2018107608 W CN 2018107608W WO 2020061812 A1 WO2020061812 A1 WO 2020061812A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
data exchange
exchange platform
organization
computer system
Prior art date
Application number
PCT/CN2018/107608
Other languages
French (fr)
Inventor
Mengke YANG
Chuan Liang
Cunsheng LIU
Original Assignee
Beijing Didi Infinity Technology And Development Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Didi Infinity Technology And Development Co., Ltd. filed Critical Beijing Didi Infinity Technology And Development Co., Ltd.
Priority to PCT/CN2018/107608 priority Critical patent/WO2020061812A1/en
Publication of WO2020061812A1 publication Critical patent/WO2020061812A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Definitions

  • the present disclosure relates to computer technologies, more particularly, to methods and systems for data exchange.
  • a financial institution may use information systems to store and manage data regarding its customers.
  • the financial institution may utilize the stored data to determine, for example, the creditworthiness of a particular customer or the risk associated with a particular activity.
  • Embodiments of the disclosure disclose a computer-implemented data exchange method.
  • the method may include providing, to a data exchange platform, a submission of organizational data representing a first organization.
  • the method may also include providing, to the data exchange platform, a submission of enterprise data.
  • the method may further include receiving, from the data exchange platform, an event indicating a request from a computer system of a second organization seeking access to the enterprise data. Additionally, the method may include preparing a response to the computer system of the second organization according to the received event.
  • the method may further include establishing a communication channel with the computer system of the second organization to provide the response.
  • Embodiments of the disclosure further disclose a computer-implemented data exchange method.
  • the method may include searching on a data exchange platform to determine whether a computer system of an organization participating on the data exchange platform has relevant information.
  • the method may also include sending, to the data exchange platform, an event indicating a request to access the relevant information.
  • the method may further include receiving, from the computer system of the organization participating on the data exchange platform, a response prepared according to the event. Additionally, the method may include sending, to the data exchange platform, a report indicating a quality of the response received.
  • Embodiments of the disclosure further disclose a computer-implemented data exchange method.
  • the method may include receiving, by a data exchange platform, a submission of organizational data from a first communication interface serving a first organization.
  • the method may also include receiving, by the data exchange platform, a submission of enterprise data from the first communication interface.
  • the method may further include facilitating a search of the organizational data and the enterprise data on the data exchange platform.
  • the method may include receiving, by the data exchange platform from a second communication interface serving a second organization, an event indicating a request to access the enterprise data.
  • the method may further include informing the first communication interface of the received event and requesting the first communication interface to prepare a response to the second communication interface according to the received event.
  • FIG. 1 illustrates a schematic diagram of a data exchange system according to an exemplary embodiment of the disclosure.
  • FIG. 2 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
  • FIG. 3 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
  • FIG. 4 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
  • FIG. 1 illustrates a schematic diagram of a data exchange system 100 according to an exemplary embodiment of the present disclosure.
  • system 100 may include a first computer system 102 of a first organization and a second computer system 104 of a second organization.
  • the first organization may share data with other organizations, e.g., the second organization, via a data exchange platform 106.
  • first computer system 102 may include a communication interface 108 configured to interact with data exchange platform 106, a processor 110, and a memory 112.
  • Second computer system 104 may include a communication interface 114 configured to interact with data exchange platform 106, a processor 116, and a memory 118.
  • data exchange platform 106 may be implemented in computer systems 102 and 104 using a blockchain technology.
  • a blockchain may be a growing list of records (e.g., transactions) which are linked using cryptography.
  • a record is also referred to as a block.
  • data exchange platform 106 may be implemented using one or more servers separate from computer systems 102 and 104.
  • the servers may be arranged in a distributed manner or at a same location.
  • first computer system 102 may be configured to submit data that first organization is willing to share to data exchange platform 106 via communication interface 108.
  • processor 110 of first computer system 102 may be configured to submit data that first organization is willing to share to data exchange platform 106 via communication interface 108.
  • processor 110 may submit, in a step S1, organizational data regarding the first organization.
  • organizational data may include, for example, a name of the organization, a brief description of the organization, one or more identifiers associated with the organization, and/or any additional information the organization is willing to share on data exchange platform 106.
  • processor 110 may submit the organizational data according to a preestablished data format so that the organizational data is searchable and readily accessible to other organizations (e.g., the second organization) participating in system 100.
  • Processor 110 may also submit, in a step S2, enterprise data that the first organization is willing to share with other organizations participating in system 100.
  • enterprise data may include, for example, transactional or analytical data that is privately owned by the first organization (e.g., transactions conducted by the customers of the first organization and their credit ratings or the like) .
  • first organization may be willing to share such data with other organizations participating in system 100 in exchange for access to data shared by the other organizations.
  • system 100 may implement one or more incentive programs to promote active data exchange amongst organizations participating in system 100.
  • communication interface 108 may process the enterprise data submitted by processor 110 before submission to data exchange platform 106.
  • communication interface 108 may, in a step S3, process the enterprise data to generate one or more data units according to preestablished data processing rules, which may be preestablished according to a certain industry practice. For example, if it is an industry practice, e.g., in the banking industry, to use the combination of a customer identifier, a company identifier, and a data type to uniquely identify a personal record, communication interface 108 may be configured to process the enterprise data and generate one or more data units searchable based on customer identifiers, company identifiers, and data types.
  • communication interface 108 may be configured to process the enterprise data and generate one or more data units with their corresponding credit and debt lists. It is to be understood that communication interface 108 may be configured to process the enterprise data according to other types of data processing rules without departing from the spirit and scope of the present disclosure.
  • Communication interface 108 may also be configured to create a searchable abstract for each data unit generated. It is contemplated that various types of data abstraction techniques may be utilized. For example, a detailed credit list included in a data unit may be abstracted into a total credit amount. Similarly, a detailed debt list included in a data unit may be abstracted into a total debt amount. It is contemplated that creating such abstractions may allow other organizations participating in system 100 to only view and search enterprise data submitted by the first organization at the abstract level, effectively preventing them from accessing detailed data units generated by the first organization without acquiring permissions to do so.
  • first computer system 102 may configure its communication interface 108 to only submit the searchable abstracts to data exchange platform 106 and keep the detailed data units private, e.g., stored in memory 112.
  • each submitted searchable abstract may be associated with a reference to its underline data units, e.g., expressed in terms of a hash function or the like. Such a reference may be utilized to help lookup or retrieve the underline data unit if needed. Alternatively and/or additionally, such a reference may be utilized to verify that a given searchable abstract is indeed the abstraction of a given data unit.
  • first computer system 102 may configure its communication interface 108 to submit both the searchable abstracts and the underline data units to data exchange platform 106. If confidentiality is not a concern, first computer system 102 may submit the underline data units to data exchange platform 106 unencrypted. On the other hand, if confidentiality is a concern, first computer system 102 may configure its communication interface 108 to encrypt the underline data units before submission. It is contemplated that various types of encryption techniques may be utilized without departing from spirit and scope of the present disclosure. Alternatively and/or additionally, first computer system 102 may use communication interface 108 to transform certain data units before submission to avoid revealing certain information, e.g., sensitive information, contained therein.
  • communication interface 108 may be configured to apply a hash function (e.g., a Secure Hash Algorithm 2, or SHA-2 hash function such as SHA-256 or the like) to certain data units prior to submission to data exchange platform 106.
  • a hash function e.g., a Secure Hash Algorithm 2, or SHA-2 hash function such as SHA-256 or the like
  • data exchange platform 106 may implement various techniques to facilitate data exchange amongst the organizations participating in system 100.
  • data exchange platform 106 may be implemented using a blockchain technology, which can be a public blockchain, a private blockchain, or a consortium blockchain. It is contemplated that a public blockchain implementation may allow any network node to join the blockchain.
  • a private blockchain implementation may be controlled by a single administrator and may only send invitations to selected network nodes as participants may have limited access.
  • a consortium blockchain instead of being controlled by a single administrator, can be operated by a group of organizations.
  • data exchange platform 106 may be implemented in computer systems 102 and 104 operated by a group of organizations, such as financial institutions or the like, using a consortium blockchain.
  • the consortium blockchain may be configured to execute a smart contract.
  • data exchange platform 106 may help secure the data submitted by the participating organizations while allowing efficient data exchange amongst the participating organizations. It is contemplated that having the abilities to exchange data with other organizations participating in system 100 may be appreciated for various reasons. For example, suppose the second organization is currently processing a loan application for a customer, the second organization may utilize second computer system 104 to conduct a search on data exchange platform 106 to determine, in a step S4, whether other organizations participating in system 100 have relevant information about that particular customer. In some embodiments, system 100 may be configured to allow second computer system 104 to only search the searchable abstracts submitted by other organizations.
  • the second organization may send additional inquiries to data exchange platform 106 and request access to more detailed information, such as the underline data unit, associated with the searchable abstract.
  • second computer system 104 may further determine, in a step S5, whether to send the access request based on the organizational data submitted by first computer system 102. For example, if the organizational data submitted by first computer system 102 indicates that the first organization is a well-established financial institution who has a track record of providing credible information to other organizations via data exchange platform 106, second computer system 104 may determine that it is worthwhile to send the access request. On the other hand, if the organizational data submitted by first computer system 102 indicates that the first organization is a newly formed entity with no established track record of providing credible information to other organizations via data exchange platform 106, second computer system 104 may choose not to send the access request.
  • whether to send the access request may be determined based on various other factors without departing from the spirit and scope of the present disclosure. For example, if system 100 is configured so that each access request is associated with a certain cost, that cost may be factored into the determination in step S5. In another example, suppose that the search conducted by second computer system 104 in step S4 indicates that another organization also has relevant information about the particular customer, second computer system 104 may weigh the various factors (e.g., cost, credibility, name recognition, etc. ) associated with first organization and the other organization and determine whether to request access to detailed information from either one or both organizations.
  • factors e.g., cost, credibility, name recognition, etc.
  • second computer system 104 may proceed to a step S6, generate a data exchange request, and send the data exchange request to communication interface 114.
  • Communication interface 114 may in turn create a data exchange event in a step S7 and send the data exchange event to data exchange platform 106.
  • Data exchange platform 106 may inform first computer system 102 once the data exchange event is received and request first computer system 102 to prepare a response to second computer system 104 in a step S8.
  • First computer system 102 may respond to second computer system 104’s request in one of several ways. For example, if a payment is required (e.g., in terms of a monetary value or some forms of credit) , first computer system 102 may reject second computer system 104’s request due to insufficient payment received. In another example, first computer system 102 may reject second computer system 104’s request if providing detailed information to second computer system 104 is deemed to be against the first organization’s interests. First computer system 102 may also reject second computer system 104’s request if providing detailed information to second computer system 104 is prohibited. It is to be understood that first computer system 102 may reject second computer system 104’s request for various other reasons without departing from the spirit and scope of the present disclosure.
  • first computer system 102 may honor second computer system 104’s request and provide the detailed information to second computer system 104. It is contemplated that first computer system 102 may provide the detailed information to second computer system 104 in various manners depending on how first computer system 102 stored its data. For example, if first computer system 102 only submitted searchable abstracts to data exchange platform 106 and kept the detailed information private (e.g., stored in memory 112) , first computer system 102 may retrieve the detailed information from memory 112 and deliver the retrieved information to second computer system 104 in a step S9 via a wired or wireless communication channel 120.
  • first computer system 102 may retrieve the detailed information from memory 112 and deliver the retrieved information to second computer system 104 in a step S9 via a wired or wireless communication channel 120.
  • first computer system 102 may retrieve the detailed information from data exchange platform 106, decrypt the retrieved detailed information, and deliver the decrypted information to second computer system 104 in step S9 via communication channel 120.
  • first computer system 102 may have the option to instruct second computer system 104 to retrieve the detailed information directly from data exchange platform 106. It is to be understood that first computer system 102 may respond to second computer system 104 in various other manners without departing from the spirit and scope of the present disclosure.
  • first computer system 102 may utilize various techniques to establish communication channel 120 with second computer system 104.
  • second computer system 104 may specify a delivery address (e.g., specifying an Internet Protocol address and a port number) in step S7 when it created the data exchange event, allowing first computer system 102 to establish communication channel 120 accordingly based on the specified delivery address.
  • second computer system 104 may specify a delivery address in its organizational data submitted to data exchange platform 106, allowing first computer system 102 to search on data exchange platform 106 for the delivery address of second computer system 104 and establish communication channel 120 accordingly based on the search result.
  • one or more dedicated communication channels 120 may be established to facilitate communications amongst the organizations participating in system 100 without departing from the spirit and scope of the present disclosure.
  • first computer system 102 may utilize various techniques to secure data communicated on communication channel 120.
  • first computer system 102 may establish communication channel 120 based on the Transport Layer Security (TLS) or the Secure Sockets Layer (SSL) protocol.
  • First computer system 102 may also establish communication channel 120 as a Hypertext Transfer Protocol Secure (HTTPS) channel, a HTTPS channel with two-factor authentication enabled, or other types of secure communication channel without departing from the spirt and scope of the present disclosure.
  • HTTPS Hypertext Transfer Protocol Secure
  • HTTPS Hypertext Transfer Protocol Secure
  • HTTPS Hypertext Transfer Protocol Secure
  • HTTPS Hypertext Transfer Protocol Secure
  • second computer system 104 may be configured to verify the authenticity and completeness of data received via communication channel 120. For example, if the searchable abstract identified by second computer system 104 (e.g., in step S4) that prompted the request for the detailed information is associated with a reference to its underline data unit (e.g., expressed in terms of a Hash function as previously described) , second computer system 104 may utilize the reference to determine whether the searchable abstract is indeed an authentic abstraction of the data received via communication channel 120. In some embodiments, second computer system 104 may report its determination to data exchange platform 106. Data exchange platform 106 may log the data exchanged and problems associated with the data exchange (e.g., as reported by second computer system 104) . In some embodiments, data exchange platform 106 may be configured to penalize first computer system 102 for providing incomplete, incorrect, or unauthenticated data.
  • a Hash function e.g., expressed in terms of a Hash function as previously described
  • first organization as a data providing organization
  • second organization may participate in system 100 as a data providing organization
  • first organization may participate in system 100 as a data requesting organization without departing from the spirt and scope of the present disclosure.
  • number of organizations participating in system 100 is not limited to two.
  • each organization may function as a data providing organization providing data to one or more other organizations participating in system 100, and may function as a data requesting organization requesting data from one or more other organizations participating in system 100, without departing from the spirt and scope of the present disclosure.
  • each organization participating in system 100 may participate voluntarily. That is, each organization participating in system 100 may determine what information it is willing to share, share that information on data exchange platform 106, and remove that information from data exchange platform 106 when it no longer wants to share that information.
  • system 100 may implement one or more incentive programs to promote active data exchange amongst the various participating organizations. For example, system 100 may implement a point-based incentive program where system 100 awards each participating organization a certain number of points for each data submission. System 100 may also deduct a certain number of points from a participating organization for conducting a search on data exchange platform 106 and/or for requesting data from another participating organization. In some embodiments, system 100 may credit a data providing organization with a certain number of points for each data exchange carried out through data exchange platform 106. In some embodiments, system 100 may deduct a certain number of points from a data providing organization if the data provided by that data providing organization is reported to be incomplete, incorrect, or unauthenticated. In some embodiments, system 100 may further implement a data quality control mechanism configured to deduct a certain number of points from a data providing organization if the quality of the data provided by that data providing organization is deemed to be unsatisfactory.
  • a data quality control mechanism configured to deduct a certain number of points from a data providing organization
  • FIG. 2 illustrates a flowchart of a computer-implemented data exchange method 200, according to an exemplary embodiment.
  • Method 200 may be implemented in system 100 depicted in FIG. 1, and may be performed by one or more processors utilized to implement data exchange platform 106.
  • the data exchange platform 106 is implemented using a blockchain
  • method 200 may be performed by a processor of first computer system 102 or a processor of second computer system 104.
  • the data exchange platform 106 is implemented using a server separate from first computer system 102 and second computer system 104
  • method 200 may be performed by a processor of the server.
  • the data exchange platform may receive a submission of organizational data from, e.g., the first communication interface of the first computer system.
  • the data exchange platform may receive a submission of enterprise data from the first communication interface.
  • the enterprise data may only include a searchable abstract.
  • the enterprise data may include a data unit that contains detailed information. As described above, the data unit may be encrypted and/or transformed to avoid revealing certain information contained therein.
  • the data exchange platform may facilitate a search by another computer system of another organization, such as the second computer system, on the data exchange platform for the organizational data and the enterprise data submitted by the first computer system.
  • the data exchange platform may be configured to only facilitate the search of the organizational data and the searchable abstract (but not the detailed data unit) . If the second computer system determines that it needs to access the detailed data unit, the second computer system may send an event request through the second communication interface to the data exchange platform.
  • the data exchange platform may receive the event from the second communication interface indicating a request to access the detailed data unit contained in the enterprise data.
  • the data exchange platform may inform the first computer system, through the first communication interface, of the received event and request the first computer system to prepare a response to the second computer system according to the received event.
  • the first computer system may respond to the second computer system in one of several ways. For instance, the first computer system may reject the second computer system’s request for various reasons discussed above. Alternatively, the first computer system may honor the second computer system’s request and provide the detailed data unit to the second computer system.
  • the second computer system may evaluate the response received from the first computer system and provide a report to the data exchange platform indicating the quality (e.g., in terms of authenticity, correctness, completeness, or the like) of the response as previously described.
  • the data exchange platform may implement a blockchain.
  • the submissions of the organizational data and the enterprise data may form a block on the blockchain.
  • the event received from the second communication interface indicating the request to access the enterprise data may also form a block on the blockchain. In this manner, all activities on the blockchain can be tracked.
  • FIG. 3 illustrates a flowchart of a computer-implemented data exchange method 300, according to an exemplary embodiment.
  • Method 300 may be implemented in a first computer system such as computer system 102 (FIG. 1) operated by the first organization.
  • the first computer system provides, to a data exchange platform (e.g., data exchange platform 106 shown in FIG. 1) , submission of organizational data representing the first organization.
  • the first computer system may provide, to the data exchange platform, a submission of enterprise data.
  • the first computer system may receive, from the data exchange platform, an event indicating a request from a second computer system of a second organization seeking access to the enterprise data.
  • the first computer system may prepare a response to the second computer system according to the received event. It is contemplated that method 300 may prepare the response in one of several ways as previously described.
  • the first computer system may establish a communication channel to provide the response to the second computer system.
  • the submission of the enterprise data may include a submission of only a searchable abstract representing the enterprise data.
  • the submission of enterprise data may include a submission of a searchable abstract representing the enterprise data and one or more data units generated based on the enterprise data.
  • the one or more data units may be encrypted or transformed to avoid revealing sensitive information contained therein.
  • FIG. 4 illustrates a flowchart of a computer-implemented data exchange method 400, according to an exemplary embodiment.
  • Method 400 may be implemented in a second computer system such as computer system 104 (FIG. 1) operated by the second organization.
  • the second computer system may search on a data exchange platform (e.g., data exchange platform 106 shown in FIG. 1) to determine whether another computer system of another organization (e.g., computer system 102 of the first organization) participating on the data exchange platform has relevant information that the second computer system wants to access.
  • the second computer system may send an event indicating a request to access the relevant information to the data exchange platform.
  • the search conducted in step 402 may be conducted on searchable abstracts without being provided access to the details of the relevant information. If an abstract of interest is identified by the search in step 402, a request to access the details of the relevant information corresponding to that abstract of interest may be generated in step 404 and a corresponding event may be created and communicated to the data exchange platform.
  • the data exchange platform may inform the first computer system of the first organization of the received event and request the first computer system of the first organization to prepare a response to the second computer system of the second organization according to the received event.
  • the second computer system may receive, from the first computer system, a response prepared according to the event.
  • the second computer system may evaluate the response received from the first computer system and send a report to the data exchange platform indicating the quality (e.g., in terms of authenticity, correctness, completeness, or the like) of the response received.
  • the second computer system may determine whether the abstract of interest identified by the search in step 402 is an authentic abstraction of the detailed data contained in the response received.
  • the data exchange platform may utilize the reported quality information in conjunction with one or more incentive programs as described above to promote active data exchange and improve overall quality of data shared on the data exchange platform.
  • Embodiments of the disclosure can further provide a non-transitory computer-readable medium storing instructions which, when executed, cause one or more processors to perform the methods, as discussed above.
  • the computer-readable medium may include volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other types of computer-readable medium or computer-readable storage devices.
  • the computer-readable medium may be the storage device or the memory module having the computer instructions stored thereon, as disclosed.
  • the computer-readable medium may be a disc or a flash drive having the computer instructions stored thereon.
  • the disclosed embodiments may be implemented in a system, a method, and/or a computer program product.
  • the computer program product may include a communication interface, one or more processors, and one or more memories.
  • the communication interface may include a wired communication interface, a network-based communication interface, a wireless communication interface, a cellular communication interface, a radio communication interface, a satellite communication interface, or the like.
  • the processors may include one or more dedicated processing units, application-specific integrated circuits (ASICs) , field-programmable gate arrays (FPGAs) , or various other types of processors or processing units.
  • the memories may be implemented as any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM) , an electrically erasable programmable read-only memory (EEPROM) , an erasable programmable read-only memory (EPROM) , a programmable read-only memory (PROM) , a read-only memory (ROM) , a magnetic memory, a flash memory, or a magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory a magnetic memory
  • flash memory or a magnetic or optical disk.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Data exchange systems and methods are disclosed. An exemplary data exchange method may include providing, to a data exchange platform, a submission of organizational data representing a first organization. The method may also include providing, to the data exchange platform, a submission of enterprise data. The method may further include receiving, from the data exchange platform, an event indicating a request from a computer system of a second organization seeking access to the enterprise data. Additionally, the method may include preparing a response to the computer system of the second organization according to the received event. The method may further include establishing a communication channel with the computer system of the second organization to provide the response.

Description

METHOD AND SYSTEM FOR DATA EXCHANGE TECHNICAL FIELD
The present disclosure relates to computer technologies, more particularly, to methods and systems for data exchange.
BACKGROUND
Many organizations use information systems to support their operations, management, and decision-making processes. For example, a financial institution may use information systems to store and manage data regarding its customers. The financial institution may utilize the stored data to determine, for example, the creditworthiness of a particular customer or the risk associated with a particular activity.
Currently, organizations tend to manage their own data and may have limited ability to share/exchange data with other organizations. Technologies available to facilitate data exchange tend to rely on centralized data processing centers, which can be costly and inefficient.
SUMMARY
Embodiments of the disclosure disclose a computer-implemented data exchange method. The method may include providing, to a data exchange platform, a submission of organizational data representing a first organization. The method may also include providing, to the data exchange platform, a submission of enterprise data. The method may further include receiving, from the data exchange platform, an event indicating a request from a computer system of a second organization seeking access to the enterprise data. Additionally, the method may include preparing a response to the computer system of the second organization according to the received event. The method may further include establishing a communication channel with the computer system of the second organization to provide the response.
Embodiments of the disclosure further disclose a computer-implemented data exchange method. The method may include searching on a data exchange platform to determine whether a computer system of an organization participating on the data exchange platform has relevant information. The method may also include sending, to the data exchange platform, an event indicating a request to access the relevant information. The method may further include receiving, from the computer system of the organization  participating on the data exchange platform, a response prepared according to the event. Additionally, the method may include sending, to the data exchange platform, a report indicating a quality of the response received.
Embodiments of the disclosure further disclose a computer-implemented data exchange method. The method may include receiving, by a data exchange platform, a submission of organizational data from a first communication interface serving a first organization. The method may also include receiving, by the data exchange platform, a submission of enterprise data from the first communication interface. The method may further include facilitating a search of the organizational data and the enterprise data on the data exchange platform. Additionally, the method may include receiving, by the data exchange platform from a second communication interface serving a second organization, an event indicating a request to access the enterprise data. The method may further include informing the first communication interface of the received event and requesting the first communication interface to prepare a response to the second communication interface according to the received event.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a schematic diagram of a data exchange system according to an exemplary embodiment of the disclosure.
FIG. 2 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
FIG. 3 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
FIG. 4 illustrates a flowchart of a data exchange method according to an exemplary embodiment of the disclosure.
DETAILED DESCRIPTION
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
FIG. 1 illustrates a schematic diagram of a data exchange system 100 according to an exemplary embodiment of the present disclosure. Referring to FIG. 1, system 100 may include a first computer system 102 of a first organization and a second computer system 104 of a second organization. The first organization may share data with other organizations, e.g., the second organization, via a data exchange platform 106. In some embodiments, first computer system 102 may include a communication interface 108 configured to interact with data exchange platform 106, a processor 110, and a memory 112. Second computer system 104 may include a communication interface 114 configured to interact with data exchange platform 106, a processor 116, and a memory 118.
In exemplary embodiments, data exchange platform 106 may be implemented in  computer systems  102 and 104 using a blockchain technology. A blockchain may be a growing list of records (e.g., transactions) which are linked using cryptography. A record is also referred to as a block.
In exemplary embodiments, data exchange platform 106 may be implemented using one or more servers separate from  computer systems  102 and 104. For example, the servers may be arranged in a distributed manner or at a same location.
Also shown in FIG. 1 are exemplary process steps performed by first computer system 102 and second computer system 104 to facilitate the data exchange. For example, processor 110 of first computer system 102 may be configured to submit data that first organization is willing to share to data exchange platform 106 via communication interface 108.
In some embodiments, processor 110 may submit, in a step S1, organizational data regarding the first organization. Such organizational data may include, for example, a name of the organization, a brief description of the organization, one or more identifiers associated with the organization, and/or any additional information the organization is willing to share on data exchange platform 106. In some embodiments, processor 110 may submit the organizational data according to a preestablished data format so that the organizational data is searchable and readily accessible to other organizations (e.g., the second organization) participating in system 100.
Processor 110 may also submit, in a step S2, enterprise data that the first organization is willing to share with other organizations participating in system 100. Such enterprise data may include, for example, transactional or analytical data that is privately owned by the first organization (e.g., transactions conducted by the customers of the first organization and their credit ratings or the like) . It is contemplated that first organization  may be willing to share such data with other organizations participating in system 100 in exchange for access to data shared by the other organizations. It is also contemplated that system 100 may implement one or more incentive programs to promote active data exchange amongst organizations participating in system 100.
In some embodiments, communication interface 108 may process the enterprise data submitted by processor 110 before submission to data exchange platform 106. For example, communication interface 108 may, in a step S3, process the enterprise data to generate one or more data units according to preestablished data processing rules, which may be preestablished according to a certain industry practice. For example, if it is an industry practice, e.g., in the banking industry, to use the combination of a customer identifier, a company identifier, and a data type to uniquely identify a personal record, communication interface 108 may be configured to process the enterprise data and generate one or more data units searchable based on customer identifiers, company identifiers, and data types. In another example, if it is an industry practice, e.g., in the lending industry, to include a credit list and a debt list for each customer, communication interface 108 may be configured to process the enterprise data and generate one or more data units with their corresponding credit and debt lists. It is to be understood that communication interface 108 may be configured to process the enterprise data according to other types of data processing rules without departing from the spirit and scope of the present disclosure.
Communication interface 108 may also be configured to create a searchable abstract for each data unit generated. It is contemplated that various types of data abstraction techniques may be utilized. For example, a detailed credit list included in a data unit may be abstracted into a total credit amount. Similarly, a detailed debt list included in a data unit may be abstracted into a total debt amount. It is contemplated that creating such abstractions may allow other organizations participating in system 100 to only view and search enterprise data submitted by the first organization at the abstract level, effectively preventing them from accessing detailed data units generated by the first organization without acquiring permissions to do so.
In some embodiments, first computer system 102 may configure its communication interface 108 to only submit the searchable abstracts to data exchange platform 106 and keep the detailed data units private, e.g., stored in memory 112. In some embodiments, each submitted searchable abstract may be associated with a reference to its underline data units, e.g., expressed in terms of a hash function or the like. Such a reference may be utilized to help lookup or retrieve the underline data unit if needed. Alternatively and/or additionally,  such a reference may be utilized to verify that a given searchable abstract is indeed the abstraction of a given data unit.
In some embodiments, first computer system 102 may configure its communication interface 108 to submit both the searchable abstracts and the underline data units to data exchange platform 106. If confidentiality is not a concern, first computer system 102 may submit the underline data units to data exchange platform 106 unencrypted. On the other hand, if confidentiality is a concern, first computer system 102 may configure its communication interface 108 to encrypt the underline data units before submission. It is contemplated that various types of encryption techniques may be utilized without departing from spirit and scope of the present disclosure. Alternatively and/or additionally, first computer system 102 may use communication interface 108 to transform certain data units before submission to avoid revealing certain information, e.g., sensitive information, contained therein. For example, in some embodiments, communication interface 108 may be configured to apply a hash function (e.g., a Secure Hash Algorithm 2, or SHA-2 hash function such as SHA-256 or the like) to certain data units prior to submission to data exchange platform 106.
It is contemplated that data exchange platform 106 may implement various techniques to facilitate data exchange amongst the organizations participating in system 100. In some embodiments, data exchange platform 106 may be implemented using a blockchain technology, which can be a public blockchain, a private blockchain, or a consortium blockchain. It is contemplated that a public blockchain implementation may allow any network node to join the blockchain. A private blockchain implementation, on the other hand, may be controlled by a single administrator and may only send invitations to selected network nodes as participants may have limited access. A consortium blockchain, instead of being controlled by a single administrator, can be operated by a group of organizations. In some embodiments, data exchange platform 106 may be implemented in  computer systems  102 and 104 operated by a group of organizations, such as financial institutions or the like, using a consortium blockchain. In some embodiments, the consortium blockchain may be configured to execute a smart contract.
It is contemplated that implementing data exchange platform 106 as a blockchain may help secure the data submitted by the participating organizations while allowing efficient data exchange amongst the participating organizations. It is contemplated that having the abilities to exchange data with other organizations participating in system 100 may be appreciated for various reasons. For example, suppose the second organization is currently  processing a loan application for a customer, the second organization may utilize second computer system 104 to conduct a search on data exchange platform 106 to determine, in a step S4, whether other organizations participating in system 100 have relevant information about that particular customer. In some embodiments, system 100 may be configured to allow second computer system 104 to only search the searchable abstracts submitted by other organizations. If the second organization determines that the first organization indeed has relevant information about a particular customer (e.g., based on matching customer identifiers or company identifiers and the like) , the second organization, using computer system 104, may send additional inquiries to data exchange platform 106 and request access to more detailed information, such as the underline data unit, associated with the searchable abstract.
In some embodiments, second computer system 104 may further determine, in a step S5, whether to send the access request based on the organizational data submitted by first computer system 102. For example, if the organizational data submitted by first computer system 102 indicates that the first organization is a well-established financial institution who has a track record of providing credible information to other organizations via data exchange platform 106, second computer system 104 may determine that it is worthwhile to send the access request. On the other hand, if the organizational data submitted by first computer system 102 indicates that the first organization is a newly formed entity with no established track record of providing credible information to other organizations via data exchange platform 106, second computer system 104 may choose not to send the access request. It is to be understood that whether to send the access request may be determined based on various other factors without departing from the spirit and scope of the present disclosure. For example, if system 100 is configured so that each access request is associated with a certain cost, that cost may be factored into the determination in step S5. In another example, suppose that the search conducted by second computer system 104 in step S4 indicates that another organization also has relevant information about the particular customer, second computer system 104 may weigh the various factors (e.g., cost, credibility, name recognition, etc. ) associated with first organization and the other organization and determine whether to request access to detailed information from either one or both organizations.
For illustrative purposes, suppose second computer system 104 decides to request access to detailed information from first computer system 102, second computer system 104 may proceed to a step S6, generate a data exchange request, and send the data exchange request to communication interface 114. Communication interface 114 may in turn create a data exchange event in a step S7 and send the data exchange event to data exchange platform  106. Data exchange platform 106 may inform first computer system 102 once the data exchange event is received and request first computer system 102 to prepare a response to second computer system 104 in a step S8.
First computer system 102 may respond to second computer system 104’s request in one of several ways. For example, if a payment is required (e.g., in terms of a monetary value or some forms of credit) , first computer system 102 may reject second computer system 104’s request due to insufficient payment received. In another example, first computer system 102 may reject second computer system 104’s request if providing detailed information to second computer system 104 is deemed to be against the first organization’s interests. First computer system 102 may also reject second computer system 104’s request if providing detailed information to second computer system 104 is prohibited. It is to be understood that first computer system 102 may reject second computer system 104’s request for various other reasons without departing from the spirit and scope of the present disclosure.
Alternatively, first computer system 102 may honor second computer system 104’s request and provide the detailed information to second computer system 104. It is contemplated that first computer system 102 may provide the detailed information to second computer system 104 in various manners depending on how first computer system 102 stored its data. For example, if first computer system 102 only submitted searchable abstracts to data exchange platform 106 and kept the detailed information private (e.g., stored in memory 112) , first computer system 102 may retrieve the detailed information from memory 112 and deliver the retrieved information to second computer system 104 in a step S9 via a wired or wireless communication channel 120. In another example, if first computer system 102 had already submitted the detailed information to data exchange platform 106, but the submitted detailed information was encrypted, first computer system 102 may retrieve the detailed information from data exchange platform 106, decrypt the retrieved detailed information, and deliver the decrypted information to second computer system 104 in step S9 via communication channel 120. In still another example, if first computer system 102 submitted the detailed information to data exchange platform 106 unencrypted, first computer system 102 may have the option to instruct second computer system 104 to retrieve the detailed information directly from data exchange platform 106. It is to be understood that first computer system 102 may respond to second computer system 104 in various other manners without departing from the spirit and scope of the present disclosure.
It is also to be understood that first computer system 102 may utilize various techniques to establish communication channel 120 with second computer system 104. For  example, second computer system 104 may specify a delivery address (e.g., specifying an Internet Protocol address and a port number) in step S7 when it created the data exchange event, allowing first computer system 102 to establish communication channel 120 accordingly based on the specified delivery address. In another example, second computer system 104 may specify a delivery address in its organizational data submitted to data exchange platform 106, allowing first computer system 102 to search on data exchange platform 106 for the delivery address of second computer system 104 and establish communication channel 120 accordingly based on the search result. Alternatively and/or additionally, it is contemplated that one or more dedicated communication channels 120 may be established to facilitate communications amongst the organizations participating in system 100 without departing from the spirit and scope of the present disclosure.
It is also contemplated that first computer system 102 may utilize various techniques to secure data communicated on communication channel 120. For example, first computer system 102 may establish communication channel 120 based on the Transport Layer Security (TLS) or the Secure Sockets Layer (SSL) protocol. First computer system 102 may also establish communication channel 120 as a Hypertext Transfer Protocol Secure (HTTPS) channel, a HTTPS channel with two-factor authentication enabled, or other types of secure communication channel without departing from the spirt and scope of the present disclosure. It is further contemplated that various types of encryption techniques may also be utilized without departing from the spirt and scope of the present disclosure.
In some embodiments, second computer system 104 may be configured to verify the authenticity and completeness of data received via communication channel 120. For example, if the searchable abstract identified by second computer system 104 (e.g., in step S4) that prompted the request for the detailed information is associated with a reference to its underline data unit (e.g., expressed in terms of a Hash function as previously described) , second computer system 104 may utilize the reference to determine whether the searchable abstract is indeed an authentic abstraction of the data received via communication channel 120. In some embodiments, second computer system 104 may report its determination to data exchange platform 106. Data exchange platform 106 may log the data exchanged and problems associated with the data exchange (e.g., as reported by second computer system 104) . In some embodiments, data exchange platform 106 may be configured to penalize first computer system 102 for providing incomplete, incorrect, or unauthenticated data.
It is to be understood that while the examples illustrated above depicted the first organization as a data providing organization and the second organization as a data  requesting organization, such a depiction is merely exemplary and is not meant to be limiting. It is contemplated that the second organization may participate in system 100 as a data providing organization and that the first organization may participate in system 100 as a data requesting organization without departing from the spirt and scope of the present disclosure. It is also to be understood that the number of organizations participating in system 100 is not limited to two. It is contemplated that each organization may function as a data providing organization providing data to one or more other organizations participating in system 100, and may function as a data requesting organization requesting data from one or more other organizations participating in system 100, without departing from the spirt and scope of the present disclosure.
It is also contemplated that each organization participating in system 100 may participate voluntarily. That is, each organization participating in system 100 may determine what information it is willing to share, share that information on data exchange platform 106, and remove that information from data exchange platform 106 when it no longer wants to share that information.
In some embodiments, system 100 may implement one or more incentive programs to promote active data exchange amongst the various participating organizations. For example, system 100 may implement a point-based incentive program where system 100 awards each participating organization a certain number of points for each data submission. System 100 may also deduct a certain number of points from a participating organization for conducting a search on data exchange platform 106 and/or for requesting data from another participating organization. In some embodiments, system 100 may credit a data providing organization with a certain number of points for each data exchange carried out through data exchange platform 106. In some embodiments, system 100 may deduct a certain number of points from a data providing organization if the data provided by that data providing organization is reported to be incomplete, incorrect, or unauthenticated. In some embodiments, system 100 may further implement a data quality control mechanism configured to deduct a certain number of points from a data providing organization if the quality of the data provided by that data providing organization is deemed to be unsatisfactory.
FIG. 2 illustrates a flowchart of a computer-implemented data exchange method 200, according to an exemplary embodiment. Method 200 may be implemented in system 100 depicted in FIG. 1, and may be performed by one or more processors utilized to implement data exchange platform 106. For example, if the data exchange platform 106 is  implemented using a blockchain, method 200 may be performed by a processor of first computer system 102 or a processor of second computer system 104. Also for example, if the data exchange platform 106 is implemented using a server separate from first computer system 102 and second computer system 104, method 200 may be performed by a processor of the server.
Referring to FIG. 2, at step 202, the data exchange platform may receive a submission of organizational data from, e.g., the first communication interface of the first computer system. At step 204, the data exchange platform may receive a submission of enterprise data from the first communication interface. In some embodiments, the enterprise data may only include a searchable abstract. Alternatively, the enterprise data may include a data unit that contains detailed information. As described above, the data unit may be encrypted and/or transformed to avoid revealing certain information contained therein.
At step 206, the data exchange platform may facilitate a search by another computer system of another organization, such as the second computer system, on the data exchange platform for the organizational data and the enterprise data submitted by the first computer system. In some embodiments, the data exchange platform may be configured to only facilitate the search of the organizational data and the searchable abstract (but not the detailed data unit) . If the second computer system determines that it needs to access the detailed data unit, the second computer system may send an event request through the second communication interface to the data exchange platform.
At step 208, the data exchange platform may receive the event from the second communication interface indicating a request to access the detailed data unit contained in the enterprise data. At step 210, the data exchange platform may inform the first computer system, through the first communication interface, of the received event and request the first computer system to prepare a response to the second computer system according to the received event. It is contemplated that the first computer system may respond to the second computer system in one of several ways. For instance, the first computer system may reject the second computer system’s request for various reasons discussed above. Alternatively, the first computer system may honor the second computer system’s request and provide the detailed data unit to the second computer system. The second computer system may evaluate the response received from the first computer system and provide a report to the data exchange platform indicating the quality (e.g., in terms of authenticity, correctness, completeness, or the like) of the response as previously described.
In some embodiments, the data exchange platform may implement a blockchain. In some embodiments, the submissions of the organizational data and the enterprise data may form a block on the blockchain. Similarly, the event received from the second communication interface indicating the request to access the enterprise data may also form a block on the blockchain. In this manner, all activities on the blockchain can be tracked.
FIG. 3 illustrates a flowchart of a computer-implemented data exchange method 300, according to an exemplary embodiment. Method 300 may be implemented in a first computer system such as computer system 102 (FIG. 1) operated by the first organization.
Referring to FIG. 3, at step 302, the first computer system provides, to a data exchange platform (e.g., data exchange platform 106 shown in FIG. 1) , submission of organizational data representing the first organization. At step 304, the first computer system may provide, to the data exchange platform, a submission of enterprise data. At step 306, the first computer system may receive, from the data exchange platform, an event indicating a request from a second computer system of a second organization seeking access to the enterprise data. At step 308, the first computer system may prepare a response to the second computer system according to the received event. It is contemplated that method 300 may prepare the response in one of several ways as previously described. Once the response is prepared, at step 310, the first computer system may establish a communication channel to provide the response to the second computer system.
In some embodiments, the submission of the enterprise data may include a submission of only a searchable abstract representing the enterprise data. Alternatively and/or additionally, the submission of enterprise data may include a submission of a searchable abstract representing the enterprise data and one or more data units generated based on the enterprise data. In some embodiments, the one or more data units may be encrypted or transformed to avoid revealing sensitive information contained therein.
FIG. 4 illustrates a flowchart of a computer-implemented data exchange method 400, according to an exemplary embodiment. Method 400 may be implemented in a second computer system such as computer system 104 (FIG. 1) operated by the second organization.
Referring to FIG. 4, at step 402, the second computer system may search on a data exchange platform (e.g., data exchange platform 106 shown in FIG. 1) to determine whether another computer system of another organization (e.g., computer system 102 of the first organization) participating on the data exchange platform has relevant information that the second computer system wants to access. At step 404, the second computer system may send an event indicating a request to access the relevant information to the data exchange platform.  In some embodiments, the search conducted in step 402 may be conducted on searchable abstracts without being provided access to the details of the relevant information. If an abstract of interest is identified by the search in step 402, a request to access the details of the relevant information corresponding to that abstract of interest may be generated in step 404 and a corresponding event may be created and communicated to the data exchange platform.
The data exchange platform may inform the first computer system of the first organization of the received event and request the first computer system of the first organization to prepare a response to the second computer system of the second organization according to the received event. At step 406, the second computer system may receive, from the first computer system, a response prepared according to the event. At step 408, the second computer system may evaluate the response received from the first computer system and send a report to the data exchange platform indicating the quality (e.g., in terms of authenticity, correctness, completeness, or the like) of the response received. For example, in some embodiments, the second computer system may determine whether the abstract of interest identified by the search in step 402 is an authentic abstraction of the detailed data contained in the response received. In some embodiments, the data exchange platform may utilize the reported quality information in conjunction with one or more incentive programs as described above to promote active data exchange and improve overall quality of data shared on the data exchange platform.
As will be appreciated from the above, various types of organizations may voluntarily carry out the data exchange methods and participate in one or more data exchange systems disclosed herein. Embodiments of the disclosure can further provide a non-transitory computer-readable medium storing instructions which, when executed, cause one or more processors to perform the methods, as discussed above. The computer-readable medium may include volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other types of computer-readable medium or computer-readable storage devices. For example, the computer-readable medium may be the storage device or the memory module having the computer instructions stored thereon, as disclosed. In some embodiments, the computer-readable medium may be a disc or a flash drive having the computer instructions stored thereon.
It is to be understood that the disclosed embodiments are not necessarily limited in their application to the details of construction and the arrangement of the components and/or methods set forth in the following description and/or illustrated in the drawings and/or the  examples. The disclosed embodiments are capable of variations, or of being practiced or carried out in various ways.
The disclosed embodiments may be implemented in a system, a method, and/or a computer program product. The computer program product may include a communication interface, one or more processors, and one or more memories. The communication interface may include a wired communication interface, a network-based communication interface, a wireless communication interface, a cellular communication interface, a radio communication interface, a satellite communication interface, or the like. The processors may include one or more dedicated processing units, application-specific integrated circuits (ASICs) , field-programmable gate arrays (FPGAs) , or various other types of processors or processing units. The memories may be implemented as any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM) , an electrically erasable programmable read-only memory (EEPROM) , an erasable programmable read-only memory (EPROM) , a programmable read-only memory (PROM) , a read-only memory (ROM) , a magnetic memory, a flash memory, or a magnetic or optical disk.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed system and related methods. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed system and related methods.
It is intended that the specification and examples be considered as exemplary only, with a true scope being indicated by the following claims and their equivalents.

Claims (20)

  1. A computer-implemented data exchange method, comprising:
    providing, to a data exchange platform, a submission of organizational data representing a first organization;
    providing, to the data exchange platform, a submission of enterprise data;
    receiving, from the data exchange platform, an event indicating a request from a computer system of a second organization seeking access to the enterprise data;
    preparing a response to the computer system of the second organization according to the received event; and
    establishing a communication channel with the computer system of the second organization to provide the response.
  2. The method of claim 1, wherein the submission of enterprise data comprises submitting a searchable abstract representing the enterprise data.
  3. The method of claim 1, wherein the submission of enterprise data comprises submitting a searchable abstract representing the enterprise data and one or more data units generated based on the enterprise data.
  4. The method of claim 3, further comprising encrypting the one or more data units to avoid revealing sensitive information contained therein.
  5. The method of claim 1, wherein preparing the response to the computer system of the second organization according to the received event further comprises at least one of:
    retrieving the enterprise data from a local memory device; or
    retrieving the enterprise data from the data exchange platform.
  6. The method of claim 1, wherein the data exchange platform is implemented using a blockchain.
  7. The method of claim 1, wherein the data exchange platform is implemented using a server including one or more processors.
  8. A computer-implemented data exchange method, comprising:
    searching on a data exchange platform to determine whether a computer system of an organization participating on the data exchange platform has relevant information;
    sending, to the data exchange platform, an event indicating a request to access the relevant information;
    receiving, from the computer system of the organization participating on the data exchange platform, a response prepared according to the event; and
    sending, to the data exchange platform, a report indicating a quality of the response received.
  9. The method of claim 8, wherein the searching is conducted on searchable abstracts representing the relevant information and the request to access the relevant information comprises a request to access relevant information represented by a particular searchable abstract.
  10. The method of claim 9, further comprising:
    verifying authenticity of the response received; and
    determining the quality of the response received based on the authenticity of the response received.
  11. The method of claim 10, wherein the authenticity of the response received is verified at least based on the particular searchable abstract.
  12. The method of claim 11, wherein the authenticity of the response received is verified based on determining whether the particular searchable abstract is an authentic abstraction of the response received.
  13. The method of claim 8, wherein the data exchange platform is implemented using a blockchain.
  14. The method of claim 8, wherein the data exchange platform is implemented using a server including one or more processors.
  15. A computer-implemented data exchange method, comprising:
    receiving, by a data exchange platform, a submission of organizational data from a first communication interface serving a first organization;
    receiving, by the data exchange platform, a submission of enterprise data from the first communication interface;
    facilitating a search of the organizational data and the enterprise data on the data exchange platform;
    receiving, by the data exchange platform from a second communication interface serving a second organization, an event indicating a request to access the enterprise data; and
    informing the first communication interface of the received event and requesting the first communication interface to prepare a response to the second communication interface according to the received event.
  16. The method of claim 15, wherein:
    the data exchange platform is implemented using a blockchain;
    the submissions of the organizational data and the enterprise data form a block on the blockchain; and
    the event received from the second communication interface indicating the request to access the enterprise data forms another block on the blockchain.
  17. The method of claim 15, wherein facilitating the search of the organizational data and the enterprise data on the data exchange platform comprises:
    receiving a searchable abstract representing the enterprise data; and
    facilitating the search of the organizational data and the searchable abstract representing the enterprise data on the data exchange platform.
  18. The method of claim 15, wherein requesting the first communication interface to respond according to the received event comprises:
    requesting the first communication interface to establish a communication channel with the second communication interface to provide the response.
  19. The method of claim 15, further comprising:
    receiving, by the data exchange platform, a report from the second communication interface indicating a quality of the response provided by the first communication interface.
  20. The method of claim 15, further comprising:
    implementing a point-based incentive program to promote data exchange between the first organization and the second organization, wherein the implementing of the point-based incentive program includes:
    awarding the first organization one or more points for submitting the enterprise data; and
    deducting one or more points from the second organization for accessing the enterprise data submitted by the first organization.
PCT/CN2018/107608 2018-09-26 2018-09-26 Method and system for data exchange WO2020061812A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107608 WO2020061812A1 (en) 2018-09-26 2018-09-26 Method and system for data exchange

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107608 WO2020061812A1 (en) 2018-09-26 2018-09-26 Method and system for data exchange

Publications (1)

Publication Number Publication Date
WO2020061812A1 true WO2020061812A1 (en) 2020-04-02

Family

ID=69951026

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/107608 WO2020061812A1 (en) 2018-09-26 2018-09-26 Method and system for data exchange

Country Status (1)

Country Link
WO (1) WO2020061812A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873333A (en) * 2010-07-09 2010-10-27 中国工商银行股份有限公司 Enterprise data maintenance method, device and system based on banking system
CN105900396A (en) * 2014-02-07 2016-08-24 甲骨文国际公司 Mobile cloud service architecture
US20160306989A1 (en) * 2015-04-17 2016-10-20 Cicer One Technologies Inc. Data storage and access platform with jurisdictional control
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101873333A (en) * 2010-07-09 2010-10-27 中国工商银行股份有限公司 Enterprise data maintenance method, device and system based on banking system
CN105900396A (en) * 2014-02-07 2016-08-24 甲骨文国际公司 Mobile cloud service architecture
US20160306989A1 (en) * 2015-04-17 2016-10-20 Cicer One Technologies Inc. Data storage and access platform with jurisdictional control
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system

Similar Documents

Publication Publication Date Title
US11899820B2 (en) Secure identity and profiling system
US11451392B2 (en) Token-based secure data management
US10873578B1 (en) Biometric authentication, decentralized learning framework, and adaptive security protocols in distributed terminal network
US20200153606A1 (en) System and method for blockchain-based cross-entity authentication
US20230198971A1 (en) Resource transfer setup and verification
EP3520319B1 (en) Distributed electronic record and transaction history
WO2021000419A1 (en) System and method for blockchain-based cross-entity authentication
US10491593B2 (en) Multi-dimensional framework for defining criteria that indicate when authentication should be revoked
EP3788523A1 (en) System and method for blockchain-based cross-entity authentication
US20210203503A1 (en) Permissions from entities to access information
US20200320219A1 (en) Distributed management of user privacy information
US11488271B2 (en) System and method for supplier information management
US11405396B2 (en) Secure management and provisioning of interaction data using permissioned distributed ledgers
CN112567716B (en) Secure data transmission system and method
US20190258820A1 (en) System and Method for Maintaining the Security and Confidentiality of Consumer Information
US20210409216A1 (en) System and method for providing controlled access to personal information
US20210233078A1 (en) Authentication of online user identity
WO2020062119A1 (en) Method and system for incentivizing data exchange
US20200344236A1 (en) Distributed ledger data verification network
WO2020061812A1 (en) Method and system for data exchange
CA3057799A1 (en) Secure management and provisioning of interaction data using permissioned distributed ledgers
WO2024045911A1 (en) Collaborative computation across blockchain networks
US20220058651A1 (en) Authentication of financial transaction
US20230334175A1 (en) Distributed Ledger Network for Data Portability
US20240171414A1 (en) Blockchain-based electronic document vault

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18935660

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18935660

Country of ref document: EP

Kind code of ref document: A1