JP2008181563A - System for using secondary information - Google Patents

System for using secondary information Download PDF

Info

Publication number
JP2008181563A
JP2008181563A JP2008097461A JP2008097461A JP2008181563A JP 2008181563 A JP2008181563 A JP 2008181563A JP 2008097461 A JP2008097461 A JP 2008097461A JP 2008097461 A JP2008097461 A JP 2008097461A JP 2008181563 A JP2008181563 A JP 2008181563A
Authority
JP
Japan
Prior art keywords
information
plurality
primary
secondary
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
JP2008097461A
Other languages
Japanese (ja)
Inventor
Hiroyasu Oda
博靖 織田
Original Assignee
Ncl Communication Kk
エヌ・シー・エル・コミュニケーション株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ncl Communication Kk, エヌ・シー・エル・コミュニケーション株式会社 filed Critical Ncl Communication Kk
Priority to JP2008097461A priority Critical patent/JP2008181563A/en
Publication of JP2008181563A publication Critical patent/JP2008181563A/en
Application status is Pending legal-status Critical

Links

Images

Abstract

An object of the present invention is to widely distribute and utilize the above information, knowledge and wisdom based on the permission of the original owner of data. Further, it is intended that the data is released from the cost of storage and storage by being widely distributed and used, and the purpose is to make the data a profit source by reusing and distributing the data.
A permission inquiry unit that prompts input of permission information for use of the primary information obtained from a plurality of owners having different primary information, and the primary information corresponding to the input permission information. It is characterized by comprising a processing unit 20 that inputs a plurality of inputs, generates a single piece of secondary information by processing a plurality of input primary information, and a sales unit 30 that sells the processed secondary information. .
[Selection] Figure 1

Description

The present invention relates to a data processing technique (compression / encryption / protocol) for compressing, informationizing, and representing original data.
The present invention also relates to a technique (network) for transferring the processed data to a data storage by a network or transportation.
The present invention also relates to a technique for storing the transferred data. Data custodians usually store securely in a compressed and encrypted state. This technique relates to data storage and backup.
In addition, a technology that decompresses and decrypts the processed data with compression, encryption, and notation into a form that can be processed, and sorts and organizes the data based on the notation as necessary. The present invention relates to (decompression, decryption, classification) in the background of a predetermined algorithm and a key construction technique necessary for decompression and encryption.
The present invention also relates to a technique (data warehouse) that stores this data over time and makes it possible to perform processing according to the purpose.
The present invention also relates to a technique (data mining) for extracting information, knowledge, and wisdom to make judgment and action more effective by processing and processing data from data in this data warehouse by data analysis means.
In addition, a technique for safely transferring restoration information such as decompression, decryption, classification, etc. from the owner of the original data to a data custodian, and a technique for ensuring that the original data is not tampered (secret key information technology, public key information technology, Digital signature technology).
Further, the present invention relates to a technology (individualization technology) that removes inconvenient data from the data for maintaining privacy.
Further, the present invention relates to data of each level and information, knowledge, and wisdom generated from the data, charging technology, and trading technology (e-trade technology).

Data warehouse e-business (conventional form)
Recently, the business of remote online backup has started as the cost reduction and the security of practical use of cryptography become practical. In this case, the data storage requester, for example, makes data storage and storage a business in order to prevent damage when the data stored and held by his / her personal computer is lost due to disk destruction, misoperation, theft, etc. A third party may be outsourced to store stored data through a network. Currently, the above data is compressed in order to reduce the cost of transferring and storing the data held by the data storage requester, and further, the compressed data and the encrypted data encrypted to ensure security are stored in the data store through the network. It is transferred to the data warehouse and stored as it is. If the data archiving requester loses the data, request the data custodian to return the compressed / encrypted data via the network, and the data requester himself / herself sends the data from the compressed / encrypted data. The original data can be reproduced and utilized by decompression and decoding.
The above is the substance of the data warehouse e-business that is remote and online backup using the network. Naturally, the data storage requester pays the data storage fee to the data storage owner. As a result, the data storage requester can omit the costs associated with storage, and the data storage custodian establishes the business by obtaining a reasonable storage fee.

  However, the communication business for transferring the data and the data warehouse business / data backup business for storing the data exist independently and do not exist in an integrated manner.

Further, the following conventional techniques exist for data collection and storage.
From the tape storage warehouse to the operation of an automated warehouse with a tape library device, it depends on everything. There are network-dependent ones like remote online backup. Both were requested to be stored by the data owner and were not reused without permission. That is, the tape is sealed and the remote backup data is stored after being compressed and encrypted. These can be used if they are opened and thawed based on the consent of the client. From then on, it will enter the domain of knowledge discovery (KDD: Knowledge Discovery in Databases) in the database.

Further, there is the following conventional technique called data warehouse (data normalization).
The stored and opened data is stored in a form that facilitates subsequent intelligent processing. In other words, it is stored in the form of historical data to enable trend analysis, and data is cleaned, consistent, duplicates are eliminated, definitions are eliminated, and external additional information is actively incorporated as needed to reinforce. And then encoding. These have already become a field in IT as data warehousing technology, and the technology and products are available.

Further, there is the following conventional technique called data mining (discovering and extracting information and knowledge from data).
Trend analysis is obtained from data warehouse data by methods such as clustering, region segmentation, and prediction. Since this implementation requires powerful computing power, it is desirable to employ a multiprocessing system. These are already in the field of IT as data mining technologies, and the technologies and products are available.

In addition, the following conventional techniques exist as access (information and knowledge report).
Using visualization techniques according to the purpose, display it in a table, graph, etc. to make it easy to make decisions and actions. This can be effectively realized by applying a client server and web technology.

As described above, while operating data is stored as a database, data warehouses and data mining technologies have made decisions and actions, but the source of the original data is limited to the company, and the use of knowledge and other deliverables is also in-house. It stopped at. In particular, it was unexpected that the data stored in the request storage from the outside was added to the operation data, processed, reused as secondary data, and the secondary data sold.
JP 2001-256395 A JP-A-11-250165 JP 2001-265771 A

  An object of the present invention is to collect and store data globally.

  Another object of the present invention is to extract information, knowledge and wisdom by processing accumulated data.

  Another object of the present invention is to widely distribute and utilize the information, knowledge, and wisdom based on the permission of the original owner of the data.

  In addition, the present invention is freed from the cost of storing and storing data by widely distributing and using the data. Rather, the data can be used as a source of profit by reusing and distributing the data. Objective.

  Another object of the present invention is to enable knowledge management with a wide field of view because data is collected not only within the company but also globally.

  Another object of the present invention is to enable knowledge management including time maintenance by utilizing not only data but also past data.

  In addition, since the information can be easily stored and transferred, the present invention provides a super-distribution and data pool that is charged in advance when distributed and used, and the carry-in / seller and carry-out / purchase can arbitrarily It aims to make it possible to form a full-purpose market that can be utilized.

  Another object of the present invention is to make information an asset of mankind that is free from resources shortage and pollution because information does not decrease even if it is used and an infinite proliferation process can be formed.

The secondary information utilization system of the present invention is
A permission inquiry section that prompts input of permission information for use of the primary information obtained from a plurality of owners having different primary information;
A processing unit that inputs a plurality of the primary information corresponding to the permission information input by the permission inquiry unit, processes the plurality of input primary information, and generates one secondary information;
And a sales unit that sells the secondary information processed by the processing unit.

The secondary information utilization system of the present invention is
A primary information storage unit for storing a plurality of primary information of different owners;
A permission inquiry section that prompts the owner of the primary information stored in the primary information storage section to input permission information for use of the primary information;
A plurality of the primary information corresponding to the permission information input by the permission inquiry unit is input from the primary information storage unit, and the plurality of input primary information is processed to generate one secondary information. A processing unit;
A secondary information utilization system comprising: a sales unit that sells secondary information processed by the processing unit.

  In addition, the processing unit includes a data mining unit that processes a plurality of input primary information into statistical information.

  In addition, the processing unit includes an individualization unit that processes the input primary information so that it cannot be specified who the owner of the primary information was.

The permission query unit inputs at least one of the decompression algorithm information and the decryption key for decrypting the primary information,
The processing unit includes a decryption unit that decrypts the primary information based on at least one of a decompression algorithm specified by the decompression algorithm and a decryption key.

The secondary information utilization system further includes a secondary information storage unit that stores the secondary information.
The sales unit receives a secondary information usage request from a user, and retrieves secondary information stored in the secondary information storage unit based on the usage request;
And a secondary information output unit that outputs the secondary information searched by the search unit to the user.

The sales unit is configured to settle a sales fee of the secondary information output by the secondary information output unit using a predetermined sales fee amount;
A division unit for dividing the sales fee amount into a secondary information usage fee amount and a primary information usage fee amount;
And a usage fee output unit for outputting the primary information usage fee amount.

The secondary information utilization method of the present invention is a secondary information utilization method performed by a secondary information utilization system,
Prompt for permission information for use of the primary information obtained from multiple owners with different primary information,
Input a plurality of primary information corresponding to the input permission information, process a plurality of input primary information to generate one secondary information;
The processed secondary information is sold.

The secondary information utilization method of the present invention is a secondary information utilization method performed by a secondary information utilization system,
Memorize multiple primary information with different owners,
Prompts the owner of the stored primary information for permission information to use the primary information;
Enter a plurality of the primary information corresponding to the input permission information,
Process a plurality of input primary information to generate one secondary information,
The processed secondary information is sold.

A program for causing a computer of the present invention to execute is as follows:
Primary information storage processing for storing a plurality of primary information of different owners;
A permission inquiry process that prompts the owner of the primary information stored in the primary information storage process to input permission information for use of the primary information;
A plurality of the primary information corresponding to the permission information input by the permission inquiry process is input from the primary information storage process, and the plurality of input primary information is processed to generate one secondary information. Secondary information processing,
And a sales process for selling the secondary information processed by the secondary information processing.

The secondary information utilization system of the present invention is
A permission storage unit for storing permission information for use of the primary information obtained from a plurality of owners having different primary information;
A processing unit that inputs a plurality of the primary information corresponding to the permission information stored in the permission storage unit, processes the plurality of input primary information, and generates one secondary information;
And a usage storage unit for storing secondary information processed by the processing unit.

The data processing system of the present invention includes:
A primary information storage unit entrusted to manage and store primary information with a predetermined management amount from a customer, and to manage and store a plurality of the primary information;
A processing unit that inputs a plurality of primary information stored in the primary information storage unit and processes the plurality of input primary information to generate one secondary information;
A sales unit that sells the secondary information processed by the processing unit using a predetermined sales fee;
Calculate the difference obtained by subtracting the predetermined management amount from the predetermined sales fee amount of the secondary information sold by the sales department, and if the calculated difference is a positive value, A payment unit that pays the difference and, when the difference is a negative value, a payment unit that collects the difference from the customer;

The data self-propagation system of the present invention
A primary information storage unit entrusted to manage and store primary information from a customer and managing and storing a plurality of the primary information;
The primary information stored in the primary information storage unit is input, the input primary information is processed to generate one secondary information, and the generated secondary information is generated. Is stored in the primary information storage unit, and a plurality of primary information stored in the primary information storage unit is multiplexed.

  According to the preferred embodiment of the present invention, the remarkable effect of collecting and storing data globally can be achieved.

  According to a preferred embodiment of the present invention, a remarkable effect of extracting information, knowledge, and wisdom can be achieved by processing accumulated data.

  According to a preferred embodiment of the present invention, it is possible to achieve a remarkable effect of widely distributing and utilizing the information, knowledge, and wisdom based on the permission of the original owner of the data.

  According to a preferred embodiment of the present invention, the wide distribution and utilization frees data from the cost of storage and storage, and the reuse and distribution of data, rather, the data is profitable. Significant effect can be achieved.

  According to the preferred embodiment of the present invention, since data is collected not only in the company but also globally, it is possible to achieve a remarkable effect of enabling knowledge management with a wide field of view.

  According to a preferred embodiment of the present invention, not only the current data but also the past data can be utilized to achieve a remarkable effect of enabling knowledge management including time maintenance.

  According to a preferred embodiment of the present invention, since information can be easily stored and transported, a super-distribution and data pool that is charged in advance when distributed and used are prepared. A significant effect can be achieved that allows the purchaser to form a full-purpose market that can be exploited arbitrarily.

  According to a preferred embodiment of the present invention, the information does not decrease even when used, and an infinite proliferation process can be formed, thereby achieving a remarkable effect of making the information an asset of mankind freed from resource shortage and pollution. can do.

Embodiment 1 FIG.
FIG. 1 shows the first embodiment.
In FIG. 1, 10 is a permission inquiry unit, 20 is a processing unit that performs secondary information processing, 21 is a data mining unit, 22 is an individualization unit, 23 is a decryption unit, and 30 is a sale. , 31 is a search unit, 32 is a secondary information output unit, 33 is a settlement unit, 34 is a division unit, 35 is a usage fee output unit, and 40 is an example of a primary information storage unit. The center (DATA center), 50 is a secondary database as an example of a secondary information storage unit, 100 is a secondary information utilization system, 200 is a data warehouse, 300 is a client PC (Personal Computer), 400 is , A user PC. The processing unit 20 includes a data mining unit 21, an individualization unit 22, and a decoding unit 23. The sales unit 30 includes a search unit 31, a secondary information output unit 32, a settlement unit 33, a division unit 34, and a usage fee output unit 35.

FIG. 2 is a diagram illustrating a network configuration according to the first embodiment.
In FIG. 2, 301 is a distributed client, 302 is a distributed server, 303 is a distributed storage, 310 and 320 are storage area networks (SAN) connected by Fiber Channel, and 330 is a storage over IP (INTERNET PROTOCOL). A gateway, 340 is a router, and 360 and 370 are IP (INTERNET PROTOCOL) network lines.
The total number of distributed clients 301 may be expanded from several hundred to several million or more. The storage area networks 310 and 320 are connected to the IP network line 360 via the storage over IP gateway 330.
All systems are connected to a global IP network line 360 via a router 340 owned by each system.
In FIG. 2, the data center 40 is configured outside the secondary information utilization system 100, but the data center 40 may be configured outside the secondary information utilization system 100. As shown in FIG. 1, when the data center 40 is configured inside the secondary information utilization system 100, the IP network line 370 may be a dedicated line.

  In terms of the number of clients, the distributed server 302 and the distributed storage 303 expand the scale and effectiveness of the first embodiment in terms of storage capacity. The data center 40 is also a data backup center, receives data from the distributed client 301, the distributed server 302, and the distributed storage 303 via the IP network line 360, receives the data in a state of security and secures it, and stores it. To do. Normally, data is stored in a highly safe state in a compressed and encrypted state and by double accumulation of data by mirror processing. By storing with high safety, the skill as a safe data storage is provided to the user through the network. The stored data that is the primary information stored in the data center 40 is the operation data of each data sending destination such as the distributed client 301, the distributed server 302, the distributed storage 303, etc., and is always operated for the convenience of the sending destination. Each time, old data may be erased.

FIG. 3 shows the data processing process of the first embodiment.
First, the permission inquiry unit 10 sends the following items 1) to 3) to the distributed client 301, the distributed server 302, the distributed storage 303, etc., which are the senders of data as primary information and the owners of the data. Permission and consent are urged, and permission information is input from the distributed client 301, distributed server 302, distributed storage 303, and the like.
1) Decompression, that is, decompression, of compressed and encrypted data.
2) Duplicate data as originating data before the data is updated and manipulated.
3) No-individualization for protecting the privacy of the original data owner, secondary use after data abstraction.
In S (step) 510, the decryption unit 23 performs a data decompression process. The permission inquiry unit 10 receives permission marks from the owners of the distributed client 301, distributed server 302, distributed storage 303, etc. for the operation data of each data owner stored in the data center 40 after being compressed and encrypted. As an example of the permission information, a report of decompression algorithm information and an encryption decryption key are obtained. The decryption 23 decrypts the primary information based on the decompression algorithm specified by the decompression algorithm information and the decryption key. There are various types of compression and decompression algorithms, but they are already common, which are mutually agreed in advance. As for encryption, DES (DATA ENCRYPTION STANDARD) which is a common key method is well known, and if a triple DES which is an enhanced version of DES is used, it is not stolen by the current technology. Furthermore, there is a public key encryption method for confirming the data sender and confirming that the received data has not been tampered with. RSA (registered trademark) (RIVEST SHAMIR ADLEMA) is well known, and RSA ( Registered trademark). These compression and encryption techniques are already well-known and will not be described in detail.
Here, the permission inquiry unit 10 urges input of permission information from the distributed client 301, distributed server 302, distributed storage 303, etc. as the owner, and inputs permission information. May be a permission storage unit that stores the input permission information.
In S520, the processing unit 20 duplicates and extracts the operation data. It is stored in the form of the most temporary tabular relational database (SQL (STRUCTURE QUERY LANGUAGE)).
In S530, the processing unit 20 performs a data cleaning process, and performs definition consistency, elimination of duplication, and elimination at the time of occurrence.
In S540, the processing unit 20 performs reinforcement processing for adding information that is considered to be effective for future analysis from the outside.
In S550, the personalization unit 22 performs a projection operation for personalization in order to protect the privacy inherent in the data in this process of selecting data having information worthy of future analysis.
In S560, the data mining unit 21 performs clustering and area division based on the unindividuated data, and performs data mining for predicting the future.
In S570, data-mined secondary information is formed.
In S580, the formed secondary information is output to the secondary database 50.
Each of the above steps forms secondary information meaningful to the user while repeating feedback.

Here, an example of processing performed by the individualization unit 22 is shown below.
FIG. 4 is a diagram illustrating data that has been reinforced in S540.
In FIG. 4, the management number of the data, the data owner, the date of birth of the customer inherent in the data, the annual income of the customer, the loan balance of the customer, the ownership of the car of the customer, the ownership of the house, the address of the customer, The data regarding the customer's purchased varieties are described. As an example of the primary information, it may be data for each data management number or may be for each data owner.
FIG. 5 is a diagram in which the primary information corresponding to the management number of data lacking input of the inherent data is deleted.
In FIG. 5, the primary information of the management number “10204” has been deleted.
FIG. 6 is an intermediate view of individualization.
In FIG. 6, the data owner is deleted, the address is changed to the area number, the birthday is changed to age, the car ownership information and the house ownership information are changed from “Y” to “1”, “N” to “0”. Convert.
FIG. 7 is a final view of the individualization.
In FIG. 7, the data for each management number is aggregated for each same region, and the inherent data of age, annual income, and loan balance are averaged. Furthermore, for purchased products, each inherent data is converted into items, and for each management number aggregated for the same region, “1” corresponds to at least one of the above items, and there is no applicable item. Is expressed as “0”. In addition, with regard to vehicle ownership information and house ownership information, the data for each management number aggregated for the same region is “1”, even if one of the above items is applicable, Expressed as “0”.
As described above, by performing projection and flattening, which are SQL operations, in the encoding process, the individualization and abstraction are performed to maintain the privacy of the original owner of the data. That is, processing is performed so that it cannot be specified who the owner of the primary information is.

  The secondary database 50, which is an example of a usage storage unit, stores the secondary information processed by the processing unit 20 for use. The secondary database 50 is databased so that secondary information can be searched.

Next, the sales unit 30 sells the secondary information to the user. When selling the secondary information to the user, the sales unit 30 receives an input of a usage request for secondary information from the user via the user PC 400, and the search unit 31 selects the desired secondary information based on the usage request. Is searched from the secondary information stored in the secondary database 50.
Then, the secondary information output unit 32 outputs the secondary information searched by the search unit 31 to the user PC 400.

  Further, the settlement unit 33 settles the sales fee of the secondary information output by the secondary information output unit 32 using a predetermined sales fee amount. Then, the dividing unit 34 divides the sales fee amount into a secondary information usage fee amount and a primary information usage fee amount. The usage fee output unit 35 outputs the primary information usage fee amount to a data owner such as the distributed client 301, the distributed server 302, the distributed storage 303, that is, the client PC 300.

Here, the secondary information utilization system in Embodiment 1 may be a data processing system as described below. That is,
The primary information storage unit 40 is entrusted to manage and store primary information with a predetermined management amount from a customer, and manages and stores a plurality of the primary information.
The processing unit 20 inputs a plurality of primary information stored in the primary information storage unit 40, processes the plurality of input primary information to generate one secondary information,
The sales unit 30 sells the secondary information processed by the processing unit 20 using a predetermined sales fee amount,
The settlement unit 33 calculates the difference obtained by subtracting the predetermined management amount from the predetermined sales fee amount of the secondary information sold by the sales unit 30, and when the calculated difference is a positive value Pays the difference to the customer, and if the difference is a negative value, makes a settlement to collect the difference from the customer.
As described above, the data processing system realizes a business that settles the cost (consideration) associated with storage, storage or processing of information with the difference from the profit (consideration) obtained by secondary use of the information. can do.

Here, the secondary information utilization system in the first embodiment may be a data self-propagation system as described below. That is,
The primary information storage unit 40 is entrusted to manage and store the primary information from the customer, and stores and manages a plurality of the primary information.
The processing unit 20 inputs a plurality of primary information stored in the primary information storage unit 40, processes the plurality of input primary information, generates one secondary information, and is generated The storage of the one secondary information in the primary information storage unit 40 is repeated, and a plurality of primary information stored in the primary information storage unit is multiplexed.
As described above, the data self-propagation system creates new information according to the purpose by repeatedly multiplexing information having spatial and temporal spread by utilizing the fact that the information is not consumed by use and distribution. be able to.

  As described above, the point of the present invention is to reuse the data stored in the data center 40 which is a data warehouse without dying there. That is, the data center 40 that is a data storage custodian obtains permission from any of the distributed client 301, the distributed server 302, the distributed storage 303, etc. that are the storage requesters, and decompresses the stored data after being compressed and encrypted. The most important point is to obtain source data by decoding, extract effective information and knowledge from the source data, and make judgment and action effective.

Here, for example, remote online backup technology may be used for data collection and storage in the first embodiment. Through remote online backup technology, data can be collected and stored globally safely and efficiently through a network.
Further, the decompression of the accumulated data into a form that can be used with the permission of the original data owner is realized by, for example, a network security technique such as decryption of encryption as described above.
In addition, intelligent processing of data that has become available to extract information and knowledge from the data is realized by, for example, a data warehouse and data mining technology as described above. Data warehousing technology includes, for example, a data selection process that selects historical data from operation data, a cleaning process that ensures consistency and eliminates multiple ambiguities, a reinforcement process that reinforces external information if necessary, and simple attribute display Then, information and knowledge are prepared for extraction through steps such as a coding process that makes the machine processing easier by flattening. Data mining techniques include, for example, methods such as query language, temporal method, visualization, OLAP (ONLINE ANALYTIC PROCESSING), case-based learning (K-NN), decision tree, association rule, neural network, genetic algorithm, etc. Heuristically extract information and knowledge embedded in data.
In order to collect data in a wide area and in a large amount, for example, the latest network storage technology may be used. For example, the SAN over IP method of connecting a SAN (storage area network) with a wide area IP network is effective.
In addition, charging and distribution of the acquired knowledge may be performed using a technology already realized by network sales of information.
Further, the non-individualization and abstraction of the portion requiring the privacy of the original owner of the data are realized by utilizing the data warehouse technology as described above, for example.

As described above, the first embodiment is
B) The source data owner performs processing such as compression and encryption of the source data. For example, difference and write-once may be used for data compression / decompression. In terms of security, public key RSA (registered trademark) such as secret key DES, TRIPLE DES, and MISTY (registered trademark) may be used as an encryption / decryption technique. As the personal authentication technique, a fixed password and a one-time password, biometric authentication, a password and an ID number, or the like may be used. As a falsification preventing technique, a digital signature, a digital watermark, or the like may be used. As a system, a PKI (PUBLIC KEY INFRASTRUCTURE) or CA (CERTIFICATE AUTHORITY) station may be used.
B) Transfer data to the custodian by network or transportation. For example, an analog telephone network, ISDN (INTEGRATED SERVICES DIGITAL NETWORK), leased line, VPN (VIRTUAL PRIVITE NETWORK), CATV (CABLE TELEVISION), optical fiber, satellite, terrestrial wave, spread spectrum, etc. may be used as a transfer medium. . As the network, a LAN (LOCAL AREA NETWORK), a WAN (WIDE AREA NETWORK), a MAN (METROPOLITAN AREA NETWORK), the Internet, an intranet, or the like may be used. As a transport / transport technique, a tape, an optical disk, or the like may be used.
C) The data custodian usually performs the skills of the data warehouse by storing the compressed and encrypted data as they are. For example, a manual memory, an HDD (Hard Disk Drive), an optical disc / library, a tape / library, or the like may be used as the medium. As a storage form, DASD (DIRECT ACCESS STORE DEVICE DEVICE), NAS (NETWORK ATTACHED STRAGE), SAN, or the like may be used.
D) When a certain level of trust and business relationship is established between the source data owner and the data custodian, the data custodian decompresses and decrypts the processed data that has been compressed and encrypted from the source data owner. Get the algorithm and key to get and reproduce the original data.
E) This primitive data is processed and processed by the latest data analysis means to extract information, knowledge and wisdom to make judgments and activities more effective.
F) This information, knowledge and wisdom are sold not only to the owner of the original data but also to the general public in the form of obtaining the consent of the original data owner.
G) If the source data has a general value, the usage fee exceeds the storage fee, and the source data requester does not pay the data storage fee and can expect to obtain a predetermined income.

As in the first embodiment, the accumulated data is not only stored, but a new business is created by reusing the data. Banks have not only kept money, but have managed to generate interest rates and manage the banking business. Accordingly, preferred embodiments of the present invention relate to data banks, knowledge banks, and Wisdom banks.
In the first embodiment, it is assumed that there is a concrete means that integrates the latest IT technology, a trust relationship between the owner and the custodian of the original data, an agreement on the value of the data, and the existence of a pricing rule. You can't use money, but you don't have to use data.

As described above, according to the first embodiment, the data stored in a state that cannot be decrypted and used by a third party can be decrypted from the owner of the data, the decryption right can be obtained, and the data can be decrypted and used. And information distribution, sales business, and data secondary (reuse) business by combining means for extracting meaningful information and knowledge by applying predetermined processing to the data.
In particular, Embodiment 1 performs data transfer from a data owner to a custodian through a network.
In the first embodiment, decryption means and decryption rights are transferred through a network.
The network is connected through a global network such as the Internet, and the owner of the original data, the data custodian, and the data processor that extracts meaningful information are “1: 1: 1” and “1: 1 : N "," 1: n: 1 "," 1: n: n "," n: 1: 1 "," n: 1: n "," n: n: 1 "or" n: n: n Are traded in the form of a free market that is interspersed with each other or beyond each other.
In addition, since information is not reduced by transportation and use, the first embodiment is a super-distributed business that is widely distributed in advance and pays a value according to use.
In addition, the first embodiment may be a business in which information is traded between the owner of the information and the user by intra-party telephone transaction.

Here, in the first embodiment, for data collection and storage, for example, a TLM system of CONNECTED, USA may be used. In addition, NETWORKER of VERITAS may be used.
For collecting a large amount of data, Hitachi SANRISE may be used as the SAN, for example. As a means for connecting this to a wide area, SAN OVER IP SL1000 of SAN VALLY may be used.
In addition, as a combined product of a data warehouse and data mining, for example, Clementine from Integral Solutions may be used. In addition, IBM's Intelligent Miner may be used. Moreover, you may use 4Though of Livingstones.
Moreover, as a form of information and knowledge charging and distribution, for example, Rakuten Ichiba may be used.

As described above, Embodiment 1 can globally expand the tacit knowledge collection scope of knowledge management that has recently attracted attention, and can automate management activities themselves with the latest IT technology.
Further, in the first embodiment, a data warehouse that simply stores data as it is is changed from a cost center, which is expensive, to a profit center. It is similar to the fact that the current bank not only keeps money but also manages it to generate interest.
In addition, information does not decrease even if it is used like money. It goes through an infinite proliferation process as a major resource-saving and pollution-free business. As a result, it brings wisdom to mankind.
In addition, since information and wisdom can be stored and transferred, it can be paid at that time according to the usage fee such as water and gas, so that super distribution can be formed.
Further, in the first embodiment, data can be transferred through the network, and the seller and the data, or information utilizing the data, knowledge can be transferred, and the buyer can freely trade through one data / information pool (free Market formation).

In the above description of the first embodiment, what has been described as “to part” can be configured by a program operable by a computer.
These programs can be created in C language, for example. Alternatively, HTML, SGML, or XML may be used. Alternatively, the screen display may be performed using JAVA (registered trademark).
In addition, what has been described as “˜unit” in the description of each embodiment may be realized by firmware stored in a recording medium such as a ROM (Read Only Memory). Alternatively, it may be implemented by software, hardware, or a combination of software, hardware, and firmware.
A program for implementing the above-described embodiment is executed by a CPU (Central Processing Unit) of a computer.
The program for implementing the above embodiment may be stored in another recording medium such as an FXD (Flexible Disk), a magnetic disk device, an optical disk, or a CD.

1 is a diagram showing a first embodiment. FIG. 1 is a diagram illustrating a network configuration according to a first embodiment. The data processing process of Embodiment 1 is shown. It is a figure showing the data by which the reinforcement process was carried out. It is the figure which deleted the primary information applicable to the management number of the data for which input of resident data is missing. FIG. FIG.

Explanation of symbols

  DESCRIPTION OF SYMBOLS 10 Permit inquiry part, 20 Processing part, 21 Data mining part, 22 Unidentification part, 23 Decoding part, 30 Sales part, 31 Search part, 32 Secondary information output part, 33 Settlement part, 34 Dividing part, 35 Usage fee output unit, 40 data center, 50 secondary database, 100 secondary information utilization system, 200 data warehouse, 300 client PC, 301 distributed client, 302 distributed server, 303 distributed storage, 310, 320 storage area network, 330 Storage over IP gateway, 340 router, 360, 370 IP network line, 400 user PC.

Claims (5)

  1. Stores primary information stored as online backup data of the source data from a plurality of owners who own the source data, processes the stored primary information to generate secondary information, and generates the generated secondary information. A secondary information usage system sold for use,
    A central processing unit (CPU) for executing processing;
    A primary information storage unit that stores a plurality of primary information having a plurality of items with different owners as online backup data of the original data owned by the owner;
    A secondary information storage unit for storing secondary information generated by processing the plurality of primary information;
    The CPU inputs permission information for use of the primary information to the plurality of client devices of the plurality of owners of the plurality of primary information stored in the primary information storage unit via the network, respectively. And a permission inquiry unit that inputs permission information from a plurality of client devices of a plurality of owners of a plurality of primary information through the network,
    The CPU inputs a plurality of the primary information corresponding to the permission information respectively input by the permission inquiry unit from the primary information storage unit, and duplicates the plurality of input primary information, respectively. A processing unit having a data mining unit for generating secondary information by data mining of the primary information by the CPU, and storing the generated secondary information in the secondary information storage unit by the CPU;
    In order to sell the secondary information processed by the processing unit, a secondary information usage request is input by the CPU from the user, and the secondary information stored in the secondary information storage unit based on the usage request. A search unit for searching for information by the CPU;
    A secondary information output unit that outputs secondary information searched by the search unit to the client device of the user via the network by the CPU;
    A secondary information utilization system comprising a sales department having
  2. Stores primary information stored as online backup data of the source data from a plurality of owners who own the source data, processes the stored primary information to generate secondary information, and generates the generated secondary information. A secondary information usage system sold for use,
    A central processing unit (CPU) for executing processing;
    A plurality of primary information having a plurality of items with different owners is stored as an online backup data of the original data owned by the owner in a compressed state and in an encrypted state that cannot be used by a third party. A primary information storage unit;
    A secondary information storage unit for storing secondary information generated by processing the plurality of primary information;
    By the CPU, a plurality of client devices of a plurality of owners of a plurality of primary information stored in a state in which the third party cannot use the primary information storage unit are connected to the primary information via a network. Information for permitting the use of information includes the decompression algorithm information and decryption key of the primary information, information for permitting copying of the primary information, and the primary information for protecting the owner of the primary information. The CPU prompts the user to input permission information including information that permits predetermined processing, and the CPU causes the primary devices from a plurality of client devices of a plurality of owners of the plurality of primary information via the network. Permission query sections for inputting permission information including decompression algorithm information for decrypting information and a decryption key, and
    The CPU inputs a plurality of primary information corresponding to the permission information respectively input by the permission inquiry unit from the primary information storage unit, and the CPU specifies an expansion algorithm specified by the expansion algorithm information. A decryption unit for decrypting the primary information based on the decryption key;
    The CPU copies each of the plurality of primary information decrypted by the decryption unit, and the CPU performs data mining on the copied plurality of primary information to generate secondary information. The generated secondary information is stored in the CPU. A processing unit having a data mining unit stored in the secondary information storage unit by
    In order to sell the secondary information processed by the processing unit, a secondary information usage request is input by the CPU from the user, and the secondary information stored in the secondary information storage unit based on the usage request. A search unit for searching for information by the CPU;
    A secondary information output unit that outputs secondary information searched by the search unit to the client device of the user via the network by the CPU;
    A secondary information utilization system comprising a sales department having
  3. Stores primary information stored as online backup data of the source data from a plurality of owners who own the source data, processes the stored primary information to generate secondary information, and generates the generated secondary information. A secondary information usage system sold for use,
    A central processing unit (CPU) for executing processing;
    A plurality of primary information having a plurality of items with different owners is stored as an online backup data of the original data owned by the owner in a compressed state and in an encrypted state that cannot be used by a third party. A primary information storage unit;
    A secondary information storage unit for storing secondary information generated by processing the plurality of primary information;
    By the CPU, a plurality of client devices of a plurality of owners of a plurality of primary information stored in a state in which the third party cannot use the primary information storage unit are connected to the primary information via a network. Information for permitting the use of information includes the decompression algorithm information and decryption key of the primary information, information for permitting copying of the primary information, and the primary information for protecting the owner of the primary information. The CPU prompts the user to input permission information including information that permits predetermined processing, and the CPU causes the primary devices from a plurality of client devices of a plurality of owners of the plurality of primary information via the network. Permission query sections for inputting permission information including decompression algorithm information for decrypting information and a decryption key, and
    The CPU inputs a plurality of primary information corresponding to the permission information respectively input by the permission inquiry unit from the primary information storage unit, and the CPU specifies an expansion algorithm specified by the expansion algorithm information. A decryption unit for decrypting the primary information based on the decryption key;
    The CPU copies each of the plurality of primary information decrypted by the decryption unit, and the CPU performs data mining on the copied plurality of primary information to generate secondary information. The generated secondary information is stored in the CPU. A processing unit having a data mining unit stored in the secondary information storage unit by
    In order to sell the secondary information processed by the processing unit, a secondary information usage request is input by the CPU from the user, and the secondary information stored in the secondary information storage unit based on the usage request. A search unit for searching for information by the CPU;
    A secondary information output unit that outputs secondary information searched by the search unit to the client device of the user via the network by the CPU;
    And a sales department having
    The said processing part memorize | stores the secondary information memorize | stored in the said secondary information storage part in the said primary information storage part by the said CPU as said primary information in the said primary information storage part characterized by the above-mentioned.
  4. A permission inquiry section that prompts input of permission information for use of the primary information obtained from a plurality of owners having different primary information;
    A processing unit that inputs a plurality of the primary information corresponding to the permission information input by the permission inquiry unit, processes the plurality of input primary information, and generates one secondary information;
    A secondary information utilization system comprising: a sales unit that sells secondary information processed by the processing unit.
  5. A primary information storage unit for storing a plurality of primary information of different owners;
    A permission inquiry section that prompts the owner of the primary information stored in the primary information storage section to input permission information for use of the primary information;
    A plurality of the primary information corresponding to the permission information input by the permission inquiry unit is input from the primary information storage unit, and the plurality of input primary information is processed to generate one secondary information. A processing unit;
    A secondary information utilization system comprising: a sales unit that sells secondary information processed by the processing unit.
JP2008097461A 2008-04-03 2008-04-03 System for using secondary information Pending JP2008181563A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2008097461A JP2008181563A (en) 2008-04-03 2008-04-03 System for using secondary information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
JP2008097461A JP2008181563A (en) 2008-04-03 2008-04-03 System for using secondary information

Related Child Applications (1)

Application Number Title Priority Date Filing Date
JP2001355664 Division

Publications (1)

Publication Number Publication Date
JP2008181563A true JP2008181563A (en) 2008-08-07

Family

ID=39725343

Family Applications (1)

Application Number Title Priority Date Filing Date
JP2008097461A Pending JP2008181563A (en) 2008-04-03 2008-04-03 System for using secondary information

Country Status (1)

Country Link
JP (1) JP2008181563A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11250165A (en) * 1997-11-12 1999-09-17 Citicorp Dev Center Inc Distributed network based electronic wallet
JP2001256395A (en) * 2000-03-10 2001-09-21 Aip:Kk System and method for information transmission and reception
JP2001265771A (en) * 2000-03-22 2001-09-28 Nippon Telegr & Teleph Corp <Ntt> Device and method for managing personal information and recording medium recording program for executing the device or method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11250165A (en) * 1997-11-12 1999-09-17 Citicorp Dev Center Inc Distributed network based electronic wallet
JP2001256395A (en) * 2000-03-10 2001-09-21 Aip:Kk System and method for information transmission and reception
JP2001265771A (en) * 2000-03-22 2001-09-28 Nippon Telegr & Teleph Corp <Ntt> Device and method for managing personal information and recording medium recording program for executing the device or method

Similar Documents

Publication Publication Date Title
Yee et al. Secure Coprocessors in Electronic Commerce Applications.
US8036388B2 (en) Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium
US7184986B2 (en) Content transaction system and method, and program providing medium therefor
US6473741B1 (en) Method and system for aggregation and exchange of electronic tax information
Camenisch et al. Privacy and identity management for everyone
US7206765B2 (en) System and method for supplying and managing usage rights based on rules
US7593892B2 (en) Financial institution portal system and method
CN102656589B (en) Verifiable synthesized by the wrapper for data trust
ES2299665T3 (en) A system of information management.
JP5190036B2 (en) System and method for electronic transmission, storage and retrieval of authenticated documents
CN102123032B (en) Maintaining privacy during user profiling
JP4443224B2 (en) Data management system and method
Kantarcıoglu et al. Privacy preserving naive bayes classifier for horizontally partitioned data
US9996880B2 (en) Method and system for preventing and detecting identity theft
JP2006517697A (en) Software license management system configurable for post-use payment business model
EP1001392B1 (en) Electronic payment system with inexpensive illegal acts detection scheme
EP1193588A2 (en) Method and apparatus for protecting data retrieved from a database
Szabo Formalizing and securing relationships on public networks
US6385725B1 (en) System and method for providing commitment security among users in a computer network
US20170046638A1 (en) Systems and Methods for Monitoring Referrals
JP2012530391A (en) Secure private backup storage and processing for trusted computing and data services
EP1530113A1 (en) Content sharing system; content processing apparatus; information processing apparatus; program; recording medium; and content sharing method
US6119103A (en) Financial risk prediction systems and methods therefor
KR20080098372A (en) Account linking with privacy keys
US8069116B2 (en) System and method for supplying and managing usage rights associated with an item repository

Legal Events

Date Code Title Description
A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20100803

A02 Decision of refusal

Free format text: JAPANESE INTERMEDIATE CODE: A02

Effective date: 20101130