[go: up one dir, main page]

HK1242439B - One way and two way data flow systems and methods - Google Patents

One way and two way data flow systems and methods Download PDF

Info

Publication number
HK1242439B
HK1242439B HK18101659.0A HK18101659A HK1242439B HK 1242439 B HK1242439 B HK 1242439B HK 18101659 A HK18101659 A HK 18101659A HK 1242439 B HK1242439 B HK 1242439B
Authority
HK
Hong Kong
Prior art keywords
user
risk tolerance
module
organization
data
Prior art date
Application number
HK18101659.0A
Other languages
Chinese (zh)
Other versions
HK1242439A1 (en
Inventor
戴维 达菲 布莱恩
斯隆 卡尼 约翰
科尔 英格利施 杰西
Original Assignee
马里有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 马里有限公司 filed Critical 马里有限公司
Publication of HK1242439A1 publication Critical patent/HK1242439A1/en
Publication of HK1242439B publication Critical patent/HK1242439B/en

Links

Description

单向和双向数据流系统和方法Unidirectional and bidirectional data flow systems and methods

相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS

本申请要求在2014年10月6日递交的美国临时专利申请No.62/060,440的优先权,该美国临时专利申请的全部内容通过引用并入在本文中。This application claims priority to U.S. Provisional Patent Application No. 62/060,440, filed on October 6, 2014, which is incorporated herein by reference in its entirety.

技术领域Technical Field

本发明涉及一种单向和双向数据流系统和方法。The present invention relates to a unidirectional and bidirectional data flow system and method.

背景技术Background Art

在现有技术中,已知提供能够包括与用户有关的详细信息的用户配置文件。例如,美国专利申请公开No.2011/0238482描述了一种用于用户的数字配置文件,该数字配置文件采集、存储以及更新关于个人基因组数据库中的用户属性的信息,该个人基因组数据库与用户计算机通信。然而,现有技术通常提供的用户配置文件对于具有查看该用户配置文件的凭证的任何人而言,能够类似地访问。例如,美国专利申请公开No.2011/0238482的个人基因组能够由具有链接到该个人基因组的凭证的任何人访问,任何其他人不能访问。现有技术缺少以下能力:产生能够仅由配置文件描述的人访问的个人基因组和/或其它配置文件信息,以及能够由该人以及其他授权用户通过不同的受信任的访问来访问的独立的个人基因组和/或其它配置文件信息。In the prior art, it is known to provide a user profile that can include detailed information about a user. For example, U.S. Patent Application Publication No. 2011/0238482 describes a digital profile for a user that collects, stores, and updates information about the user's attributes in a personal genome database that communicates with the user's computer. However, the prior art typically provides user profiles that are similarly accessible to anyone with credentials to view the user profile. For example, the personal genome of U.S. Patent Application Publication No. 2011/0238482 is accessible to anyone with credentials linked to the personal genome, but not to anyone else. The prior art lacks the ability to generate a personal genome and/or other profile information that can be accessed only by the person described in the profile, as well as separate personal genome and/or other profile information that can be accessed by that person and other authorized users through different trusted access permissions.

本文描述的单向和双向数据流系统能够提供这样的分开的记录,因此允许人控制数据保密性,同时仍共享他们认为合适的某些数据。The unidirectional and bidirectional data flow systems described herein are able to provide such separate records, thereby allowing people to control data confidentiality while still sharing certain data as they see fit.

发明内容Summary of the Invention

本文描述的系统和方法可以提供一种综合性的、人人可访问的数字配置文件系统,该系统可以以安全方式采集、组织、存储和分发关于参与用户的详细信息,在一些实施方式中,该详细信息包括个人信息和/或敏感信息。本文描述的系统和方法可以在需要时提供授权的第三方应用程序对用户信息的多个部分的访问,同时仍保留用户的隐私。本文描述的系统和方法可以为动态的且自动可扩展的,从而几乎任何类型的数据可以被捕获且之后被聚集以适应用户的权限和/或隐私设置。The systems and methods described herein can provide a comprehensive, universally accessible digital profile system that securely captures, organizes, stores, and distributes detailed information about participating users, including, in some embodiments, personal and/or sensitive information. The systems and methods described herein can provide authorized third-party applications with access to multiple portions of a user's information when needed, while still preserving the user's privacy. The systems and methods described herein can be dynamic and automatically scalable, allowing nearly any type of data to be captured and subsequently aggregated to accommodate the user's permissions and/or privacy settings.

例如,一些实施方式可以提供如下这样的特征。所描述的系统和方法可以接收具有关于所述访问受控服务的账户的用户的属性的值。所描述的系统和方法可以确定所述值是否从由与所述用户相关联的组织发起的评估导出,其中所述组织具有关于所述访问受控服务的至少一个账户。当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,所描述的系统和方法可以将接收的所述值存储在所述数据库中的仅与所述用户相关联且通过所述组织的所述至少一个账户不可访问的记录中,以及将接收的所述值存储在与所述组织和所述用户相关联的单独记录中,其中由第三方对所述单独记录的访问受所述用户控制。当所述值从与由与所述用户相关联的所述组织发起的所述评估不同的来源导出时,所描述的系统和方法可以将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中。所描述的系统和方法可以确定所述属性是否与预测模型相关联。响应于确定所述属性与所述预测模型相关联,本文描述的系统和方法可以使用接收的所述值执行与所述属性相关联的所述预测模型以使用所述属性的分数和置信度因数生成预测值。当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,本文描述的系统和方法可以将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述组织和所述用户相关联的所述记录中。当所述值从不是由与所述用户相关联的组织发起的所述评估导出时,本文描述的系统和方法可以将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中。For example, some embodiments may provide features such as the following. The described systems and methods may receive a value for an attribute of a user having an account with the access-controlled service. The described systems and methods may determine whether the value is derived from an assessment initiated by an organization associated with the user, wherein the organization has at least one account with the access-controlled service. When the value is derived from the assessment initiated by the organization associated with the user, the described systems and methods may store the received value in a record in the database that is associated only with the user and is not accessible through the at least one account of the organization, and store the received value in a separate record associated with the organization and the user, wherein access to the separate record by third parties is controlled by the user. When the value is derived from a source different from the assessment initiated by the organization associated with the user, the described systems and methods may store the received value in the record in the database that is associated only with the user. The described systems and methods may determine whether the attribute is associated with a predictive model. In response to determining that the attribute is associated with the predictive model, the systems and methods described herein may execute the predictive model associated with the attribute using the received value to generate a predicted value using the score and confidence factor of the attribute. When the value is derived from the assessment initiated by the organization associated with the user, the systems and methods described herein may store the predicted value in the record associated only with the user in the database and in the record associated with the organization and the user. When the value is derived from the assessment not initiated by the organization associated with the user, the systems and methods described herein may store the predicted value in the record associated only with the user in the database.

附图说明BRIEF DESCRIPTION OF THE DRAWINGS

图1为根据本发明的实施方式的系统的图。FIG. 1 is a diagram of a system according to an embodiment of the present invention.

图2为根据本发明的实施方式的分析流程的框图。FIG2 is a block diagram of an analysis process according to an embodiment of the present invention.

图3为根据本发明的实施方式的分析模型流程示例。FIG3 is an example of an analysis model process according to an embodiment of the present invention.

图4A和图4B为示出根据本发明的实施方式的用于注册新评估工具的过程的流程图。4A and 4B are flow charts illustrating a process for registering a new assessment tool according to an embodiment of the present invention.

图5A为根据本发明的实施方式的单向数据流。FIG. 5A illustrates a unidirectional data flow according to an embodiment of the present invention.

图5B为根据本发明的实施方式的双向数据流。FIG. 5B illustrates bidirectional data flow according to an embodiment of the present invention.

图6为示出根据本发明的实施方式的用于使用单向数据流存储数据的过程的流程图。FIG6 is a flow chart illustrating a process for storing data using a unidirectional data flow according to an embodiment of the present invention.

图7为示出根据本发明的实施方式的用于借助风险容限评估的权限设置的过程的流程图。FIG7 is a flowchart illustrating a process for permission setting with risk tolerance assessment according to an embodiment of the present invention.

图8为示出根据本发明的实施方式的用于在组织视图上反映数据的过程的流程图。FIG8 is a flowchart illustrating a process for reflecting data on an organizational view according to an embodiment of the present invention.

图9为描述根据本发明的实施方式的权限设置控制数据共享的框图。FIG. 9 is a block diagram illustrating permission setting control data sharing according to an embodiment of the present invention.

具体实施方式DETAILED DESCRIPTION

本文中所描述的系统和方法可以提供综合性的、人人可访问的数字配置文件系统,该系统可以以安全方式捕获、组织、存储、和分发关于参与用户的详细信息。该系统可以形成详细的集中式用户模型,该模型可以针对每个参与用户描述多种多样的个人属性,诸如人口统计资料、物理特征、人格特质、兴趣、态度、资质、技能、职业能力素质、活动、推荐的行动、和历史事件。该系统可以在需要时提供授权的第三方应用程序对用户信息的多个部分的访问,同时仍保留用户的隐私。该系统可以为动态的且自动可扩展的,从而几乎任何类型的数据可以被捕获且之后被聚集以适应用户的权限和/或隐私设置。The systems and methods described herein can provide a comprehensive, universally accessible digital profile system that securely captures, organizes, stores, and distributes detailed information about participating users. The system can form a detailed, centralized user model that describes a wide variety of personal attributes for each participating user, such as demographics, physical characteristics, personality traits, interests, attitudes, qualifications, skills, professional competencies, activities, recommended actions, and historical events. The system can provide authorized third-party applications with access to multiple portions of a user's information when needed, while still preserving the user's privacy. The system can be dynamic and automatically scalable, so that virtually any type of data can be captured and later aggregated to suit the user's permissions and/or privacy settings.

授权的第三方数据使用者或第三方应用程序可以访问用户数据(例如借助密码方案),然而用户可以保持对其自身数据的控制且可以设置多层隐私过滤器,该多层隐私过滤器可以在释放到具体第三方数据使用者之前自动地聚集或掩盖其数据。如果需要,则用户可以视情况而定,选择数据共享机会的选择性加入或选择性退出。每个用户可以具有唯一的私人标识符,类似于硬件设备接收连接到其存储的数据的唯一IP地址的方式。第三方不具有对用户的私人标识符的访问权,然而第三方可以仍具有对用户数据的多个部分的访问权。中间的独特密码系统可以破译私人标识符且生成临时密码,该临时密码在短时段内将用户数据的多个部分链接到发请求的第三方应用程序。当第三方应用程序的交易完成(例如,第三方应用程序已接收和/或提交数据)时,可以使临时密码无效,从而第三方应用程序不再具有对用户数据的访问权。由于第三方应用程序可以保持不知道用户的私人标识符且可以仅借助特殊的中间密码系统来访问数据,因此该系统能控制何时可访问数据以及可访问哪种数据。Authorized third-party data users or third-party applications can access user data (e.g., through a cryptographic scheme), but users maintain control over their own data and can set up multiple layers of privacy filters that automatically aggregate or mask their data before releasing it to specific third-party data users. Users can opt in or out of data-sharing opportunities, as needed. Each user can have a unique private identifier, similar to how a hardware device receives a unique IP address linked to its stored data. Third parties do not have access to a user's private identifier, but they may still have access to various portions of the user's data. A unique intermediary cryptographic system can decrypt the private identifier and generate a temporary password that briefly links the various portions of the user's data to the requesting third-party application. When the third-party application's transaction is complete (e.g., the third-party application has received and/or submitted the data), the temporary password can be invalidated, removing the third-party application's access to the user's data. Because third-party applications remain unaware of the user's private identifier and can access data only through a specialized intermediary cryptographic system, the system can control when and what data can be accessed.

此外,捕获数据的原始应用程序可以具有利用从其它应用程序捕获的数据的能力,以便更好地定制每个用户使用数据的体验,尽管具有该数据是有价值的,但是该数据对于应用程序来说可能难以自身导出。例如,许多应用程序可以极大地得益于在应用程序会话开始时知道用户的英语阅读水平是怎样的。然而,应用程序开发者可能不具有创建其自身有效的阅读水平评估的行业知识和专长。此外,每当用户开始新应用程序时,用户可能领会不到要进行阅读水平评估。少量阅读专家反而可以开发声音的、基于研究的阅读水平评估工具,该工具可以用于一次性(或周期性、可能每6个月)评估用户的阅读水平。该阅读评估的结果然后可以被存储在用户的个人属性记录中且与可利用阅读水平数据的其它用户信任的应用程序共享,而无需确切地知道阅读评估如何确定阅读水平。采用该方式,每个应用程序可以在每次会话开始时知道用户的阅读水平且相应地适应文本信息的呈现。In addition, the original application that captures the data can have the ability to utilize the data captured from other applications in order to better customize the experience of each user using the data. Although having this data is valuable, it may be difficult for the application to derive it by itself. For example, many applications can greatly benefit from knowing what the user's English reading level is at the beginning of an application session. However, application developers may not have the industry knowledge and expertise to create their own effective reading level assessments. In addition, whenever a user starts a new application, the user may not understand that a reading level assessment is required. A small number of reading experts can instead develop a sound, research-based reading level assessment tool that can be used to assess the user's reading level once (or periodically, perhaps every 6 months). The results of this reading assessment can then be stored in the user's personal attribute record and shared with other user-trusted applications that can utilize reading level data, without having to know exactly how the reading assessment determines the reading level. In this way, each application can know the user's reading level at the beginning of each session and adapt to the presentation of text information accordingly.

根据本发明的一些实施方式,与数据隐私和聚合工具联接的密码映射(例如在用户标识符和临时密码之间)可以提供实体的、具商业利益的、且可靠的详细用户模型信息的源,该源向个人数据拥有者提供何时且如何共享其自身数据的选择。此外,第三方应用程序也可以为数据提供程序,因此允许底层用户模型随着使用继续成长。随着数据增长,模型内包含的数据的准确度可以在总准确度上继续增大。可以使用单向数据门和可选的双向门来管理用户配置文件数据,该单向数据门和可选的双向门可以允许这类数据被捕获、被存储、且被利用,以达到所描述的用户利益,同时保护用户的真实身份和隐私,而且同时还确保投资用户的应用程序和组织可以仍访问其捕获的数据。According to some embodiments of the present invention, a password mapping (e.g., between a user identifier and a temporary password) coupled with data privacy and aggregation tools can provide a tangible, commercially viable, and reliable source of detailed user profile information that provides personal data owners with choices about when and how to share their own data. Additionally, third-party applications can also be providers of data, thereby allowing the underlying user model to continue to grow with usage. As the data grows, the accuracy of the data contained within the model can continue to increase in overall accuracy. User profile data can be managed using one-way data gates and optional two-way gates that can allow such data to be captured, stored, and utilized to achieve the described user benefits while protecting the user's true identity and privacy, and while also ensuring that applications and organizations that have invested in the user can still access the data they capture.

在本文中所描述的系统和方法可以包括一个或多个计算机,该计算机也可以被称为处理器。计算机可以为能够执行算术操作和/或逻辑操作的任何一个或多个可编程机器。在一些实施方式中,计算机可以包括处理器、存储器、数据存储设备、和/或其它公知的或新型的部件。可以在物理上或者通过网络或无线链路连接这些部件。计算机还可以包括可指导前文提及的部件的操作的软件。计算机可以被称为由相关领域中的普通技术人员常用的术语,诸如服务器、PC、移动设备、路由器、交换机、数据中心、分布式计算机、和其它术语。计算机可以促进多个用户和/或其它计算机之间的通信、可以提供数据库、可以执行数据的分析和/或转换、和/或执行其它功能。将由普通技术人员所理解,在本文中所使用的那些术语为可互换的,以及可以使用能够执行所描述功能的任何计算机。例如,尽管术语“服务器”可以出现在如下说明书中,但是所公开的实施方式不限于服务器。The systems and methods described herein may include one or more computers, which may also be referred to as processors. A computer may be any one or more programmable machines capable of performing arithmetic and/or logical operations. In some embodiments, a computer may include a processor, memory, data storage device, and/or other known or novel components. These components may be connected physically or via a network or wireless link. The computer may also include software that directs the operation of the aforementioned components. Computers may be referred to by terms commonly used by those skilled in the art, such as server, PC, mobile device, router, switch, data center, distributed computer, and other terms. A computer may facilitate communication between multiple users and/or other computers, provide a database, perform data analysis and/or conversion, and/or perform other functions. It will be understood by those skilled in the art that the terms used herein are interchangeable, and any computer capable of performing the described functions may be used. For example, although the term "server" may appear in the following description, the disclosed embodiments are not limited to servers.

计算机可以借助一个或多个网络而彼此链接。网络可以为任何多个完全或部分互连的计算机,其中,一些或全部计算机能够彼此通信。将由普通技术人员所理解,计算机之间的连接在一些情况下可以为有线的(例如,借助以太网连接、同轴连接、光学连接、或其它有线连接)或可以为无线的(例如,借助Wi-Fi、WiMax、或其它无线连接)。计算机之间的连接可以使用任何协议,包括面向连接协议(诸如TCP)或无连接协议(诸如UDP)。至少两个计算机可以交换数据所通过的任何连接可以为网络的基础。Computers can be linked to each other via one or more networks. A network can be any number of fully or partially interconnected computers, wherein some or all of the computers are capable of communicating with each other. It will be understood by those of ordinary skill that the connection between computers can be wired (e.g., via Ethernet, coaxial, optical, or other wired connections) or can be wireless (e.g., via Wi-Fi, WiMax, or other wireless connections) in some cases. The connection between computers can use any protocol, including connection-oriented protocols (such as TCP) or connectionless protocols (such as UDP). Any connection through which at least two computers can exchange data can be the basis of a network.

配置文件系统Configuring the File System

图1示出根据本发明的实施方式的数字配置文件系统10的部件之间的关系。系统10可以允许用户连接到各种应用程序,上述各种应用程序可以被承载在数据分析平台16内的服务器15上或在外部被承载在第三方服务器14上。用户可以使用他们期望的几乎任何设备12连接到这些应用程序。例如,可以使用计算机,诸如台式PC、笔记本电脑、智能手机、平板电脑等。用户可以具有包括个人数据的配置文件。当启动应用程序时,这些应用程序可以请求用户的个人配置文件的一部分以达到定制用户体验以满足例如每个具体用户的偏好、倾向和学习风格的目的。FIG1 illustrates the relationships between the components of a digital profiling system 10 according to an embodiment of the present invention. System 10 allows users to connect to various applications, which may be hosted on a server 15 within a data analysis platform 16 or externally on a third-party server 14. Users can connect to these applications using virtually any device 12 they desire. For example, a computer such as a desktop PC, laptop, smartphone, tablet, etc. may be used. Users may have a profile containing personal data. When launching an application, these applications may request a portion of the user's personal profile to customize the user experience to suit, for example, each specific user's preferences, inclinations, and learning style.

在一些实施方式中,用户配置文件17(在本文中也称为“用户模型”)可以为系统10的中央数据管理部件。用户模型17可以充当用于存储关于用户的技能、知识、个性、人口统计资料、兴趣、资质、态度和行为(统称为个人属性)的所有方面的信息的安全存储库。一个或多个用户模型服务器17可以管理用户数据,而一个或多个个人属性(PersonalAttribute,PA)目录服务器18和数据存储服务器19可以控制包含用户数据的多个部分的数据库文件。In some embodiments, user profiles 17 (also referred to herein as "user models") may be the central data management component of system 10. User models 17 may serve as a secure repository for storing information about all aspects of a user's skills, knowledge, personality, demographics, interests, aptitudes, attitudes, and behaviors (collectively, personal attributes). One or more user model servers 17 may manage user data, while one or more personal attribute (PA) directory servers 18 and data storage servers 19 may control database files containing various portions of user data.

为了检索用户数据,应用程序可以首先获得对临时密码的访问权,该临时密码可以用于在短时间内标识用户而实际上不让应用程序知道用户实际上是谁。在可被承载在平台16内的应用程序15的情况下,用户模型处理器17可以自动地生成临时密码且在应用程序启动序列期间将该密码发送到应用程序15。应用程序可以使用该密码来访问用户的个人配置文件数据的一部分。To retrieve user data, an application may first obtain access to a temporary password that can be used to identify the user for a short period of time without actually letting the application know who the user actually is. In the case of an application 15 that can be hosted within a platform 16, a user profile processor 17 may automatically generate a temporary password and send the password to the application 15 during the application startup sequence. The application may use the password to access a portion of the user's personal profile data.

在可从平台16外部的第三方服务器14启动的应用程序的情况下,该应用程序可以通过如下方式请求临时密码:将用户重新导向到用户模型17内的功能,该功能允许用户登录平台16、然后将临时密码传回给应用程序14。一旦应用程序14接收到临时密码,则应用程序14可以使用该临时密码检索用户的数字配置文件的一部分。当应用程序14希望将关于用户的新观察结果存储在该用户的个人配置文件(用户模型)17中时,也可以使用临时密码。基于由PA目录服务器18管理的位置信息,可以将从应用程序接收的数据存储在数据存储器19之一中。In the case of an application that can be launched from a third-party server 14 external to the platform 16, the application can request a temporary password by redirecting the user to a function within the user model 17 that allows the user to log into the platform 16 and then passing the temporary password back to the application 14. Once the application 14 receives the temporary password, it can use it to retrieve a portion of the user's digital profile. The temporary password can also be used when the application 14 wishes to store new observations about the user in the user's personal profile (user model) 17. Data received from the application can be stored in one of the data stores 19 based on location information managed by the PA directory server 18.

用户模型服务器17可以负责处理与管理用户模型相关的活动,该用户模型通过保持描述用户的许多方面的许多个体PA而接近实际用户。出于安全原因,可以将个体PA散布在不同物理服务器19上的多个数据存储器上,且可以通过非描述性编码的标识符来标识个体PA。例如,标识符可以具有分为四组四个字符的16个字母数字字符的形式。采用该方式,标识符可以看起来类似于传统的因特网协议(Internet Protocol,IP)地址。可能不存在标识哪个服务器包含哪个PA的可预测图案。而是,中央PA目录服务器18可以与实际上包含每个PA的数据存储器19保持联系。The user model server 17 can be responsible for handling activities related to managing a user model that approximates the actual user by maintaining many individual PAs that describe many aspects of the user. For security reasons, the individual PAs can be spread across multiple data stores on different physical servers 19, and the individual PAs can be identified by non-descriptively coded identifiers. For example, the identifier can have the form of 16 alphanumeric characters divided into four groups of four characters. In this way, the identifier can look similar to a traditional Internet Protocol (IP) address. There may be no predictable pattern that identifies which server contains which PA. Instead, the central PA directory server 18 can maintain contact with the data store 19 that actually contains each PA.

使用该方案可以确保用户数据的安全和隐私,这是因为数据存储器19可以仅包含编码的用户ID和编码的PA ID的列表。在对数据存储器19的任何类型的恶意行为的情况下,仅不具有描述性上下文的数字数据将是可用的。PA目录服务器18可以仅知道PA的名字为编码标识符的集合(例如16个字符串)以及去往个体数据存储器19的指针。用户模型服务器17可以仅保有用户数据达很短的时段,因为借助PA目录服务器18使数据按次序进出数据存储器19。因此,在用户模型服务器18中通常可以不具有任何潜在入侵者可用的永久性信息。Using this approach, the security and privacy of user data can be ensured because the data store 19 can contain only a list of encoded user IDs and encoded PA IDs. In the event of any type of malicious activity against the data store 19, only the numeric data without descriptive context will be available. The PA directory server 18 may only know the PA's name as a set of encoded identifiers (e.g., a 16-character string) and a pointer to the individual data store 19. The user model server 17 may only hold user data for a very short period of time because data is sequentially entered and exited from the data store 19 by the PA directory server 18. Therefore, there may generally be no permanent information in the user model server 18 that could be used by a potential intruder.

注册应用程序Registering an application

图4A至图4B示出用于注册新应用程序14的过程。如上所述,应用程序14、应用程序15可以用于扩展和更新用户模型17。可以在系统10内注册新的应用程序14、应用程序15,以描述被评估的属性类型以及将评估和观察的结果与现有的或新的个人属性合并。一旦注册应用程序,则可以将评估结果存储在任何用户的个人用户模型17中,以及第三方应用程序14可以立即开始使用新的属性信息。Figures 4A and 4B illustrate the process for registering a new application 14. As described above, applications 14 and 15 can be used to extend and update user model 17. New applications 14 and 15 can be registered within system 10 to describe the type of attributes being assessed and to merge the assessment and observation results with existing or new personal attributes. Once an application is registered, the assessment results can be stored in any user's personal user model 17, and third-party applications 14 can immediately begin using the new attribute information.

当第三方应用程序14或其相关联的供应商联系由系统10操作的供应商支持网站时,注册过程可以开始于104。在一些实施方式中,所有的供应商必须具有注册的供应商ID以参与系统10。该供应商ID可以用于向用户11提供背景信息且可以与专用于供应商的隐私过滤规则和聚合过滤规则相关联,该用户11希望控制哪些供应商可以看到其个人属性数据。在106,系统10可以确定供应商是否具有供应商ID。如果供应商还未具有供应商ID,则在108,可以例如通过在由系统10操作的供应商支持网站上完成供应商申请表请求一个供应商ID。在110,系统管理员可以针对完整性和可接受性来检查供应商的请求。该系统管理员可以按现状接受供应商的请求、返回该请求以求更多信息或阐明,或可以立刻拒绝申请。如果接受供应商的请求,如在112所确定,则在114,可以发布唯一供应商ID并将其存储在系统的用户模型处理器17中。可以连同每个数据请求一起提交供应商ID,从而系统10可以确认发请求的供应商保持处于活跃状态以及从而用户的隐私过滤器可以充分地控制被呈现给供应商的数据类型。The registration process may begin at 104 when a third-party application 14 or its associated vendor contacts the vendor support website operated by system 10. In some embodiments, all vendors must have a registered vendor ID to participate in system 10. This vendor ID can be used to provide context to user 11 and can be associated with vendor-specific privacy and aggregation filtering rules, with the user 11 wishing to control which vendors can see their personal attribute data. At 106, system 10 may determine whether the vendor has a vendor ID. If the vendor does not already have a vendor ID, at 108, the vendor ID may be requested, for example, by completing a vendor application form on the vendor support website operated by system 10. At 110, a system administrator may review the vendor's request for completeness and acceptability. The system administrator may accept the vendor's request as is, return it for further information or clarification, or immediately deny the request. If the vendor's request is accepted, as determined at 112, a unique vendor ID may be issued and stored in the system's user model processor 17 at 114. A vendor ID may be submitted along with each data request so that the system 10 can confirm that the requesting vendor remains active and so that the user's privacy filters can adequately control the type of data presented to the vendor.

在116,供应商可以完成并提交新的评估表。可以单独地限定各个个体评估,从而系统10可以确定该评估有多相关于现存的个人属性或者新的个人属性是否合适。The supplier may complete and submit the new assessment form at 116. Each individual assessment may be individually qualified so that the system 10 can determine how relevant the assessment is to existing personal attributes or whether new personal attributes are appropriate.

可以执行子过程118以将评估结果映射到个人属性。供应商可以提供关于每个评估结果值以及他们认为那些结果有多相关于现存的属性结构的信息。由于评估可以具有多于一个结果,因此可以采用迭代方式单独地处理每个结果。系统10可以执行子过程118,直到已经处理和映射所有的结果。在一些实施方式中,可以同时处理各个结果。此外,在一些实施方式中,这类处理可以涉及用户模型17的所有其它个人属性,该用户模型17与在分析处理器20中指定的使能关系连接。Subprocess 118 may be executed to map the assessment results to personal attributes. The provider may provide information regarding the value of each assessment result and how relevant they believe those results are to the existing attribute structure. Since an assessment may have more than one result, each result may be processed individually in an iterative manner. System 10 may execute subprocess 118 until all results have been processed and mapped. In some embodiments, each result may be processed simultaneously. Furthermore, in some embodiments, such processing may involve all other personal attributes of user model 17 connected to the enabling relationship specified in analysis processor 20.

在120,系统10可以确定结果是否需要新属性。如果不需要新属性,则在122,可以将该结果添加到影响现存个人属性的资源的列表中。如果需要新属性,则在124,供应商可以请求新属性,以及识别所提出的新属性的特性从而可以创建新个人属性。在126,系统管理员可以检查对新个人属性的请求,以确保没有现存属性可以用于捕获评估结果。在128,系统管理员可以接受对于新个人属性的需求、识别足以捕获评估结果的现存个人属性、或将该请求返回到供应商以求进一步阐明。如果接受新属性请求,则在130,系统管理员可以创建新属性,在注册过程结束时,该新属性可以在分析处理器20、应用程序14、应用程序15中以及对于所有用户模型17是立即可用的。At 120, the system 10 may determine whether the result requires a new attribute. If no new attribute is required, then at 122, the result may be added to a list of resources that affect existing personal attributes. If a new attribute is required, then at 124, the vendor may request the new attribute and identify the characteristics of the proposed new attribute so that the new personal attribute can be created. At 126, the system administrator may review the request for the new personal attribute to ensure that no existing attributes can be used to capture the evaluation results. At 128, the system administrator may accept the request for the new personal attribute, identify existing personal attributes that are sufficient to capture the evaluation results, or return the request to the vendor for further clarification. If the new attribute request is accepted, then at 130, the system administrator may create the new attribute, which may be immediately available in the analysis processor 20, the application 14, the application 15, and to all user models 17 at the end of the registration process.

许多评估结果可以要求应用聚合规则以便向第三方应用程序14呈现聚合信息,而不实际上派发用户对评估的原始分数。在132,系统10可以确定聚合规则是否为必需的。如果将应用聚合规则,则在134,供应商和/或系统管理员可以借助系统的供应商支持网站将这些聚合规则加载到用户模型处理器17中。在136,可以执行最后的检查和批准过程以确保正确地设置所有事物。在138,可以接受应用程序14或者系统管理员可以拒绝应用程序14的激活。Many assessment results may require the application of aggregation rules in order to present aggregated information to the third-party application 14, rather than actually assigning the user's raw score for the assessment. At 132, the system 10 may determine whether aggregation rules are required. If aggregation rules are to be applied, at 134, the vendor and/or system administrator may load these aggregation rules into the user model processor 17 via the system's vendor support website. At 136, a final review and approval process may be performed to ensure that everything is set up correctly. At 138, the application 14 may be accepted, or the system administrator may deny activation of the application 14.

如果接受评估,则在140,可以激活评估ID,以及可以开始捕获结果。如果已经拒绝评估,在142,可以为供应商准备合适的消息。如果需要细化,如在128所确定,则在144,可以为供应商准备合适的消息。在146,可以将评估请求的最终状态和任何准备的消息发送回供应商。If the evaluation is accepted, then at 140, the evaluation ID can be activated and results capture can begin. If the evaluation has been rejected, at 142, an appropriate message can be prepared for the supplier. If refinement is required, as determined at 128, then at 144, an appropriate message can be prepared for the supplier. At 146, the final status of the evaluation request and any prepared message can be sent back to the supplier.

单向数据流One-way data flow

系统10可以提供单向数据流和/或双向数据流。如上文所讨论,系统10可以用作为对于描述特定个体的PA的存储库以及可以将那些PA的多个部分传送到计算机应用程序,该计算机应用程序可以利用该数据来提供对于每个用户所定制的更好用户体验。当应用程序希望作为合作方应用程序而参与系统10时,该应用程序的开发者可以注册该应用程序以及宣布该应用程序将读取和写入哪些PA。尽管存在可以限定的成百上千个PA,但是每个应用程序可以被限制到仅那些可在逻辑上被视为发请求的应用程序的特定域所感兴趣的PA。The system 10 can provide unidirectional data flow and/or bidirectional data flow. As discussed above, the system 10 can be used as a repository for PAs that describe specific individuals and can transmit multiple portions of those PAs to computer applications, which can use the data to provide a better user experience customized for each user. When an application wishes to participate in the system 10 as a partner application, the developer of the application can register the application and announce which PAs the application will read and write. Although there are hundreds or thousands of PAs that can be defined, each application can be limited to only those PAs that can be logically considered to be of interest to the specific domain of the requesting application.

为了那个目的,每个参与应用程序14可以创建和实施“读取合同”和“写入合同”,该“读取合同”和“写入合同”可以分别限定作为发起应用程序的结果而将读取和写入哪些PA。在注册过程(例如,上文描述的图4A至图4B的过程)期间,请求的读取元件的有效性可以由人类数据管理员来验证,该人类数据管理员验证请求的数据实际上与应用程序的目的和功能有关。此外,可以通过如下方式对发请求的应用程序屏蔽每个用户的真实身份:阻止所有的个人可识别信息被传输到发请求的应用程序以及以一定方式聚合某些数据元素,该方式可以产生真实用户的高度准确且有意义的近似而不提供可用于识别个体用户的真实值。可以使用临时访问令牌代替个人可识别信息,且那些访问令牌可以不存续在同一应用程序的多个会话上。因此,在应用程序的使用的一个会话期间获得访问令牌后续对于该应用程序或任何其它应用程序来说是无价值的。To that end, each participating application 14 can create and implement a "read contract" and a "write contract" that can define which PAs will be read and written, respectively, as a result of initiating the application. During the registration process (e.g., the process of Figures 4A to 4B described above), the validity of the requested read elements can be verified by a human data administrator who verifies that the requested data is actually relevant to the purpose and function of the application. In addition, the true identity of each user can be shielded from the requesting application by preventing all personally identifiable information from being transmitted to the requesting application and by aggregating certain data elements in a manner that produces a highly accurate and meaningful approximation of the real user without providing real value that can be used to identify the individual user. Temporary access tokens can be used in place of personally identifiable information, and those access tokens may not persist across multiple sessions of the same application. Therefore, access tokens obtained during one session of use of an application are subsequently worthless to that application or any other application.

图5A为根据本发明的实施方式的单向数据流。如在图5A中可见,每个用户可以具有与其账户相关联的许多不同的数据层。最底层1140可以存储个体的虚拟表示且可以包含写入到个体账户中的所有数据的副本。每个个体账户可以包含大量的PA1120。每个PA可以描述个体的行为、倾向、偏好、知识、技能、个性或能力的一个方面。当组合在个体记录1140中时,这些PA可以提供该数据描述的真实个体的有意义的近似。FIG5A illustrates a one-way data flow according to an embodiment of the present invention. As can be seen in FIG5A , each user can have many different data layers associated with their account. The lowest layer 1140 can store a virtual representation of the individual and can contain a copy of all data written to the individual's account. Each individual account can contain a large number of profiles 1120. Each profile can describe an aspect of an individual's behavior, tendencies, preferences, knowledge, skills, personality, or abilities. When combined in an individual record 1140, these profiles can provide a meaningful approximation of the real individual described by the data.

如果特定用户与通过提供对具体学习或跟踪应用程序的访问来投资该个体的一个或多个组织相关联,则那些组织中的每一者可以为该个体设置组织记录。组织可以为包括个体用户作为成员且为了个体的利益还提供对软件应用程序的(付费或非付费)访问的几乎任何实体。图5A的示例示出了7个不同的组织记录,诸如学校记录1130。这些组织记录中的每一者包含为了个体和组织的利益而可以由该特定组织发起的应用程序所捕获的PA值1110,如上文所讨论。如在图5A中可见,可以具有许多不同的组织,这些组织具有与单一个体用户相关联的多种多样的目的和兴趣。这些组织中的一些组织将对存储和跟踪特殊PA值感兴趣,这些特殊PA值仅是由那些特定组织提供的应用程序套件所感兴趣的。然而,可以具有将发起存储和检索PA值的应用程序的其它组织,由其它组织发起的应用程序也可以正在存储和检索这些PA值。If a particular user is associated with one or more organizations that invest in the individual by providing access to specific learning or tracking applications, each of those organizations can set up an organization record for the individual. An organization can be almost any entity that includes individual users as members and also provides (paid or non-paid) access to software applications for the benefit of the individual. The example of Figure 5A shows 7 different organization records, such as school records 1130. Each of these organization records contains PA values 1110 captured by the application that can be initiated by the specific organization for the benefit of the individual and the organization, as discussed above. As can be seen in Figure 5A, there can be many different organizations that have a variety of purposes and interests associated with a single individual user. Some of these organizations will be interested in storing and tracking special PA values that are only of interest to the application suites provided by those specific organizations. However, there can be other organizations that will initiate applications that store and retrieve PA values, and applications initiated by other organizations can also be storing and retrieving these PA values.

捕获的数据可以被形象化为被细分为如图5A所示的PA网格的二维平面的层叠。每个PA 1110可以具有在每个组织记录内的特定位置。因此,在组织之间的单一纵列中的所有PA 1110可以表示用于同一PA 1110的不同值。例如,一个组织可以将个体的外语流利度视为“初学者”水平,而另一组织可以将个体的同一语言的流利度视为“中级”水平,这取决于每个组织的标准。可以根据在图6中所描述的过程存储PA值的每个新实例。The captured data can be visualized as a stack of two-dimensional planes that are subdivided into a PA grid as shown in FIG5A . Each PA 1110 can have a specific location within each organization's record. Thus, all PAs 1110 in a single column across organizations can represent different values for the same PA 1110. For example, one organization may consider an individual's foreign language proficiency to be at a "beginner" level, while another organization may consider an individual's proficiency in the same language to be at an "intermediate" level, depending on each organization's standards. Each new instance of a PA value can be stored according to the process described in FIG6 .

图6为示出根据本发明的实施方式的用于使用单向数据流存储数据的过程的流程图。在1205,可通过应用程序观察新PA值并将该新PA值发送到系统10,例如借助应用程序接口(Application Programming Interface,API)。在1210,系统10可以确定提交的应用程序是否已被用于当前个体的组织发起。可能的是,该应用程序被零个或更多个组织发起。如果该应用程序已被零个组织发起,则可以假设数据严格地用于个体用户的利益且不从已为个体建立组织记录的任何组织的努力或投资导出。在该情况下,在1240,直接将数据存储在个体记录中。6 is a flow chart illustrating a process for storing data using a unidirectional data stream according to an embodiment of the present invention. At 1205, a new PA value may be observed by an application and sent to the system 10, for example, via an application programming interface (API). At 1210, the system 10 may determine whether the submitted application has been initiated by the organization for the current individual. It is possible that the application has been initiated by zero or more organizations. If the application has been initiated by zero organizations, it may be assumed that the data is strictly for the benefit of the individual user and is not derived from the efforts or investments of any organization that has established an organizational record for the individual. In this case, at 1240, the data is stored directly in the individual record.

如果捕获PA数据的应用程序实际上与一个或多个组织相关联,则在1215,可以将PA值存储在发起该应用程序的每个组织的组织记录中。如果多于一个组织已发起用于同一个体用户的同一应用程序,则所有的发起组织可以接收观察的数据,不管如何启动该应用程序或该应用程序位于何处。采用该方式,个体学习者可以接收针对他的/她的工作的信誉,而无需完成承载在多个组织服务器上的同一应用程序中的任务。If the application capturing the PA data is actually associated with one or more organizations, then at 1215, the PA value can be stored in the organizational record of each organization that originated the application. If more than one organization has sponsored the same application for the same individual user, all sponsoring organizations can receive the observed data, regardless of how the application was launched or where the application is located. In this way, an individual learner can receive credit for his/her work without having to complete tasks in the same application hosted on multiple organizations' servers.

一旦将数据存储在一个或多个组织记录中,则在1220,系统10可以自动地将输入数据和已与受影响的PA相关联的任何预测模型进行核对。如果一个或多个模型使用进来的PA值作为输入,则在1225,可以执行受影响的模型以及可以在所有受影响的组织中更新形成的预测PA值(更多细节参看下文的“预测分析和建模”章节)。预测模型的结果可以就像观察到的PA值那样操作,且可以自动地被存储在已发起初始进行PA观察的应用程序的所有组织记录中。Once the data is stored in one or more organizational records, the system 10 can automatically check the input data against any predictive models associated with the affected PA at 1220. If one or more models use the incoming PA values as input, the affected models can be executed and the resulting predicted PA values can be updated across all affected organizations at 1225 (see the "Predictive Analysis and Modeling" section below for more details). The results of the predictive models can be manipulated just like observed PA values and can be automatically stored in all organizational records for which the application for the initial PA observation was initiated.

此时,所有的发起组织记录可以已利用新观察结果和与该初始观察相关的所有预测副作用来更新。现在系统10可以使用单向门来自动地将新数据下拖到个体记录中,从而可以以个体希望的任何方式来使用和共享该新数据。然而,在这可以发生之前,在一些实施方式中,在1230,系统10可以首先检查以看出数据是否服从家庭教育权利和隐私法(FamilyEducational Rights and Privacy Act,FERPA),该FERPA限制由从美国政府接收资金的应用程序或组织捕获的数据的共享。如果数据来自不服从FERPA规则的任何源,则在1240,可以将数据和所有衍生预测复制到个体记录中。At this point, all originating organization records may have been updated with the new observation and all predicted side effects associated with that initial observation. The system 10 can now use a one-way gate to automatically pull the new data down into the individual record so that it can be used and shared in any way the individual wishes. However, before this can happen, in some embodiments, at 1230, the system 10 may first check to see if the data is compliant with the Family Educational Rights and Privacy Act (FERPA), which restricts the sharing of data captured by applications or organizations that receive funding from the U.S. government. If the data is from any source that is not compliant with FERPA rules, then at 1240, the data and all derived predictions may be copied to the individual record.

如果输入数据服从FERPA规则,则系统10可以要求未成年人的法定父母或监护人清楚地声明该数据供个人使用。称为“声明我的数据”的过程可以被要求一次,以便授权进入的PA值通过单向门持续自动向下迁移到个体记录,在此,数据的个体拥有者可以为了他的/她的利益而使用该数据。例如,不可以将已经从由学校或教育机构(已从美国教育部门接收资金)针对18岁以下的个体发起的应用程序所捕获的数据与任何其它实体(包括该数据所描述的学生的个体记录)共享。系统10接口可以包括“声明我的数据”按钮或选项,当被点击或选择时,该按钮或选项可以产生电子表格,该电子表格可以用于提交在各种组织与本发明内的个体记录之间共享数据的授权。当父母、监护人或合格的学生使用“声明我的数据”表格且指定涉及的特定组织时,来自由那些组织发起的应用程序的数据可以自动地被迁移通过单向门且从组织向下流动到个体记录,在此可以将该数据用于个体的利益。如果输入数据服从FERPA规则,则在1235,系统10可以检查以看出是否已经完成合适的授权。如果已提供授权许可,则在1240,将数据存储在个体记录中。如果放弃FERPA约束的授权还未被授予,则输入数据可以不被存储在个体记录中且将单独地保持在组织记录内;以及在1255,该过程可以结束。If the input data is subject to FERPA regulations, the system 10 can require the legal parent or guardian of the minor to clearly declare that the data is for personal use. A process called "Declare My Data" can be required once so that the PA values authorized for entry are continuously and automatically migrated down through a one-way gate to the individual record, where the individual owner of the data can use the data for his/her benefit. For example, data captured from an application initiated by a school or educational institution (that has received funding from the U.S. Department of Education) for individuals under the age of 18 cannot be shared with any other entity (including the individual record of the student described by the data). The system 10 interface can include a "Declare My Data" button or option that, when clicked or selected, can generate an electronic form that can be used to submit authorization to share data between various organizations and individual records within the present invention. When a parent, guardian, or qualified student uses the "Declare My Data" form and specifies the specific organizations involved, data from applications initiated by those organizations can be automatically migrated through a one-way gate and flow from the organization down to the individual record, where the data can be used for the individual's benefit. If the input data is subject to FERPA regulations, the system 10 may check to see if the appropriate authorization has been completed at 1235. If authorization has been provided, the data may be stored in the individual record at 1240. If authorization to waive FERPA restrictions has not been granted, the input data may not be stored in the individual record and will be maintained solely within the organizational record; and the process may end at 1255.

如果输入数据使其通过所有的单向门,则在1240,可以将该输入数据存储在个体记录中,以及在1245,可以触发已与处于个体记录级别的PA相关联的任何预测模型。在1250,可以依次执行每个模型,以及可以将合适的预测值添加到个体记录中。一旦所有的这些预测模型已完成,则在1255,该过程可以结束。If the input data makes it through all one-way gates, then at 1240, the input data can be stored in the individual record, and at 1245, any predictive models associated with the PA at the individual record level can be triggered. At 1250, each model can be executed in turn, and the appropriate predicted value can be added to the individual record. Once all of these predictive models have completed, the process can end at 1255.

双向数据流Bidirectional data flow

默认地,每个用户的性能属性可以被分离在单独的组织记录中,以及系统10可以使用单向门将存储在所有那些组织记录中的所有数据投影到个体记录上。因此,个体记录可以包含已由来自任一组织的任一应用程序观察的所有PA的值。尽管当个体希望使用为了读取那些PA所准备的应用程序且适应其用户体验时,数据在个体记录上的该投影可以是非常有用的,但是可以具有可使用数据但仅借助从与个体用户相关联的组织记录之一发起的应用程序可用的更多应用程序。By default, each user's performance attributes can be separated into separate organizational records, and the system 10 can use a one-way gate to project all data stored in all those organizational records onto the individual record. Thus, the individual record can contain the values of all PAs that have been observed by any application from any organization. While this projection of data onto individual records can be very useful when an individual wants to use an application that is prepared to read those PAs and tailor its user experience, there may be more applications that can use the data but only through applications launched from one of the organizational records associated with the individual user.

返回到前文提及的阅读水平评估的示例,假设用户正加入已为个体设置组织记录的学校,以及该学校已发起(除了其它方面)能够准确地评估用户的阅读水平的阅读辅导器。现在进一步假设该同一个体为致力于电子工程的课题的专业团体的成员,以及她的成员资格包括对教导成员电子电路和通过封闭电路的电子流的基础的智能辅导器的访问。Returning to the reading level assessment example mentioned above, assume that a user is joining a school that has set up an organizational record for the individual, and that the school has launched a reading tutor that can (among other things) accurately assess the user's reading level. Now further assume that the same individual is a member of a professional group dedicated to the subject of electronic engineering, and that her membership includes access to an intelligent tutor that teaches members the basics of electronic circuits and the flow of electrons through closed circuits.

该智能辅导器可以有能力基于正使用该智能辅导器的个体学生的阅读水平调整学习材料的呈现。因此,阅读技能较低的学生接收具有使用较小词的较长描述的教材,而阅读水平较高的学生接收更简洁的文字材料,该文字材料使用高级语言的能力来利用较少但较复杂的词快速地且准确地传达关键概念。The intelligent tutor may have the ability to adjust the presentation of learning materials based on the reading level of the individual student using the intelligent tutor. Thus, students with lower reading skills receive instructional materials with longer descriptions using smaller words, while students with higher reading levels receive more concise text that uses the power of advanced language to quickly and accurately convey key concepts using fewer but more complex words.

创建用于传达关于电气电路的学习材料的智能辅导器的电气工程师可能无法胜任还建立能够评估每个用户的阅读水平的准确工具。因此,智能辅导器可能需要使用由阅读辅导器产生的评估数据的方式,通过个体的学校使该阅读辅导器可用。一旦电气辅导器知道阅读水平,则它可以适当地调整到个体的需求,但是可能无法真实地看到阅读辅导器的数据,这是因为该数据被存储在不同组织的记录中。An electrical engineer creating an intelligent tutor for delivering learning materials about electrical circuits might not be able to also create an accurate tool capable of assessing each user's reading level. Therefore, the intelligent tutor might need to make the reading tutor available to an individual's school using assessment data generated by the reading tutor. Once the electrical tutor knows the reading level, it can adjust appropriately to the individual's needs, but the reading tutor's data might not be visible to the individual because it is stored in records at a different organization.

图5B中示出的可选双向数据流和图8中的流程图可以描述在拥有数据的个体的许可下,如何可以在组织之间共享数据。假设个人属性的多个观察结果已被存储在上文描述的使用单向方法的系统中,则现在可以与不是始发组织的组织共享那些观察结果。使用下文更详细描述的许可设置,可以通过双向门使个人属性上移到数据层叠,该双向门允许所选数据从个体记录流向目标组织记录。The optional bidirectional data flow shown in FIG5B and the flowchart in FIG8 can illustrate how data can be shared between organizations with the permission of the individual who owns the data. Assuming that multiple observations of individual attributes have been stored in the system using the unidirectional method described above, those observations can now be shared with an organization other than the originating organization. Using the permission settings described in more detail below, individual attributes can be moved up the data stack through a bidirectional gate that allows selected data to flow from the individual record to the target organization record.

图5B为根据本发明的实施方式的双向数据流。在图5B中,带轮廓线的空方格1150表示已从个体记录上移到一个或多个组织记录的PA数据。所有的这些数据项可以存在于个体记录中且可以基于一个或多个逻辑规则而通过双向门1160被移动到组织记录,该一个或多个逻辑规则可以管理迁移过程同时保留用户的隐私和安全。FIG5B illustrates a bidirectional data flow according to an embodiment of the present invention. In FIG5B , outlined empty squares 1150 represent PA data that has been moved from an individual record to one or more organizational records. All of these data items may exist in the individual record and may be moved to the organizational record through a bidirectional gate 1160 based on one or more logic rules that can manage the migration process while preserving the user's privacy and security.

例如,在图5B中,用户可以对两个不同的情形采用相同的标准化测试。第一测试可以已由专业团体管理,该用户为该专业团体的成员。第二测试可以已由标准化测试组织管理。在两种情况下,可以已将结果存储在两个组织的记录中(因为那些组织发起了测试应用程序),以及也可以已经通过单向门将这些结果迁移到个体记录中。然而,用户的雇主可以已指示,它想要看到该标准化测试的结果以便更有效地向个体提供持续的教育资源。For example, in Figure 5B, a user may take the same standardized test for two different situations. The first test may have been administered by a professional group of which the user is a member. The second test may have been administered by a standardized testing organization. In both cases, the results may have been stored in the records of both organizations (because those organizations sponsored the testing application), and the results may have also been migrated to the individual's record through a one-way door. However, the user's employer may have indicated that it would like to see the results of the standardized test in order to more effectively provide ongoing educational resources to the individual.

为了实现这点,可以通过双向门1170将存在于个体记录中的测试数据从个体记录移动到用户的雇主记录。按照该方式,可以检查双向门内的隐私规则以确保用户愿意与其雇主共享测试数据。如果不是,则双向门中的隐私过滤器可以阻止数据流回到雇主记录,以及雇主甚至可以从来不知道标准化测试数据存在。To accomplish this, the test data residing in the individual record can be moved from the individual record to the user's employer record via a two-way gate 1170. In this manner, the privacy rules within the two-way gate can be checked to ensure that the user is willing to share the test data with their employer. If not, the privacy filter in the two-way gate can prevent the data from flowing back to the employer record, and the employer may never even know that the standardized test data exists.

利用初始从用户的学校记录及其健身俱乐部记录获得的某一医疗保健数据,类似的场景可以发生。一旦数据借助单向门到达个体记录,则可以借助另一双向门1180使该数据对于用户的医疗健康记录立即可用。每个个体PA和每个组织可以服从定制的安全和隐私逻辑规则,上述规则确定来自个体记录的数据是否可以向上流回到组织。A similar scenario can occur using some healthcare data initially obtained from a user's school records and their health club records. Once the data reaches the individual record via a one-way gate, it can be made immediately available to the user's medical health record via another two-way gate 1180. Each individual PA and each organization can be subject to customized security and privacy logic rules that determine whether data from the individual record can flow back up to the organization.

图8为示出根据本发明的实施方式的用于在组织视图上反映数据的过程的流程图。在该过程中,双向门可以将来自个体记录的数据反映到有资格查看数据的所有组织记录。在1405,可以在个体记录中更新个人属性。系统10可以循环通过与个体相关联的一系列组织以确定哪些组织应当能够查看新数据。FIG8 is a flow chart illustrating a process for reflecting data on an organizational view, according to an embodiment of the present invention. In this process, a bidirectional gate can reflect data from an individual record to all organizational records that are eligible to view the data. At 1405, personal attributes can be updated in the individual record. System 10 can loop through the list of organizations associated with the individual to determine which organizations should be able to view the new data.

在1410,系统10可以识别第一组织,以及在1415,系统10可以执行许可规则集以确定是否授权该组织查看PA。如果不是,则该过程可以跳过下一动作,否则在1420,可以将PA数据链接到(例如复制到)匹配组织ID的组织记录。在1425,系统10可以检查以看出其它组织记录是否附接到用户。如果是,则在1430,可以取来下一组织ID,以及该过程可以从1415开始重复。如果没有其它组织附接到个体,则在1435,该过程可以结束。At 1410, the system 10 can identify the first organization, and at 1415, the system 10 can execute the permission rule set to determine whether the organization is authorized to view the PA. If not, the process can skip the next action, otherwise at 1420, the PA data can be linked to (e.g., copied to) the organization record with the matching organization ID. At 1425, the system 10 can check to see if other organization records are attached to the user. If so, at 1430, the next organization ID can be retrieved, and the process can repeat from 1415. If no other organizations are attached to the individual, at 1435, the process can end.

借助风险容限评估的许可设置Permission settings with risk tolerance assessment

系统10可以采用语义上智能安全和隐私风险容限评估,该评估使用一系列专业工具来得出关于用户在各种语境中对共享信息的态度的详细信息。用户模型17可以负责进行这些评估。基于该评估的结果,系统10可以自动地将用户归类为许多不同的安全配置文件之一,上述安全配置文件绝对地自动设置对于所有PA值的共享权限。System 10 can employ semantically intelligent security and privacy risk tolerance assessments that use a range of specialized tools to derive detailed information about a user's attitude toward sharing information in various contexts. User model 17 can be responsible for conducting these assessments. Based on the results of these assessments, system 10 can automatically categorize a user into one of many different security profiles that automatically set sharing permissions for all PA values.

图7为示出根据本发明的实施方式的用于借助风险容限评估连同可以允许每个用户手动地调整生成的设置(若需要)的工具的权限设置的过程的流程图。该过程可以使用引出工具和安全措施的组合,该引出工具用于使每个用户的特殊世界观变窄,该安全措施最好地帮助他们应对该世界。在图7中线性地示出该过程,但是在一些实施方式中,事件的顺序可以改变,作为对用户响应或特定个人属性内的值的反映。在可能情况下,系统10可以尝试从广义知识工作到具体的详细知识,如该系统10建立其安全推荐。FIG7 is a flow chart illustrating a process for setting permissions using a risk tolerance assessment along with tools that can allow each user to manually adjust the resulting settings if desired, in accordance with an embodiment of the present invention. The process can use a combination of elicitation tools that narrow each user's particular view of the world and security measures that best help them navigate that world. The process is shown linearly in FIG7 , but in some embodiments, the order of events can be altered as a reflection of user responses or values within specific personal attributes. Where possible, the system 10 can attempt to work from broad knowledge to specific, detailed knowledge as the system 10 builds its security recommendations.

一种通常类型的引出被称为滑动Q’s 1305。滑动Q’s可以提供确定关于多种多样的课题的基准态度的快速且简单的方法。可以向用户呈现一堆虚拟卡,每张虚拟卡包含传达安全问题的图像、本文、或图像和文本的组合。对于每张卡,可以具有三种可能的选择,例如“危险的”、“安全的”和“中性的”,但是其它选择可以为可行的。在用于装配有触摸屏的设备的一个示例性接口中,如果用户感觉图示的场景为危险的,则他可以滑动到左侧以记录该响应。如果用户感觉该场景为安全的,则他可以将卡滑动到右侧以指示该选择。当用户无法决定时,垂直向下滑动将记录“中性的”。利用每次滑动,可以在该方向上使当前卡移出屏幕,以及可以显示具有新问题的新卡。One common type of elicitation is called a Slide Q's 1305. Slide Q's can provide a quick and easy way to determine baseline attitudes on a variety of topics. The user can be presented with a stack of virtual cards, each containing an image, text, or a combination of image and text that conveys a safety question. For each card, there can be three possible choices, such as "Dangerous," "Safe," and "Neutral," but other choices may be possible. In one exemplary interface for a device equipped with a touch screen, if the user perceives the illustrated scenario as dangerous, they can swipe to the left to record that response. If the user perceives the scenario as safe, they can slide the card to the right to indicate that choice. If the user is undecided, a vertical swipe downward will record "Neutral." With each swipe, the current card can be moved off the screen in that direction, and a new card with a new question can be displayed.

利用建立的且出现的社交媒体1310评估用户的使用和舒适水平可以指示用户的共享某些类型的信息的意愿。由于整个系统10可以通过连接到用户的社交媒体账户且分析借助API对于那些组织可用的数据来获益,因此系统10可以利用用户关于社交媒体所进行的决定以通知推荐安全设置的算法。例如,用户可以向系统10提供对社交媒体账户的访问权,以及系统10可以分析信息以确定用户分享和拒绝分享哪些种类的个人信息。Assessing a user's usage and comfort level with established and present social media 1310 can indicate a user's willingness to share certain types of information. Since the overall system 10 can benefit from connecting to a user's social media accounts and analyzing data available to those organizations via APIs, the system 10 can utilize the user's decisions regarding social media to inform algorithms for recommending security settings. For example, a user can provide the system 10 with access to a social media account, and the system 10 can analyze the information to determine what types of personal information the user shares and refuses to share.

一旦关于行为、态度、和知识的基准信息已完成,则可以将目标多选择或利克特(Likert)量表问题1315呈现给用户以深度探讨可能影响用户可进行的安全和隐私决定的具体问题和场景。可以动态地生成这些问题的内容以填充关于用户的知识缺口且继续要求多个问题完成概念的查询行。Once baseline information on behavior, attitudes, and knowledge has been completed, targeted multiple-choice or Likert scale questions 1315 can be presented to the user to delve deeper into specific issues and scenarios that may impact the security and privacy decisions the user can make. The content of these questions can be dynamically generated to fill in gaps in the user's knowledge and continue to require multiple questions to complete the conceptual query line.

一些问题可以不参与构造的响应。而是,这些问题可以在本质上是更多会话的1320且可以形成开放式答案,这些答案可能需要语义分析和自然语言处理技术来提取用户的意思。这类交互可以用于通过应用例如语义分析和情感分类技术来缩小态度差距。可以在数据风险容限商模块中组合这些问题和任何其它问题的结果1325,该数据风险容限商模块可以将绝对分类和数学计算应用于用户的响应,从而产生用于将用户聚集成类同的人的多个组的多维相似性矩阵。可以使用如下属性来限定特定用户的风险容限。可以借助在屏幕上呈现的直接面试问题从用户获得各个属性。由于响应值可以广泛变化,因此可以将每个属性值归一化为0.0和1.0之间的值,其中,0.0指示“低”且1.0指示“高”。每一者可以与用于降低属性的复杂度的不同公式相关联,从而该属性的值映射到0.0至1.0的归一化范围中。属性可以包括但不限于如下项:Some questions may not involve constructed responses. Instead, these questions may be more conversational in nature 1320 and may form open-ended answers that may require semantic analysis and natural language processing techniques to extract the user's meaning. This type of interaction can be used to narrow the attitude gap by applying, for example, semantic analysis and sentiment classification techniques. The results of these and any other questions can be combined 1325 in a data risk tolerance quotient module, which can apply absolute classification and mathematical calculations to the user's responses to produce a multidimensional similarity matrix for clustering users into multiple groups of similar people. The following attributes can be used to define the risk tolerance of a particular user. Each attribute can be obtained from the user using direct interview questions presented on the screen. Because response values can vary widely, each attribute value can be normalized to a value between 0.0 and 1.0, where 0.0 indicates "low" and 1.0 indicates "high". Each can be associated with a different formula for reducing the complexity of the attribute, so that the value of the attribute is mapped to a normalized range of 0.0 to 1.0. Attributes may include, but are not limited to, the following:

●因特网“朋友”的数量Number of Internet "friends"

●共享收入/税款信息的意愿Willingness to share income/tax information

●共享健康信息的意愿Willingness to share health information

●电子邮件地址的数量(大于2是指示性的)Number of email addresses (greater than 2 is indicative)

●共享各种类型的数据的感知利益The perceived benefits of sharing various types of data

●年龄Age

●控制的感知The perception of control

●文化(位置)-用于不同文化的不同权重Culture (location) - different weights for different cultures

每个属性也可以具有其自身的权重值。可以调整权重以增加或降低每个属性的感知重要度。一旦已建立权重和映射函数,则可以根据如下函数执行风险容限分数的积累:Each attribute may also have its own weight value. The weights may be adjusted to increase or decrease the perceived importance of each attribute. Once the weights and mapping function have been established, the accumulation of risk tolerance scores may be performed according to the following function:

其中:wi=属性的权重,以及vi=属性的映射值。Where: w i = weight of the attribute, and vi = mapped value of the attribute.

在许多情况下,权重的总和可以等于1。在权重的总和不等于1的情况下,权重乘以值的总和可以除以权重的总和以校正偏差。可以将累计的个人偏差结合用户对与场景的集合相关联的感知风险的评估一起使用,以计算最终风险容限。In many cases, the sum of the weights may equal 1. In cases where the sum of the weights does not equal 1, the sum of the weights multiplied by the values may be divided by the sum of the weights to correct for bias. The accumulated personal bias may be used in conjunction with the user's assessment of the perceived risk associated with the set of scenarios to calculate a final risk tolerance.

包含一些活动或情况的场景可以被呈现在屏幕上,从而用户可以指示该场景是否似乎对他们是危险的。根据场景的背景,可以使用不同的呈现格式,但是在任何情况下,可以允许用户指示其对与该场景相关联的风险等级的感知。除了用关键词分类器标记到群组场景外,每个场景可以还标记有用于单独风险因数的值,该风险因数客观地指示场景的真实风险。下文所示的示例可以用作风险容限的整体计算中的权重。如果用户更接受真实风险,则风险容限商可以上升。如果用户更不接受真实风险,则风险容限商可以下降。风险因数可以包括但不限于如下项:A scene containing some activity or situation may be presented on the screen so that the user can indicate whether the scene seems dangerous to them. Depending on the context of the scene, different presentation formats may be used, but in any case, the user may be allowed to indicate their perception of the level of risk associated with the scene. In addition to being tagged to group scenes with a keyword classifier, each scene may also be tagged with a value for a separate risk factor that objectively indicates the true risk of the scene. The examples shown below may be used as weights in the overall calculation of risk tolerance. If the user is more accepting of true risk, the risk tolerance quotient may go up. If the user is less accepting of true risk, the risk tolerance quotient may go down. Risk factors may include, but are not limited to, the following:

1、自愿-非自愿:用户是否感觉他们具有是否承担风险的真正选择权?1. Voluntary-Involuntary: Do users feel they have a real choice about whether to take the risk?

2、即时效应-延迟效应:坏结果会立刻影响用户、还是仅随着时间推移而显露?2. Immediate Effects vs. Delayed Effects: Will the bad consequences affect users immediately, or will they only become apparent over time?

3、慢性的-灾难性的:坏结果是在很长时间内每次轻微影响用户、还是坏结果会以快速爆发的方式产生巨大影响?3. Chronic-Catastrophic: Do the bad consequences affect users slightly over a long period of time, or do the bad consequences occur in quick bursts with a large impact?

4、常规-恐惧:用户可以学习接受坏结果并冷静地思考该坏结果、还是坏结果会导致恐惧和情绪化思维?4. Conventional-Fear: Can users learn to accept bad outcomes and think calmly about them, or do bad outcomes lead to fear and emotional thinking?

5、严重性:小-致命:坏结果的冲击会有多大?5. Severity: Minor to Fatal: How big will the impact of the bad outcome be?

6、可以被迁移:非常可能-非常不可能:用户是否认为具有防止坏结果的简单方式?6. Can be Migrated: Very Likely - Very Unlikely: Do users believe there is an easy way to prevent the bad outcome?

7、在个人控制内:非常可能-非常不可能:用户是否认为他们具有通过其个人技能、知识和行动防止坏结果的能力?7. Within Personal Control: Very Likely-Very Unlikely: Do users believe they have the ability to prevent bad outcomes through their personal skills, knowledge, and actions?

8、风险/收益:非常高-非常低:用户是否相信收益值得冒风险?8. Risk/Reward: Very High – Very Low: Do users believe the benefits are worth the risks?

每种场景可以接收积累的风险分数,该积累的风险分数可以如下来计算:Each scenario may receive a cumulative risk score, which may be calculated as follows:

当显示场景时,用户可以通过指示该场景是否为1)有危险的、2)安全的、或3)中性的,来选择在该场景中感知的固有风险。将每个显示的场景分类为这三个类别之一可以指示用户的风险容限如何。使用下文公式,可以对来自每个类别的风险分数求平均并将该风险分数与对于每个类别的标准风险分数相比较。When a scenario is displayed, the user can select the perceived inherent risk in the scenario by indicating whether the scenario is 1) dangerous, 2) safe, or 3) neutral. Categorizing each displayed scenario into one of these three categories can indicate the user's risk tolerance. Using the formula below, the risk scores from each category can be averaged and compared to the standard risk score for each category.

对于三种风险类别的范围可以为:The ranges for the three risk categories can be:

有危险的=1.0-0.6Dangerous = 1.0-0.6

中性的=0.59-0.41Neutral = 0.59-0.41

安全的=0.4-0.0Safe = 0.4-0.0

例如,如果对于被选作有危险的场景的分类的风险低于0.6,则用户可以已感知到该场景中的风险高于用户希望的平均值,因此该特定用户可以具有较低的风险容限商。如果对于被选作安全的场景的分类的风险大于0.4,则用户可以已感知到该场景中的风险低于用户希望的平均值,这可以导致高风险容限。尽管该示例仅参考一个分类过程,但是在一些实施方式中,在计算分类风险因数之前,可以首先按关键字标签将场景分成类似的语境组。这个额外步骤可以帮助说明感知风险根据上下文变化的情况。For example, if the risk for a classification of a scene selected as dangerous is below 0.6, the user may have perceived the risk in the scene to be higher than the user's desired average, and therefore that particular user may have a lower risk tolerance quotient. If the risk for a classification of a scene selected as safe is greater than 0.4, the user may have perceived the risk in the scene to be lower than the user's desired average, which may result in a high risk tolerance. Although this example only references one classification process, in some embodiments, the scenes may first be grouped into similar contextual groups by keyword tags before calculating the classification risk factor. This additional step can help illustrate how perceived risk varies based on context.

最后,两个风险因数(个人偏差和感知风险)可以用于基于这两个分数的整体类似度使用户与其他用户匹配。每组可以表示具有不同隐私和安全关注点的不同类型的用户。可以基于用户所处于的特定集群将安全和隐私设置推荐分配给所有的PA和应用程序1330。在系统中可以具有几百个不同的用户集群,每个集群包含具有关于安全和隐私略微不同的态度的略微不同的用户。Finally, the two risk factors (personal bias and perceived risk) can be used to match users with other users based on the overall similarity of the two scores. Each group can represent a different type of user with different privacy and security concerns. Security and privacy setting recommendations can be distributed to all PAs and applications 1330 based on the specific cluster in which the user is located. There can be hundreds of different user clusters in the system, each containing slightly different users with slightly different attitudes about security and privacy.

然而,个体用户可以具有检查和潜在修改所推荐的安全和隐私设置的期望。用户的隐私和安全报告1335可以允许用户绝对地借助以多种方式使数据分层的多个数据透视表,或借助关于应用程序、个人属性、或所推荐的隐私设置的扩展挖掘方法,或以某种其它方式查看所推荐的设置。通过深入探讨这些措施中的任一者,用户可以看到受推荐影响的属性和应用程序。如果期望调整,则可以例如通过调整与安全和隐私的主要维度相关联的滑块来进行自动分类调整1340。用户也可以选择使用系统的手动共享调整工具1345来定位具体应用程序或个人属性并手动地设置其权限。However, individual users may have a desire to review and potentially modify the recommended security and privacy settings. A user's privacy and security report 1335 may allow the user to view the recommended settings in absolute terms, via multiple pivot tables that stratify the data in various ways, or via an extended drill-down approach with respect to applications, personal attributes, or recommended privacy settings, or in some other manner. By drilling down into any of these measures, the user can see the attributes and applications affected by the recommendations. If adjustments are desired, automatic categorization adjustments 1340 may be made, for example, by adjusting sliders associated with the primary dimensions of security and privacy. The user may also choose to use the system's manual sharing adjustment tools 1345 to locate specific applications or personal attributes and manually set their permissions.

无论如何建立安全和隐私设置,这些设置都可以为风险容限评估提供起始点。当用户继续使用系统10学习新材料、启动应用程序、共享信息和调整权限设置等时,系统10可以继续监控和了解用户1350并可以自动地建议对安全和隐私设置的潜在调整。该监控和调整循环可以在用户账户的限期内继续。Regardless of how security and privacy settings are established, they can provide a starting point for risk tolerance assessment. As the user continues to use the system 10 to learn new materials, launch applications, share information, adjust permission settings, etc., the system 10 can continue to monitor and learn about the user 1350 and can automatically suggest potential adjustments to security and privacy settings. This monitoring and adjustment cycle can continue for the life of the user's account.

语境风险容限Contextual Risk Tolerance

当人类关于他们将彼此共享哪些信息作出决定时,他们可以单独地考虑细节,诸如谁将查看信息、将如何使用信息、交易中的每个实体有多值得信任、以及在信息已被用于其原始意图之后将保持多久。系统10可以基于上文所描述的权限设置推荐和调整工具来应用安全和隐私过滤器以考虑这类细节。图9为描述根据本发明的实施方式的权限设置如何控制数据共享的框图。作为这些过滤器可运作的方式的示例,图9示出了特定用户可用于帮助其管理其健康和幸福的应用程序的子集。他使用四个不同的应用程序来管理其健康的不同方面。在本示例中使用的应用程序是纯虚构的,且仅意图为数据共享示例提供背景。不意图与任何现存应用程序连接。When humans make decisions about what information they will share with each other, they may individually consider details such as who will view the information, how it will be used, how trustworthy each entity in the transaction is, and how long the information will be retained after it has been used for its original intent. The system 10 can apply security and privacy filters to take such details into account based on the permission setting recommendation and adjustment tools described above. Figure 9 is a block diagram describing how permission settings control data sharing according to an embodiment of the present invention. As an example of how these filters can work, Figure 9 shows a subset of applications that a particular user can use to help him manage his health and well-being. He uses four different applications to manage different aspects of his health. The applications used in this example are purely fictional and are intended only to provide context for the data sharing example. It is not intended to be connected to any existing application.

四个应用程序为:The four applications are:

●健康跟踪器1505-通用型量化自身日报和评估应用程序,其允许用户跟踪总体健康和幸福的多个方面,包括随时间的饮食、锻炼、个人习惯、生命统计资料、和高级精神状态。这是用户自身发现并购买的独立应用程序。● Health Tracker 1505 - A general purpose quantified self-report and assessment application that allows users to track multiple aspects of overall health and well-being, including diet, exercise, personal habits, vital statistics, and high-level mental states over time. This is a standalone application that users discover and purchase on their own.

●健身伙伴1510和1515-定向练习的健身应用程序,其帮助用户管理他们的锻炼计划、交叉训练、恢复时间、和基础体能化学过程。用户的健身俱乐部已将该应用程序作为会员福利而免费提供给用户。如果捕获的数据示出雇员变得更活跃(如果他们跟踪其锻炼),则用户的雇主也可以已经提供该应用程序作为还碰巧降低其雇员的保险成本的福利。Fitness Buddy 1510 and 1515 - An exercise-oriented fitness app that helps users manage their workout schedule, cross-training, recovery time, and basic body chemistry. The user's health club has provided the app to the user for free as a membership benefit. If the captured data shows that employees become more active (if they track their workouts), the user's employer may also have provided the app as a benefit that also happens to reduce insurance costs for their employees.

●餐厅寻找器1520-搜索引擎应用程序,其基于社会评论以及每个用户关于过敏原、耐受性和偏好的特定需求来帮助用户找到餐厅和食物服务。用户的健身俱乐部提供该应用程序作为其会员的另一福利。• Restaurant Finder 1520 - A search engine application that helps users find restaurants and food services based on social reviews and each user's specific needs regarding allergens, intolerances, and preferences. The user's health club offers this application as another benefit of its membership.

●虚拟医生1525-由用户的医疗保健提供方提供的便利助手应用程序。该应用程序辅助用户在需要时进行约定,而且还提供自动的建议护士和分诊服务,以及在需要时对医学专家的直接访问。● Virtual Doctor 1525 - A convenient assistant application provided by the user's healthcare provider. The application assists the user in making appointments when needed, and also provides automated suggested nurses and triage services, as well as direct access to medical specialists when needed.

合在一起,这四个应用程序可以提供该特定用户需要有效地管理其健康和幸福的所有服务,但是为了实现该目标,那些应用程序可能需要共享关于该用户的数据。然而,作为系统的风险容限评估1535的结果,系统10已经得知该用户不愿意与本示例中的这些应用程序中的每一个应用程序共享其所有的健康数据。因此,可以建立权限设置以控制数据在应用程序之间的流动,从而每个应用程序准确地接收其有效地服务该个体用户所需的东西,但是没有应用程序接收比为了完成其任务所需知道的东西更多的东西。Together, these four applications can provide all the services that this particular user needs to effectively manage their health and well-being, but to achieve that goal, those applications may need to share data about the user. However, as a result of the system's risk tolerance assessment 1535, the system 10 has learned that the user is unwilling to share all of their health data with each of these applications in this example. Therefore, permission settings can be established to control the flow of data between applications so that each application receives exactly what it needs to effectively serve the individual user, but no application receives more than it needs to know to complete its mission.

当用户将健康数据输入健康跟踪器应用程序1505中时,该过程可以开始。除了其它方面,在本示例中,用户输入如下数据:The process may begin when a user enters health data into the health tracker application 1505. In this example, the user enters the following data, among other things:

●体重●Weight

●身高Height

●体质指数Body mass index

●血压Blood pressure

●胆固醇水平Cholesterol levels

●休息时的呼吸率Resting breathing rate

●在压力下的呼吸率Respiratory rate under stress

●休息时的脉搏率Resting pulse rate

●在压力下的脉搏率Pulse rate under stress

●水合作用统计数据Hydration statistics

●饮食问题(过敏史和耐受性问题)Dietary issues (allergies and intolerances)

当用户更新其信息时,可以将该数据发送到用户模型17中的用户个人记录以备后续使用。在存储过程期间,可以执行安全且隐私的单向门和双向门1530,如上所述。可以将数据存储在个人记录1545中,以及可以将在用户的风险容限评估1535中导出的安全规则应用于输入数据以将合适权限分配给已接收的每一个体数据片。用户对如在前面章节中所描述的分类的风险场景的个体响应可以驱动与调用哪些安全规则相关的决定。可以应用形成的安全和隐私类别1540以确保每个应用程序仅接收该应用程序需要的信息以及仅用户乐意与应用程序和发起组织的每个组合共享的信息。When a user updates their information, the data can be sent to the user's personal record in the user model 17 for subsequent use. During the storage process, security and privacy one-way and two-way gates 1530 can be implemented, as described above. Data can be stored in the personal record 1545, and security rules derived from the user's risk tolerance assessment 1535 can be applied to the input data to assign appropriate permissions to each individual piece of data received. The user's individual response to the classified risk scenarios described in the previous section can drive decisions regarding which security rules to invoke. The developed security and privacy categories 1540 can be applied to ensure that each application receives only the information it needs and only the information the user is willing to share with each combination of application and sponsoring organization.

之后,当用户去其健身俱乐部锻炼时,他使用其健身伙伴应用程序1515来帮助计划他的锻炼。由于用户意识到他的锻炼的最有效类型和持续时间经常取决于多个因素,比如他的近期锻炼历史、他的体重、以及他的血液化学的多个部分,因此他愿意与健身俱乐部处的健身伙伴1515共享该信息1555。然而,他看不到与健身俱乐部共享关于他的食物过敏史或无法耐受某些食物的信息的理由。因此,他手动地调整对于该应用程序的权限,从而在请求该数据时不将食物信息传输到健身伙伴。Later, when the user goes to his health club to work out, he uses his fitness buddy app 1515 to help plan his workouts. Since the user realizes that the most effective type and duration of his workouts often depends on multiple factors, such as his recent exercise history, his weight, and various components of his blood chemistry, he is willing to share this information 1555 with his fitness buddy 1515 at the health club. However, he does not see a reason to share information about his food allergies or intolerances to certain foods with the health club. Therefore, he manually adjusts the permissions for the app so that food information is not transmitted to his fitness buddy when this data is requested.

为了通过其雇主接收关于健康保险费的小的价格间断,用户已同意在工作时参与健身伙伴程序1510。这是用户在其健身俱乐部使用的相同应用程序,因此保险公司需要的所有数据很容易得到。然而,由于激励程序仅需要锻炼历史来确认更积极的生活方式,以及由于用户示出了对在权限设置练习(前面章节中所讨论)期间与其雇主共享个人信息的担心,因此用户模型17指示用户可能感觉到他的胆固醇高出正常值可能影响他的雇员保险权益。因此,系统10决定雇主发起的健身伙伴的实例不具有足够高的收益-风险比率以与雇主和保险公司共享该详细的健康信息。因此,与用户的雇主组织记录相关联的医疗保健数据受限于用户的锻炼历史1550。当使用健身伙伴应用程序的雇主实例时,其它信息不可用。In order to receive a small price break on health insurance premiums through his employer, the user has agreed to participate in the fitness partner program 1510 at work. This is the same application that the user uses at his health club, so all the data the insurance company needs is easily available. However, since the incentive program only requires exercise history to confirm a more active lifestyle, and since the user has shown concerns about sharing personal information with his employer during the permission setting exercise (discussed in the previous section), the user model 17 indicates that the user may feel that his cholesterol is higher than normal and may affect his employee insurance benefits. Therefore, the system 10 determines that the instance of the employer-sponsored fitness partner does not have a high enough benefit-risk ratio to share this detailed health information with the employer and insurance company. Therefore, the healthcare data associated with the user's employer organization record is limited to the user's exercise history 1550. When using the employer instance of the fitness partner application, other information is not available.

在离开健身俱乐部之后,用户发起他的餐厅寻找器应用程序1520以找到用晚餐的好地方。该应用程序能够使用相当多的个性化数据来进行推荐,但是用户已借助风险容限评估1535向系统传达了他仅乐意将其食物过敏史和耐受性问题提供给与食物相关的应用程序。因此在该情况下,应用程序对关于用户的数据的请求被过滤掉且仅返回用户需要无谷蛋白膳食以及他对贝类过敏的事实1560。通过在风险容限评估期间建立的规则抑制所有其它请求信息。After leaving the health club, the user launches his restaurant finder app 1520 to find a good place for dinner. The app could use considerable personalized data to make recommendations, but the user has communicated to the system, via risk tolerance assessment 1535, that he is only comfortable providing his food allergy history and intolerance issues to food-related applications. Therefore, in this case, the app's request for data about the user is filtered out and only returns the fact that the user requires a gluten-free diet and that he is allergic to shellfish 1560. All other requested information is suppressed by the rules established during the risk tolerance assessment.

在应用程序的这个子集中的最终应用程序为虚拟医生应用程序1525,使该虚拟医生应用程序1525可被在用户的医疗保健提供方的用户医疗团队使用。该应用程序请求查看关于用户的所有可用的与医疗和健康相关的信息。由于用户指示他具有与其医生的开放且自由的对话,因此对于该应用程序的权限设置在由用户的医疗保健提供方供应时允许所有的医疗和健康数据1565的自由交换,从而确保最佳的可行医疗保健。The final application in this subset of applications is a virtual doctor application 1525, which is made available to the user's medical team at the user's healthcare provider. The application requests access to all available medical and health-related information about the user. Since the user has indicated that they want an open and free dialogue with their doctor, the permissions set for the application allow for the free exchange of all medical and health data 1565 as provided by the user's healthcare provider, thereby ensuring the best possible healthcare.

如在本示例中所示,每个应用程序接收的个人属性数据的类型和数量可以完全取决于用户的风险容限评估的结果,以及该评估可以对如下事实敏感:用户可能不希望在不同背景下与同一应用程序共享同一信息。由于健身伙伴被用在两个不同背景(健身俱乐部和雇主)下,因此安全和隐私规则可以自动地调整在每个背景下可释放的数据。甚至在同一组织已发起多个应用程序(比如健身俱乐部的健身伙伴1515和餐厅寻找器1520)的情况下,每个应用程序的使用背景可以指示共享某些类型的信息的不同信任等级和意愿等级。当在不同类别的应用程序请求类似数据的不同背景之间进行区分时,这可以是真实的。用户对风险容限评估的响应可以驱动系统关于将什么释放到每个应用程序的决定。每种数据使用的具体背景可以通知数据共享决定过程,类似于当人类每天进行信息共享决定时。As shown in this example, the type and amount of personal attribute data received by each application can depend entirely on the results of the user's risk tolerance assessment, and this assessment can be sensitive to the fact that a user may not want to share the same information with the same application in different contexts. Since the fitness buddy is used in two different contexts (health club and employer), security and privacy rules can automatically adjust the data that can be released in each context. Even in the case where the same organization has launched multiple applications (such as fitness buddy 1515 and restaurant finder 1520 for health clubs), the usage context of each application can indicate a different level of trust and willingness to share certain types of information. This can be true when differentiating between different contexts in which different categories of applications request similar data. The user's response to the risk tolerance assessment can drive the system's decision on what to release to each application. The specific context of each data use can inform the data sharing decision process, similar to when humans make information sharing decisions every day.

预测分析和建模Predictive analytics and modeling

图2为根据本发明的实施方式的分析流程的框图。在一些实施方式中,用户模型17可以表示低级属性,这些低级属性可以以多种方式来组合以提供性能等级更高的属性。当应用程序14、应用程序15进行用户的新观察时,平台16可以分析那些观察结果并绘制关于那些观察结果可意味着什么的预测结论。当新PA观察结果201到达用户模型17时,用户模型17可以访问用户模型管理者数据库以评估哪些分析事件可与观察结果202相关。用户模型17可以基于评估触发分析处理器20中的一个或多个分析事件203。分析事件可以与许多不同的潜在预测模型相关联。由于不是每个预测模型都将受特定PA的变化影响,因此多个可用预测模型可以被用户模型17过滤204以仅包括受输入PA影响的预测模型。用户模型17可以访问由PA目录18提供的数据以确定哪些模型受新PA观察结果影响。分析处理器20然后可以应用过滤的预测模型205。每个所选模型可以通过潜在地执行许多不同的计算而对新观察结果作出反应,这些计算利用个人属性之间的关系图来确定针对每个相关属性预测的分数和置信度因数。Figure 2 is a block diagram of an analysis process according to an embodiment of the present invention. In some embodiments, user model 17 may represent low-level attributes that can be combined in various ways to provide higher-level attributes. When applications 14 and 15 make new observations of a user, platform 16 can analyze those observations and draw predictive conclusions about what those observations might mean. When a new PA observation 201 arrives at user model 17, user model 17 may access the user model manager database to evaluate which analysis events may be relevant to observation 202. Based on this evaluation, user model 17 may trigger one or more analysis events 203 in analysis processor 20. Analysis events may be associated with many different potential predictive models. Because not every predictive model will be affected by changes in a particular PA, the multiple available predictive models may be filtered 204 by user model 17 to include only those affected by the input PA. User model 17 may access data provided by PA catalog 18 to determine which models are affected by the new PA observation. Analysis processor 20 may then apply the filtered predictive models 205. Each selected model can react to new observations by potentially performing many different calculations that exploit the graph of relationships between individual attributes to determine a score and confidence factor for the prediction for each relevant attribute.

图3示出了简单模型301,该简单模型310可以有能力基于单一PA的观察的分数来预测对于四个不同PA的分数。如302所示,用于该示例的输入参数为PA 2已被观察到具有0.75的分数和1.0的置信度因数的直接观察结果。在一些实施方式中,可以使分数归一化到0.0和1.0之间的值。在该情况下,用户仅能够证明由PA 2表示的一种或多种技能的四分之三(例如,用户对测试问题的回答有75%正确、在技能评估中被打分在第75个百分位,等等);因此分数为0.75。然而,用户已经能够坚实地证明那些技能且因此已接收到为1.0的置信度值,这意味着用户能够一直执行相关联的任务。FIG3 illustrates a simple model 301 that may be capable of predicting scores for four different PAs based on the observed scores for a single PA. As shown in 302, the input parameters for this example are the direct observation that PA 2 has been observed to have a score of 0.75 and a confidence factor of 1.0. In some embodiments, the scores may be normalized to values between 0.0 and 1.0. In this case, the user has only demonstrated three-quarters of the skills represented by PA 2 (e.g., the user answered 75% of the test questions correctly, scored in the 75th percentile on a skill assessment, etc.); thus, the score is 0.75. However, the user has been able to demonstrate those skills robustly and has therefore received a confidence value of 1.0, meaning that the user has consistently performed the associated tasks.

在模型301的定向图中,箭头指示PA 2具有两个先决条件,即PA 3和PA 4。先决条件可以起作用,从而如果用户能够证明在PA中的某个技能等级,则可以具有用户必须在先决条件PA中具有已知技能等级的已知概率。例如,如果用户能够扣篮,则高度可能的是该用户可以跳得足够高以达到篮球框的边缘。由于为了能够在本示例中执行PA 2而需要PA 3和PA 4,因此可以假设那些先决条件PA中的每一者具有至少与PA 2一样高的值。用于每个可能的先决条件的置信度因数乘以用于PA 2的置信度因数,以得出分别用于PA 3和PA 4的置信度因数0.9和0.5。然后,可以使用同一过程计算用于PA 3和PA 4的任何先决条件的分数和置信度因数。在该情况下,对于每一者具有仅一个先决条件,以及碰巧它为同一PA 5。因此,两次计算用于PA 5的值,一次使用来自PA 3的分数和置信度因数以及一次使用来自PA4的值:In the directed graph of model 301, the arrows indicate that PA 2 has two prerequisites, namely PA 3 and PA 4. Prerequisites can be manipulated so that if a user can demonstrate a certain skill level in PA, there can be a known probability that the user must have a given skill level in the prerequisite PA. For example, if a user can dunk, it is highly likely that the user can jump high enough to reach the rim of the basketball hoop. Since PA 3 and PA 4 are required to be able to perform PA 2 in this example, it can be assumed that each of those prerequisite PAs has a value at least as high as PA 2. The confidence factor for each possible prerequisite is multiplied by the confidence factor for PA 2 to yield confidence factors of 0.9 and 0.5 for PA 3 and PA 4, respectively. The same process can then be used to calculate the scores and confidence factors for any prerequisites for PA 3 and PA 4. In this case, there is only one prerequisite for each, and it happens to be the same PA 5. Therefore, the value for PA 5 is calculated twice, once using the score and confidence factor from PA 3 and once using the value from PA 4:

PA5分数=PA3分数=0.75PA5 score = PA3 score = 0.75

PA5置信度=PA3置信度*0.1=0.9*0.1=0.09PA5 confidence level = PA3 confidence level * 0.1 = 0.9 * 0.1 = 0.09

PA5分数=PA4分数=0.75PA5 score = PA4 score = 0.75

PA5置信度=PA4置信度*0.5=0.5*0.5=0.25PA5 confidence level = PA4 confidence level * 0.5 = 0.5 * 0.5 = 0.25

由于两个可能通道的最高置信度因数为0.25,因此PA 2和PA 5之间的最佳路径通过PA 4,所以用于PA 5的最终分数为0.75且其置信度因数为0.25。Since the highest confidence factor of the two possible channels is 0.25, the best path between PA 2 and PA 5 is through PA 4, so the final score for PA 5 is 0.75 and its confidence factor is 0.25.

类似地,可以从PA 2的直接观察结果计算用于PA 1的分数和置信度因数,但是在该情况下,PA 2为PA 1的先决条件。因此,在如下所示的计算期间处罚置信度因数和分数:Similarly, the score and confidence factor for PA 1 can be calculated from direct observations of PA 2, but in this case, PA 2 is a prerequisite for PA 1. Therefore, the confidence factor and score are penalized during the calculation as shown below:

PA1分数=PA2分数*0.9=0.675PA1 score = PA2 score * 0.9 = 0.675

PA1置信度=PA2置信度*0.9=1.0*0.9=0.9PA1 confidence level = PA2 confidence level * 0.9 = 1.0 * 0.9 = 0.9

因此,有90%的机会用户可以适当地执行对于PA 1所需的技能的67.5%。PA分数的变化(从0.75到0.675)造成PA 2中不存在的新技能与PA 1相关联的可能性,以及下调置信度因数,这是因为概率的估计为两个置信度因数的乘积。表303示出了针对每个PA所计算的分数和置信度因数。Therefore, there is a 90% chance that the user can properly perform 67.5% of the skills required for PA 1. The change in PA score (from 0.75 to 0.675) results in a probability that a new skill not present in PA 2 is associated with PA 1, and a downward adjustment of the confidence factor, since the estimate of probability is the product of two confidence factors. Table 303 shows the scores and confidence factors calculated for each PA.

作为实际示例,如果应用程序观察到用户已掌握“写出描述两个量之间的关系的函数”的能力以及还已掌握“从上下文确定显式表达、递归过程、或计算步骤”的能力,则可具有很高的概率的是用户已掌握“建立数学函数”的高级个人属性。此外,一旦已经进行对于该高级PA的预测,则该预测可以在另一分析模型中被用作观察结果,该另一分析模型将“建立数学函数”与表示用户在“圆的性质”和“表达式和方程式”的领域中的能力的值组合,以预测用户执行代数数学问题的概率。可以在属性的层次结构中使该简单示例可视化:As a practical example, if an application observes that a user has mastered the ability to "write a function that describes the relationship between two quantities" and also the ability to "determine an explicit expression, recursive procedure, or computational steps from context," then there's a high probability that the user has mastered the high-level personal attribute of "building mathematical functions." Furthermore, once a prediction for this high-level PA has been made, it can be used as an observation in another analytical model that combines "building mathematical functions" with values representing the user's abilities in the areas of "properties of circles" and "expressions and equations" to predict the probability that the user will be able to perform algebraic math problems. This simple example can be visualized in a hierarchy of attributes:

●代数数学Algebraic Mathematics

○表达式和方程式○Expressions and equations

○圆的性质○Properties of a circle

○建立数学函数○Create mathematical functions

■写出描述两个量之间的关系的函数■Write a function that describes the relationship between two quantities

■从上下文确定显式表达、递归过程、或计算步骤■ Determine explicit expressions, recursive procedures, or computational steps from the context

在该示例性层次结构中,写出描述两个量之间的关系的函数以及从上下文确定显式表达、递归过程、或计算步骤是建立数学函数的先决条件。反过来,建立数学函数、表达式和方程式、以及圆的性质为代数数学的先决条件。In this exemplary hierarchy, writing functions that describe the relationship between two quantities and determining explicit expressions, recursive procedures, or computational steps from context are prerequisites for building mathematical functions. In turn, building mathematical functions, expressions, and equations, as well as the properties of circles, are prerequisites for algebraic mathematics.

平台16可以包括许多不同的分析模型,每当将新观察结果发送到用户模型17时可以触发上述分析模型。上文所讨论的示例性模型为目的简单的模型,仅意图用于解释目的。平台16可以包含复杂度和设计广泛变化的许多不同模型,且可以涉及任何数量的个体个人属性和任何数量的详细数学运算。The platform 16 may include many different analytical models that may be triggered whenever a new observation is sent to the user model 17. The exemplary models discussed above are simple models intended for explanation purposes only. The platform 16 may include many different models that vary widely in complexity and design and may involve any number of individual personal attributes and any number of detailed mathematical operations.

示例性使用情况Example use cases

如下段落描述根据本发明的一些实施方式的系统10的不同示例性使用。如下示例可以单独应用或以彼此的一个或多个组合形式来应用。The following paragraphs describe different exemplary uses of system 10 according to some embodiments of the present invention. The following examples may be applied alone or in one or more combinations with each other.

在一个示例中,系统10可以以用于以改善用户体验的方式来定制第三方应用程序14。用户11可以具有存储多个PA的个人用户模型17。用户11然后可以允许第三方应用程序14具有对他们的个人用户模型17中的数据的多个部分的访问权。第三方应用程序14可以使用属性来获得对用户11的理解。因此,当用户11启动应用程序14时,第三方应用程序14可以进行适当改变以定制专用于用户11的材料的呈现。例如,第三方应用程序14可以作出反应并呈现应用程序14中的信息和任务,该任务处于适合于具有用户的PA的人的级别。第三方应用程序14还可以在使用应用程序14和应用程序15时跟踪用户的历史,并将倾向、性能和其它数据提交回系统10。用户模型17可以再次跟踪用户的倾向、性能和其它数据并更新用户的个人基因组数据。In one example, system 10 can customize third-party applications 14 in a way that improves the user experience. User 11 may have a personal user model 17 that stores multiple PAs. User 11 can then grant third-party applications 14 access to portions of the data in their personal user model 17. Third-party applications 14 can use attributes to gain an understanding of user 11. Therefore, when user 11 launches application 14, third-party application 14 can make appropriate changes to tailor the presentation of material specific to user 11. For example, third-party application 14 can react and present information and tasks within application 14 at a level appropriate for a person with the user's PA. Third-party application 14 can also track the user's history as they use applications 14 and 15, submitting tendencies, performance, and other data back to system 10. User model 17 can again track the user's tendencies, performance, and other data and update the user's personal genome data.

在一些实施方式中,上述示例被用在教学应用程序中。第三方应用程序14可以创建学习课程形式的性能增强环境。当用户11在学习课程中执行不同测试(即评估工具)时,可以通过第三方应用程序14来评估用户的属性。通过第三方应用程序14评估的胜任素质可以由系统10来限定,以及可以创建用户的个人用户模型17中的个体属性来存储该胜任素质。来自学习课程的输出数据(分数、评估等)可以被分析处理器20分析、被分配给用户的个人用户模型17中的对应属性、以及稍后被第三方应用程序14评估以供进一步测试。In some embodiments, the above examples are used in teaching applications. The third-party application 14 can create a performance enhancement environment in the form of a learning course. When the user 11 performs different tests (i.e., assessment tools) in the learning course, the user's attributes can be assessed by the third-party application 14. The competencies assessed by the third-party application 14 can be defined by the system 10, and individual attributes in the user's personal user model 17 can be created to store the competencies. The output data (scores, assessments, etc.) from the learning course can be analyzed by the analysis processor 20, assigned to the corresponding attributes in the user's personal user model 17, and later evaluated by the third-party application 14 for further testing.

在另一示例中,第三方应用程序14或系统10本身可以查询系统10以搜索用户的个人用户模型17并自动地向用户建议具体的应用程序14和应用程序15,这两个应用程序瞄准当前未表现在用户的个人用户模型17中或者从最后一次关于具体课题评估用户11起可能已改变(例如由于长时间段不活动)的具体数据元素。In another example, a third-party application 14 or the system 10 itself can query the system 10 to search the user's personal user model 17 and automatically suggest specific applications 14 and 15 to the user that target specific data elements that are not currently represented in the user's personal user model 17 or that may have changed since the user 11 was last evaluated on a specific topic (e.g., due to a long period of inactivity).

继上文示例之后,系统10(独立地或与第三方应用程序14一起)可以执行用户授权的对与用户11相关的信息的因特网搜索。系统10然后可以存储这类信息、向用户11警告这类可用信息以及这类可用信息的来源、和/或执行其它用户授权的任务,诸如自动地将用户信息从该来源删除或请求隐藏该信息。例如,系统10可以使用来自社交网站的信息来更新用户的个人属性数据。可以向用户11给出授权系统10搜索社交网站和其它网站并相应地更新用户的个人基因组数据的选项(例如在系统开启时)。而且,当用户11将其电话号码输入到用户模型17中时,他们可以具有将电话号码放在全球“不呼叫”列表上的选项。如果被用户授权,则系统10可以作为后台任务而搜索因特网以确保用户的电话号码不是公开可用的。此外,如果被用户授权,则系统10可以通过不同源搜索在因特网上可获得的用户的信用等级。系统10可以向用户11警告不同源以及通过每个源使什么信用等级可用。Following the above example, system 10 (either independently or in conjunction with third-party application 14) can perform a user-authorized internet search for information related to user 11. System 10 can then store such information, alert user 11 to the availability of such information and its source, and/or perform other user-authorized tasks, such as automatically deleting user information from that source or requesting that the information be hidden. For example, system 10 can use information from social networking sites to update a user's personal attribute data. User 11 can be given the option (e.g., upon system startup) to authorize system 10 to search social networking sites and other websites and update the user's personal genome data accordingly. Furthermore, when user 11 enters their phone number into user profile 17, they can have the option to place their phone number on a global "do not call" list. If authorized by the user, system 10 can search the internet as a background task to ensure that the user's phone number is not publicly available. Furthermore, if authorized by the user, system 10 can search the internet for the user's credit rating available on the internet through various sources. System 10 can alert user 11 to the various sources and what credit rating is available through each source.

在又一个示例中,系统10可以用于收集和产生与适合于企业和学术研究工作的匿名用户相关的详细人类行为、知识、技能、和态度数据。系统10和/或第三方应用程序14可以选择用户11的具体研究群体,并从所选的研究群体提取目标数据元素(例如原始数据或聚合数据)。用户11可以具有在针对研究工作释放数据之前指定哪些数据元素可以以其全部内容(即作为原始数据)或以聚合形式被提取的能力。另外,用户可以接收用于释放其数据的金钱支付或实物价值交易。这类支付可以由接收和评估数据的系统10或第三方应用程序14来跟踪和管理。In yet another example, the system 10 can be used to collect and generate detailed human behavior, knowledge, skills, and attitude data related to anonymous users suitable for corporate and academic research work. The system 10 and/or third-party application 14 can select the specific research group of the user 11 and extract target data elements (e.g., raw data or aggregated data) from the selected research group. The user 11 can have the ability to specify which data elements can be extracted in their entirety (i.e., as raw data) or in aggregated form before releasing the data for research work. In addition, the user can receive monetary payments or in-kind value transactions for releasing their data. Such payments can be tracked and managed by the system 10 or third-party application 14 that receives and evaluates the data.

在另一示例中,第三方应用程序14可以与系统10交互以充当辅助用户11基于用户的个人用户模型17的内容和/或任何可用的第三方信息进行个人决定和/或专业决定的个人代理。应用程序14可以捕获关于用户活动的事件和知识,然后基于在学习、教育、训练、表演和/或工作支持的领域中捕获的知识提供建议和推荐的后续活动。应用程序14还可以将智能应用于个人用户模型17,并基于在用户模型17中可用的数据将指导和推荐提供给用户11。系统10可以参考胜任素质、专业活动、和专业活动的性能,然后提供专业活动和性能之间的映射关系以及性能和胜任素质之间的映射关系。因此可以基于所识别的活动的性能而针对胜任素质进行正式评估。应用程序14可以确定活动的正式评级,以及哪个预期性能会更好地改善目标胜任素质。应用程序14或系统10还可以基于由映射关系确定的推断来提供建议。In another example, a third-party application 14 can interact with the system 10 to act as a personal agent to assist the user 11 in making personal and/or professional decisions based on the content of the user's personal user profile 17 and/or any available third-party information. The application 14 can capture events and knowledge about the user's activities and then provide suggestions and recommended subsequent activities based on the captured knowledge in the areas of learning, education, training, performance, and/or work support. The application 14 can also apply intelligence to the personal user profile 17 and provide guidance and recommendations to the user 11 based on the data available in the user profile 17. The system 10 can reference competencies, professional activities, and performance of professional activities and then provide mappings between professional activities and performance, as well as between performance and competencies. Thus, a formal assessment of competencies can be conducted based on the performance of identified activities. The application 14 can determine a formal rating for the activity and which expected performance will best improve the target competency. The application 14 or system 10 can also provide recommendations based on inferences determined by the mappings.

继上文示例之后,第三方应用程序14可以与系统10交互以充当辅助用户11进行休闲活动和每日活动(诸如在零售店、博物馆、旅游网站等)的决定的个人代理。Continuing with the above example, third-party applications 14 may interact with the system 10 to act as a personal agent that assists the user 11 in making decisions regarding leisure activities and everyday activities, such as at retail stores, museums, travel websites, and the like.

在零售店示例中,用户可以在其一个或多个移动设备上访问其用户模型17以及可视化并决定他们想要使来自他们的个人属性的哪些信息可用于服装店(例如,测量、鞋码、衬衫尺码、个人风格偏好、先前的衣服类型交易、其它相关交易等)。与服装店相关联的第三方应用程序14可以包括扫描器或阅读器以及用户的移动设备可以提供视觉条形码。该视觉条形码可以包括临时密码,该临时密码可以被扫描器或阅读器破译。第三方应用程序14然后可以使用临时密码访问个人属性信息,用户11使该个人属性信息可用。第三方应用程序14然后可以评估可用的个人属性信息并基于该评估对用户11进行建议,诸如他们可能感兴趣的项目、将包括他们可能感兴趣的项目的服装店的具体区域、与他们最近购买的项目类似的项目的销售等。可以通过应用程序计算机(例如,在服装店的一体机处,该一体机还可以包括扫描器或阅读器)或通过用户的手机(例如,第三方应用程序14可以通过电子邮件或SMS消息或者通过托管应用程序15将信息直接发送到用户11)使该信息对于用户是可用的。如果用户11在服装店购买任何项目,则第三方应用程序14可以将交易细节提交给系统10,用以更新用户的个人基因组数据。用户11稍后可以查看交易细节并可以具有从其用户模型17删除细节的选项。In the retail store example, a user can access their user profile 17 on one or more of their mobile devices and visualize and decide what information from their personal attributes they would like to make available to the clothing store (e.g., measurements, shoe size, shirt size, personal style preferences, previous clothing type transactions, other related transactions, etc.). A third-party application 14 associated with the clothing store can include a scanner or reader, and the user's mobile device can provide a visual barcode. The visual barcode can include a temporary password that can be deciphered by the scanner or reader. The third-party application 14 can then use the temporary password to access the personal attribute information that the user 11 made available. The third-party application 14 can then evaluate the available personal attribute information and, based on this evaluation, make recommendations to the user 11, such as items that may be of interest to them, specific areas of the clothing store that would include items that may be of interest to them, sales on items similar to items they recently purchased, etc. This information can be made available to the user via an application computer (e.g., at a kiosk in the clothing store, which may also include a scanner or reader) or via the user's mobile phone (e.g., the third-party application 14 can send the information directly to the user 11 via email or SMS message, or via a hosted application 15). If the user 11 purchases any item at the clothing store, the third-party application 14 can submit the transaction details to the system 10 for updating the user's personal genome data. The user 11 can later review the transaction details and may have the option to delete the details from their user model 17.

“启用用户模型”的零售店可以允许对于用户来说更好的购物体验。用户还可以通过在启用用户模型的零售店购物来增强其用户模型,这是因为可以跟踪用户的交易并将其添加到其用户模型。另外,因为用户的个体用户模型17可以存储所有的用户信息和交易历史,所以从一个商店购买可以用于改善用户在不同商店的购物体验。例如,与购物中心内的书店相关联的第三方应用程序14可以使用来自用户的线上图书购买以及从该特定书店的购买的交易数据,来执行用户的阅读偏好的更好的整体评估,而非仅使用来自该特定书店的用户的交易历史。"User model-enabled" retail stores can allow for a better shopping experience for users. Users can also enhance their user model by shopping at user model-enabled retail stores because the user's transactions can be tracked and added to their user model. In addition, because a user's individual user model 17 can store all user information and transaction history, purchases from one store can be used to improve the user's shopping experience at different stores. For example, a third-party application 14 associated with a bookstore in a shopping mall can use transaction data from a user's online book purchases as well as purchases from that particular bookstore to perform a better overall assessment of the user's reading preferences, rather than using only the user's transaction history from that particular bookstore.

在博物馆示例中,用户可以在其一个或多个用户设备上访问其用户模型17以及可视化并决定他们想要使来自他们的个人属性的哪些信息可用于博物馆(例如,教育、近期旅游历史、图书偏好、一般偏好等)。与博物馆相关联的第三方应用程序14可以包括扫描器或阅读器以及用户的移动设备可以提供视觉条形码。该视觉条形码可以包括临时密码,该临时密码可以被扫描器或阅读器破译。第三方应用程序14然后可以使用临时密码访问个人属性信息,用户11使该个人属性信息可用。第三方应用程序14然后可以评估可用的个人属性信息并基于该评估对用户11进行建议,诸如他们可能感兴趣的吸引人的事物。另外,第三方应用程序14可以充当虚拟博物馆导游以创建可以在用户手机或单独设备上播放的旅游,用以提高针对用户的教育背景和个人偏好定制的博物馆体验。In the museum example, a user can access their user model 17 on one or more of their user devices and visualize and decide which information from their personal attributes they want to make available to the museum (e.g., education, recent travel history, book preferences, general preferences, etc.). A third-party application 14 associated with the museum can include a scanner or reader and the user's mobile device can provide a visual barcode. The visual barcode can include a temporary password that can be deciphered by the scanner or reader. The third-party application 14 can then use the temporary password to access the personal attribute information that the user 11 made available. The third-party application 14 can then evaluate the available personal attribute information and make recommendations to the user 11 based on the evaluation, such as attractions that they may be interested in. In addition, the third-party application 14 can act as a virtual museum tour guide to create a tour that can be played on the user's mobile phone or separate device to enhance the museum experience customized to the user's educational background and personal preferences.

在旅游网站示例中,用户11可以允许与旅游网站相关联的第三方应用程序14访问其个人属性信息的多个部分(例如兴趣、近期旅游等)。第三方应用程序14然后可以评估用户的信息并建议用户11可能感兴趣的定制旅游计划。如果用户11在旅游网站上进行购买,则第三方应用程序14可以与系统10交流该交易。In the travel website example, user 11 may allow a third-party application 14 associated with the travel website to access various portions of their personal attribute information (e.g., interests, recent travel, etc.). Third-party application 14 may then evaluate the user's information and suggest customized travel plans that user 11 may be interested in. If user 11 makes a purchase on the travel website, third-party application 14 may communicate the transaction to system 10.

在另一示例中,系统10自身或与第三方应用程序14交互的系统10可以充当全球软件代理,该全球软件代理基于中央用户模型处理器17中的相似匿名用户信息来为每个订阅用户11构造亲密团体和人际关系推断。系统10可以提供可能的感兴趣项目的自动选择和推荐。系统10可以包括基于概率的算法,该算法基于存储在用户模型17中的用于匹配用户11的信息匿名地匹配类似用户11以填充个人属性中的缺口。系统10还可以包括基于概率的算法,该算法基于来自类似用户和面向目标的用户群的数据推荐将改善用户体验的活动。In another example, the system 10, by itself or in interaction with a third-party application 14, can act as a global software agent that constructs affinity groups and interpersonal inferences for each subscribing user 11 based on similar anonymous user information in the central user model processor 17. The system 10 can provide automatic selection and recommendation of possible items of interest. The system 10 can include a probability-based algorithm that anonymously matches similar users 11 to fill gaps in personal attributes based on information stored in the user model 17 for matching users 11. The system 10 can also include a probability-based algorithm that recommends activities that will improve the user experience based on data from similar users and targeted user groups.

继上文示例之后,除了与其它第三方应用程序14交互以外,系统10还可以充当社交网络应用程序。系统10可以允许用户使其个体用户模型17的某些部分对于查看并提供反馈的其他用户来说是公开可用的。用户11可以将各种过滤器应用于其个人属性数据,从而例如根据与用户11的关系或连接,不同用户11可以看到不同聚合的数据。将过滤器应用于用户的个人属性数据和/或其他用户的属性数据可以创建按照共同属性而分组在一起的多个用户的亲密团体。在适当的时候,系统10可以使用来自其他用户11的反馈来更新用户的个体用户模型17。例如,当用户具有由亲密团体中的其他用户共享的其它属性时,可以将该亲密团体共有的属性应用于用户模型17中的属性。这些建议可以增大用户的个体用户模型17的范围,因此为第三方应用程序14提供关于用户的更详细信息。Continuing with the above example, in addition to interacting with other third-party applications 14, the system 10 can also act as a social networking application. The system 10 can allow a user to make certain portions of their individual user model 17 publicly available for other users to view and provide feedback. A user 11 can apply various filters to their personal attribute data so that different users 11 see different aggregates of data, for example, based on their relationship or connection to the user 11. Applying filters to a user's personal attribute data and/or other users' attribute data can create affinity groups of multiple users grouped together according to common attributes. When appropriate, the system 10 can use feedback from other users 11 to update a user's individual user model 17. For example, when a user has additional attributes shared by other users in an affinity group, the attributes shared by the affinity group can be applied to the attributes in the user model 17. These suggestions can increase the scope of the user's individual user model 17, thereby providing the third-party application 14 with more detailed information about the user.

继上文示例之后,当执行应用程序14和应用程序15内的评估工具时,用户11可以查看其用户模型17的完整性水平(例如,相比于有多少全球可用的属性,用户11已经存储了多少属性)。用户11还可以邀请其他用户11执行相同的应用程序14和应用程序15以关于相同课题评估用户11或其自身。Continuing with the above example, when executing the assessment tools within applications 14 and 15, user 11 can view the completeness level of their user model 17 (e.g., how many attributes user 11 has stored compared to how many attributes are available globally). User 11 can also invite other users 11 to execute the same applications 14 and 15 to assess user 11 or themselves on the same topic.

在又一示例中,除了包括用于评估工具的用户属性外,用户模型17还可以充当用户医疗记录的安全全球存储库。在请求之后,可以允许与特定医生、诊所或医院相关联的应用程序14访问用户的医疗记录。因为来自不同医生和诊所的记录可以全部被存储在一个地方,所以可以具有很少的由于被提供错误信息的医生(其还未接收足够的医疗历史)而造成的医疗错误,以及不太必须将文书工作从一个医生发送到另一个医生等。而且,当用户11接收医疗测试的结果时,医生(或医院或诊所)可以向用户给出将这些结果保存在用户的个体用户模型17中的选项。如果获得批准,则与医生相关联的应用程序14和应用程序15可以与系统10通信以输入用户的医疗结果。分析处理器20可以将输入的医疗结果分类到用户的个体用户模型17中的合适位置中。In yet another example, in addition to including user attributes for assessment tools, the user model 17 can also serve as a secure global repository for the user's medical records. Upon request, an application 14 associated with a particular doctor, clinic, or hospital can be allowed to access the user's medical records. Because records from different doctors and clinics can all be stored in one place, there can be fewer medical errors caused by doctors who are provided with incorrect information (who have not yet received sufficient medical history), and there is less need to send paperwork from one doctor to another, etc. Moreover, when the user 11 receives the results of a medical test, the doctor (or hospital or clinic) can give the user the option of saving these results in the user's individual user model 17. If approved, the application 14 and application 15 associated with the doctor can communicate with the system 10 to enter the user's medical results. The analysis processor 20 can classify the entered medical results into the appropriate location in the user's individual user model 17.

应当理解,本发明在其应用上不限于在本说明书中提出的或在附图中示出的构造的细节以及部件的布置。本发明能够实现其它实施方式,以及能够以各种方式来实践或执行。而且,应当理解,本文中所使用的短语和术语出于描述目的且不应当被视为限制。“包括”、“包含”、或“具有”及其变型在本文中的使用意味着涵盖其后所列的项目及其等效物以及额外的项目。除非另有规定或限制,否则术语“安装”、“连接”、“支撑”、和“联接”及其变型被概括使用,以及涵盖直接的安装、连接、支撑和联接以及间接的安装、连接、支撑和联接。此外,“连接”和“联接”不限于物理的或机械的连接或联接。It should be understood that the present invention is not limited in its application to the details of the construction and the arrangement of parts proposed in this specification or shown in the accompanying drawings. The present invention is capable of realizing other embodiments and can be practiced or performed in various ways. Moreover, it should be understood that the phrases and terms used herein are for descriptive purposes and should not be considered as limiting. The use of "including", "comprising", or "having" and its variations in this article is meant to cover the items listed thereafter and their equivalents as well as additional items. Unless otherwise specified or limited, the terms "install", "connect", "support", and "couple" and their variations are used in a general way and cover direct installation, connection, support and connection as well as indirect installation, connection, support and connection. In addition, "connect" and "couple" are not limited to physical or mechanical connections or connections.

呈现前面的讨论以使本领域的技术人员能够进行和使用本发明的实施方式。对图示实施方式的各种修改对于本领域的技术人员来说将是显而易见的,以及本文中的一般性原理可以应用于其它实施方式和应用而不脱离本发明的实施方式。因此,本发明的实施方式不意图受限于所示的实施方式,而是将使其符合与本文中所公开的原理和特征一致的最广范围。参照附图阅读详细描述,其中,在不同附图中的相同元件具有相同的附图标记。不一定按比例的附图示出了所选实施方式且不意图限制本发明的实施方式的范围。技术人员将认识到,本文中提供的示例具有许多有用的替选方式且落在本发明的实施方式的范围内。The foregoing discussion is presented to enable those skilled in the art to make and use embodiments of the present invention. Various modifications to the illustrated embodiments will be apparent to those skilled in the art, and the general principles herein can be applied to other embodiments and applications without departing from embodiments of the present invention. Therefore, embodiments of the present invention are not intended to be limited to the embodiments shown, but rather to be accorded the widest scope consistent with the principles and features disclosed herein. The detailed description is read with reference to the accompanying drawings, in which identical elements in different drawings have the same reference numerals. The drawings, which are not necessarily to scale, illustrate selected embodiments and are not intended to limit the scope of embodiments of the present invention. It will be appreciated by those skilled in the art that the examples provided herein have many useful alternatives and fall within the scope of embodiments of the present invention.

尽管上文已描述了各种实施方式,但是应当理解,通过示例而非限制的方式呈现了这些实施方式。对于相关领域中的技术人员将显而易见的是,可以进行各种形式和细节改变而不脱离精神和范围。事实上,在阅读上文描述之后,对于相关领域中的技术人员将显而易见的是如何实现替选实施方式。Although various embodiments have been described above, it should be understood that these embodiments have been presented by way of example and not limitation. It will be apparent to those skilled in the relevant art that various changes in form and detail may be made without departing from the spirit and scope. Indeed, after reading the above description, it will be apparent to those skilled in the relevant art how to implement alternative embodiments.

此外,应当理解,仅出于示例目的呈现了突出功能和优势的任何附图。所公开的方法和系统均足够灵活且可配置使得可以以所示出的方式以外的方式来利用这些方法和系统。Furthermore, it should be understood that any drawings highlighting features and advantages are presented for illustrative purposes only.The disclosed methods and systems are sufficiently flexible and configurable such that they can be utilized in ways other than those shown.

尽管术语“至少一个”可以经常被用在说明书、权利要求和附图中,但是术语“一”、“该”、“所述”等在说明书、权利要求和附图中也表示“至少一个”或“该至少一个”。Although the term "at least one" may often be used in the specification, claims, and drawings, the terms "a," "the," "said," etc. also mean "at least one" or "the at least one" in the specification, claims, and drawings.

最后,申请人的意图是仅包括“用于...的方法”或“用于...的步骤”的表达语言的权利要求根据35U.S.C.112(f)来解释。不明确包括短语“用于...的方法”或“用于...的步骤”的短语的权利要求不根据35U.S.C.112(f)来解释。Finally, Applicant intends that claims that include only the phrase "a method for" or "a step for" be interpreted under 35 U.S.C. 112(f). Claims that do not expressly include the phrase "a method for" or "a step for" are not to be interpreted under 35 U.S.C. 112(f).

Claims (42)

1.一种数据流方法,包括:1. A data flow method, comprising: 利用由联接到数据库且与访问受控服务相关联的处理器执行的用户模块接收用于具有关于所述访问受控服务的账户的用户的属性的值;The user module, executed by a processor connected to the database and associated with the access-controlled service, receives values for attributes of a user having an account related to the access-controlled service; 利用所述用户模块确定所述值是否从由与所述用户相关联的组织发起的评估导出,其中所述组织具有关于所述访问受控服务的至少一个账户;The user module is used to determine whether the value is derived from an assessment initiated by an organization associated with the user, wherein the organization has at least one account with respect to the access-controlled service; 当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,利用所述用户模块,将接收的所述值存储在所述数据库中的仅与所述用户相关联且通过所述组织的所述至少一个账户不可访问的记录中,以及利用所述用户模块,将接收的所述值存储在与所述组织和所述用户相关联的单独记录中,其中由第三方对所述单独记录的访问受所述用户控制;When the value is derived from the evaluation initiated by the organization associated with the user, the user module is used to store the received value in a record in the database that is associated only with the user and is inaccessible through the organization's at least one account, and the user module is also used to store the received value in a separate record associated with the organization and the user, wherein access to the separate record by a third party is controlled by the user. 当所述值从与由与所述用户相关联的所述组织发起的所述评估不同的来源导出时,利用所述用户模块,将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中;When the value is derived from a source different from the evaluation initiated by the organization associated with the user, the user module is used to store the received value in the record in the database that is associated only with the user. 利用由所述处理器执行的分析处理模块,确定所述属性是否与预测模型相关联;Using the analysis processing module executed by the processor, it is determined whether the attribute is associated with the prediction model; 响应于确定所述属性与所述预测模型相关联,利用所述分析处理模块使用接收的所述值执行与所述属性相关联的所述预测模型以使用所述属性的分数和置信度因数生成预测值;In response to determining that the attribute is associated with the prediction model, the analysis processing module uses the received value to execute the prediction model associated with the attribute to generate a predicted value using the attribute's score and confidence factor; 当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,利用所述分析处理模块,将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述组织和所述用户相关联的所述记录中;以及When the value is derived from the assessment initiated by the organization associated with the user, the analysis processing module is used to store the predicted value in the database in the record associated only with the user and in the record associated with both the organization and the user; and 当所述值从不是由与所述用户相关联的组织发起的所述评估导出时,利用所述分析处理模块,将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中。When the value is derived from an assessment not initiated by an organization associated with the user, the analysis processing module uses the predicted value to store it in the database in a record associated only with the user. 2.如权利要求1所述的方法,还包括:2. The method of claim 1, further comprising: 利用所述用户模块确定是否授权具有关于所述访问受控服务的至少一个账户的第二组织查看接收的所述值;以及The user module is used to determine whether a second organization with at least one account related to the controlled access service is authorized to view the received value; and 当授权所述第二组织查看接收的所述值时,利用所述用户模块,将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述第二组织和所述用户相关联的记录中,其中由第三方对与所述第二组织和所述用户相关联的所述记录的访问受所述用户控制。When the second organization is authorized to view the received value, the user module is used to store the received value in the database in the record associated only with the user and in the record associated with the second organization and the user, wherein access to the record associated with the second organization and the user by a third party is controlled by the user. 3.如权利要求2所述的方法,还包括:利用由所述处理器执行的数据风险容限商模块执行对于所述用户的风险容限评估以生成对于所述用户的风险容限;3. The method of claim 2, further comprising: performing a risk tolerance assessment for the user using a data risk tolerance module executed by the processor to generate a risk tolerance for the user; 其中,利用所述用户模块确定是否授权所述第二组织查看接收的所述值包括:Specifically, determining whether to authorize the second organization to view the received values using the user module includes: 利用所述用户模块,基于所述风险容限将隐私过滤器分配给所述用户;以及Using the user module, a privacy filter is assigned to the user based on the risk tolerance; and 利用所述用户模块确定所述隐私过滤器是否允许与所述第二组织共享接收的所述值。The user module is used to determine whether the privacy filter allows the received value to be shared with the second organization. 4.如权利要求3所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块从所述用户接收对风险容限问题的回答。4. The method of claim 3, wherein performing the risk tolerance assessment for the user using the data risk tolerance specialist module includes: receiving answers to risk tolerance questions from the user using the data risk tolerance specialist module. 5.如权利要求4所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块计算与对所述风险容限问题的所述回答相关联的风险容限分数。5. The method of claim 4, wherein performing the risk tolerance assessment for the user using the data risk tolerance quotient module comprises: calculating a risk tolerance score associated with the answer to the risk tolerance question using the data risk tolerance quotient module. 6.如权利要求3所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块监控用户行为。6. The method of claim 3, wherein performing the risk tolerance assessment for the user using the data risk tolerance module includes: monitoring user behavior using the data risk tolerance module. 7.如权利要求3所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块从所述用户接收对所述风险容限的调整。7. The method of claim 3, wherein performing the risk tolerance assessment for the user using the data risk tolerance provider module comprises: receiving an adjustment to the risk tolerance from the user using the data risk tolerance provider module. 8.如权利要求1所述的方法,还包括:8. The method of claim 1, further comprising: 利用所述用户模块确定是否授权具有关于所述访问受控服务的至少一个账户的第二组织查看所述预测值;以及The user module is used to determine whether a second organization with at least one account related to the controlled access service is authorized to view the predicted value; and 当授权所述第二组织查看所述预测值时,利用所述用户模块将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述第二组织和所述用户相关联的记录中,其中由第三方对与所述第二组织和所述用户相关联的所述记录的访问受所述用户控制。When the second organization is authorized to view the predicted value, the user module is used to store the predicted value in the database in the record associated only with the user and in the record associated with the second organization and the user, wherein access to the record associated with the second organization and the user by a third party is controlled by the user. 9.如权利要求8所述的方法,还包括:利用由所述处理器执行的数据风险容限商模块执行对于所述用户的风险容限评估以生成对于所述用户的风险容限;9. The method of claim 8, further comprising: performing a risk tolerance assessment for the user using a data risk tolerance module executed by the processor to generate a risk tolerance for the user; 其中,利用所述用户模块确定是否授权所述第二组织查看所述预测值包括:The process of determining whether to authorize the second organization to view the predicted value using the user module includes: 利用所述用户模块,基于所述风险容限将隐私过滤器分配给所述用户;以及Using the user module, a privacy filter is assigned to the user based on the risk tolerance; and 利用所述用户模块确定所述隐私过滤器是否允许与所述第二组织共享所述预测值。The user module is used to determine whether the privacy filter allows the predicted value to be shared with the second organization. 10.如权利要求9所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块从所述用户接收对风险容限问题的回答。10. The method of claim 9, wherein performing the risk tolerance assessment for the user using the data risk tolerance specialist module comprises: receiving answers to risk tolerance questions from the user using the data risk tolerance specialist module. 11.如权利要求10所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块计算与对所述风险容限问题的所述回答相关联的风险容限分数。11. The method of claim 10, wherein performing the risk tolerance assessment for the user using the data risk tolerance quotient module comprises: calculating a risk tolerance score associated with the answer to the risk tolerance question using the data risk tolerance quotient module. 12.如权利要求9所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块监控用户行为。12. The method of claim 9, wherein performing the risk tolerance assessment for the user using the data risk tolerance module comprises: monitoring user behavior using the data risk tolerance module. 13.如权利要求9所述的方法,其中,利用所述数据风险容限商模块执行对于所述用户的所述风险容限评估包括:利用所述数据风险容限商模块从所述用户接收对所述风险容限的调整。13. The method of claim 9, wherein performing the risk tolerance assessment for the user using the data risk tolerance provider module comprises: receiving an adjustment to the risk tolerance from the user using the data risk tolerance provider module. 14.如权利要求1所述的方法,还包括:利用所述用户模块从所述用户接收存储接收的所述值的许可。14. The method of claim 1, further comprising: using the user module to receive permission from the user to store the received value. 15.如权利要求14所述的方法,还包括:利用所述用户模块确定是否需要存储接收的所述值的用户许可。15. The method of claim 14, further comprising: using the user module to determine whether a user permission is required to store the received value. 16.如权利要求1所述的方法,还包括:16. The method of claim 1, further comprising: 利用所述用户模块提供用于由所述用户执行的第一个性化评估工具,其中,所述第一个性化评估工具的结果包括接收的所述值;以及The user module provides a first personalized assessment tool for execution by the user, wherein the result of the first personalized assessment tool includes the received value; and 利用所述用户模块提供与与所述用户相关联的所述组织和所述用户相关联的所述记录,当所述用户授权时,用于创建用于由所述用户执行的第二个性化评估工具。The user module provides records associated with the organization and the user, which, when authorized by the user, are used to create a second personalized assessment tool for execution by the user. 17.如权利要求1所述的方法,还包括:在将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中、与与所述用户相关联的所述组织和所述用户相关联的所述记录中、或二者的组合中之前,利用所述用户模块加密接收的所述值。17. The method of claim 1, further comprising: encrypting the received value using the user module before storing the received value in a record in the database that is associated only with the user, in a record that is associated with the organization and the user, or in a combination thereof. 18.如权利要求1所述的方法,还包括:利用所述用户模块提供临时密码,所述临时密码允许访问存储在与与所述用户相关联的所述组织和所述用户相关联的所述记录中的接收的所述值。18. The method of claim 1, further comprising: providing a temporary password using the user module, the temporary password allowing access to the received value stored in the record associated with the organization and the user. 19.如权利要求1所述的方法,还包括:利用由所述处理器执行的目录模块将标识符分配给与所述用户相关联的所述记录,其中所述用户模块使用所述标识符定位和访问与所述用户相关联的所述记录的一部分。19. The method of claim 1, further comprising: assigning an identifier to the record associated with the user using a directory module executed by the processor, wherein the user module uses the identifier to locate and access a portion of the record associated with the user. 20.一种数据流系统,包括:20. A data flow system, comprising: 数据库;database; 联接到所述数据库且与访问受控服务相关联的硬件处理器;A hardware processor connected to the database and associated with access-controlled services; 用户模块,所述用户模块由所述硬件处理器执行且配置成:User module, which is executed by the hardware processor and configured to: 接收用于具有关于所述访问受控服务的账户的用户的属性的值;Receive values for attributes of users with accounts accessing the controlled services; 确定所述值是否从由与所述用户相关联的组织发起的评估导出,其中所述组织具有关于所述访问受控服务的至少一个账户;Determine whether the value is derived from an assessment initiated by an organization associated with the user, wherein the organization has at least one account with respect to the access-controlled service; 当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,将接收的所述值存储在所述数据库中的仅与所述用户相关联且通过所述组织的所述至少一个账户不可访问的记录中,以及将接收的所述值存储在与所述组织和所述用户相关联的单独记录中,其中由第三方对所述单独记录的访问受所述用户控制;When the value is derived from the evaluation initiated by the organization associated with the user, the received value is stored in a record in the database that is associated only with the user and is inaccessible through the organization's at least one account, and the received value is also stored in a separate record associated with the organization and the user, wherein access to the separate record by a third party is controlled by the user. 当所述值从与由与所述用户相关联的所述组织发起的所述评估不同的来源导出时,将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中;以及When the value is derived from a source different from the assessment initiated by the organization associated with the user, the received value is stored in the database in a record associated only with the user; and 分析处理模块,所述分析处理模块由所述硬件处理器执行且配置成:Analysis and processing module, which is executed by the hardware processor and configured to: 确定所述属性是否与预测模型相关联;Determine whether the attribute is associated with the prediction model; 响应于确定所述属性与所述预测模型相关联,使用接收的所述值执行与所述属性相关联的所述预测模型以使用所述属性的分数和置信度因数生成预测值;In response to determining that the attribute is associated with the prediction model, the prediction model associated with the attribute is executed using the received value to generate a predicted value using the attribute's score and confidence factor; 当所述值从由与所述用户相关联的所述组织发起的所述评估导出时,将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述组织和所述用户相关联的所述记录中;以及When the value is derived from the assessment initiated by the organization associated with the user, the predicted value is stored in the database in the record associated only with the user and in the record associated with both the organization and the user; and 当所述值从不是由与所述用户相关联的组织发起的所述评估导出时,将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中。When the value is derived from an assessment not initiated by an organization associated with the user, the predicted value is stored in the database in a record associated only with the user. 21.如权利要求20所述的系统,其中,所述用户模块还配置成:21. The system of claim 20, wherein the user module is further configured to: 确定是否授权具有关于所述访问受控服务的至少一个账户的第二组织查看接收的所述值;以及Determine whether to authorize a second organization with at least one account regarding access to the controlled service to view the received value; and 当授权所述第二组织查看接收的所述值时,将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述第二组织和所述用户相关联的记录中,其中由第三方对与所述第二组织和所述用户相关联的所述记录的访问受所述用户控制。When the second organization is authorized to view the received value, the received value is stored in the database in the record associated only with the user and in the record associated with both the second organization and the user, wherein access to the record associated with both the second organization and the user by a third party is controlled by the user. 22.如权利要求21所述的系统,还包括由所述硬件处理器执行的数据风险容限商模块,所述数据风险容限商模块配置成执行对于所述用户的风险容限评估以生成对于所述用户的风险容限;22. The system of claim 21, further comprising a data risk tolerance specialist module executed by the hardware processor, the data risk tolerance specialist module being configured to perform a risk tolerance assessment for the user to generate a risk tolerance for the user; 其中,所述用户模块配置成通过如下方式确定是否授权所述第二组织查看接收的所述值:The user module is configured to determine whether to authorize the second organization to view the received value in the following manner: 基于所述风险容限将隐私过滤器分配给所述用户;以及The privacy filter is assigned to the user based on the aforementioned risk tolerance; and 确定所述隐私过滤器是否允许与所述第二组织共享接收的所述值。Determine whether the privacy filter allows the received value to be shared with the second organization. 23.如权利要求22所述的系统,其中,所述数据风险容限商模块配置成通过从所述用户接收对风险容限问题的回答来执行对于所述用户的所述风险容限评估。23. The system of claim 22, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by receiving answers to risk tolerance questions from the user. 24.如权利要求23所述的系统,其中,所述数据风险容限商模块配置成通过计算与对所述风险容限问题的所述回答相关联的风险容限分数来执行对于所述用户的所述风险容限评估。24. The system of claim 23, wherein the data risk tolerance quotient module is configured to perform the risk tolerance assessment for the user by calculating a risk tolerance score associated with the answer to the risk tolerance question. 25.如权利要求22所述的系统,其中,所述数据风险容限商模块配置成通过监控用户行为来执行对于所述用户的所述风险容限评估。25. The system of claim 22, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by monitoring user behavior. 26.如权利要求22所述的系统,其中,所述数据风险容限商模块配置成通过从所述用户接收对所述风险容限的调整来执行对于所述用户的所述风险容限评估。26. The system of claim 22, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by receiving adjustments to the risk tolerance from the user. 27.如权利要求20所述的系统,其中,所述用户模块还配置成:27. The system of claim 20, wherein the user module is further configured to: 确定是否授权具有关于所述访问受控服务的至少一个账户的第二组织查看所述预测值;以及Determine whether to authorize a second organization with at least one account regarding access to the controlled service to view the predicted value; and 当授权所述第二组织查看所述预测值时,将所述预测值存储在所述数据库中的仅与所述用户相关联的所述记录中以及与所述第二组织和所述用户相关联的记录中,其中由第三方对与所述第二组织和所述用户相关联的所述记录的访问受所述用户控制。When the second organization is authorized to view the predicted value, the predicted value is stored in the database in the record associated only with the user and in the record associated with both the second organization and the user, wherein access to the record associated with both the second organization and the user by a third party is controlled by the user. 28.如权利要求27所述的系统,还包括由所述硬件处理器执行的数据风险容限商模块,所述数据风险容限商模块配置成执行对于所述用户的风险容限评估以生成对于所述用户的风险容限;28. The system of claim 27, further comprising a data risk tolerance specialist module executed by the hardware processor, the data risk tolerance specialist module being configured to perform a risk tolerance assessment for the user to generate a risk tolerance for the user; 其中,所述用户模块配置成通过如下方式确定是否授权所述第二组织查看所述预测值:The user module is configured to determine whether to authorize the second organization to view the predicted value in the following manner: 基于所述风险容限将隐私过滤器分配给所述用户;以及The privacy filter is assigned to the user based on the aforementioned risk tolerance; and 确定所述隐私过滤器是否允许与所述第二组织共享所述预测值。Determine whether the privacy filter allows the predicted value to be shared with the second organization. 29.如权利要求28所述的系统,其中,所述数据风险容限商模块配置成通过从所述用户接收对风险容限问题的回答来执行对于所述用户的所述风险容限评估。29. The system of claim 28, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by receiving answers to risk tolerance questions from the user. 30.如权利要求29所述的系统,其中,所述数据风险容限商模块配置成通过计算与对所述风险容限问题的所述回答相关联的风险容限分数来执行对于所述用户的所述风险容限评估。30. The system of claim 29, wherein the data risk tolerance quotient module is configured to perform the risk tolerance assessment for the user by calculating a risk tolerance score associated with the answer to the risk tolerance question. 31.如权利要求28所述的系统,其中,所述数据风险容限商模块配置成通过监控用户行为来执行对于所述用户的所述风险容限评估。31. The system of claim 28, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by monitoring user behavior. 32.如权利要求28所述的系统,其中,所述数据风险容限商模块配置成通过从所述用户接收对所述风险容限的调整来执行对于所述用户的所述风险容限评估。32. The system of claim 28, wherein the data risk tolerance module is configured to perform the risk tolerance assessment for the user by receiving adjustments to the risk tolerance from the user. 33.如权利要求20所述的系统,其中,所述用户模块还配置成从所述用户接收存储接收的所述值的许可。33. The system of claim 20, wherein the user module is further configured to receive permission from the user to store the received value. 34.如权利要求33所述的系统,其中,所述用户模块还配置成确定是否需要存储接收的所述值的用户许可。34. The system of claim 33, wherein the user module is further configured to determine whether a user license is required to store the received value. 35.如权利要求20所述的系统,其中,所述用户模块还配置成:35. The system of claim 20, wherein the user module is further configured to: 提供用于由所述用户执行的第一个性化评估工具,其中,所述第一个性化评估工具的结果包括接收的所述值;以及Provide a first personalized assessment tool for execution by the user, wherein the result of the first personalized assessment tool includes the received value; and 提供与与所述用户相关联的所述组织和所述用户相关联的所述记录,当所述用户授权时,用于创建用于由所述用户执行的第二个性化评估工具。Provide the records associated with the organization and the user, when the user authorizes, for creating a second personalized assessment tool for the user to perform. 36.如权利要求20所述的系统,其中,所述用户模块还配置成:在将接收的所述值存储在所述数据库中的仅与所述用户相关联的所述记录中、与与所述用户相关联的所述组织和所述用户相关联的所述记录中、或二者的组合中之前,加密接收的所述值。36. The system of claim 20, wherein the user module is further configured to encrypt the received value before storing it in the database in a record associated only with the user, in a record associated with the organization and the user, or a combination thereof. 37.如权利要求20所述的系统,其中,所述用户模块还配置成提供临时密码,所述临时密码允许访问存储在与与所述用户相关联的所述组织和所述用户相关联的所述记录中的接收的所述值。37. The system of claim 20, wherein the user module is further configured to provide a temporary password that allows access to the received value stored in the record associated with the organization and the user. 38.如权利要求20所述的系统,还包括由所述硬件处理器执行的目录模块,所述目录模块配置成将标识符分配给与所述用户相关联的所述记录,其中所述用户模块使用所述标识符定位和访问与所述用户相关联的所述记录的一部分。38. The system of claim 20, further comprising a directory module executed by the hardware processor, the directory module being configured to assign an identifier to the record associated with the user, wherein the user module uses the identifier to locate and access a portion of the record associated with the user. 39.如权利要求20所述的系统,其中,所述数据库置于至少一个数据存储服务器中。39. The system of claim 20, wherein the database is located in at least one data storage server. 40.如权利要求39所述的系统,其中,所述硬件处理器置于与所述至少一个数据存储服务器通信的服务器中。40. The system of claim 39, wherein the hardware processor is located in a server communicating with the at least one data storage server. 41.如权利要求39所述的系统,其中,所述硬件处理器包括多个处理器,所述多个处理器包括以下各项中的至少两者:41. The system of claim 39, wherein the hardware processor comprises a plurality of processors, the plurality of processors comprising at least two of the following: 至少一个目录处理器,所述至少一个目录处理器与所述至少一个数据存储服务器通信且提供对所述至少一个数据存储服务器的访问;At least one directory processor, which communicates with and provides access to the at least one data storage server; 与所述至少一个目录处理器通信的至少一个用户模型处理器;At least one user model processor that communicates with the at least one directory processor; 与所述至少一个用户模型处理器通信的至少一个分析处理器;At least one analysis processor that communicates with the at least one user model processor; 与所述至少一个用户模型处理器通信的至少一个网络处理器;At least one network processor communicating with the at least one user model processor; 与所述至少一个用户模型处理器通信的至少一个应用程序处理器;以及At least one application processor communicating with the at least one user model processor; and 与所述至少一个网络处理器和所述至少一个应用程序处理器中的至少一者通信的至少一个用户设备。At least one user device that communicates with at least one of the at least one network processor and the at least one application processor. 42.如权利要求41所述的系统,其中:42. The system of claim 41, wherein: 所述至少一个目录处理器置于至少一个目录服务器中;The at least one directory processor is placed in at least one directory server; 所述至少一个用户模型处理器置于至少一个用户模型服务器中;The at least one user model processor is placed in at least one user model server; 所述至少一个分析处理器置于至少一个分析服务器中;以及The at least one analysis processor is located in at least one analysis server; and 所述至少一个网络处理器置于至少一个网络服务器中。The at least one network processor is located in at least one network server.
HK18101659.0A 2014-10-06 2015-07-17 One way and two way data flow systems and methods HK1242439B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US62/060,440 2014-10-06

Publications (2)

Publication Number Publication Date
HK1242439A1 HK1242439A1 (en) 2018-06-22
HK1242439B true HK1242439B (en) 2020-04-09

Family

ID=

Similar Documents

Publication Publication Date Title
US20230237504A1 (en) Systems and methods for verifying issuance of new digital credentials
US11042885B2 (en) Digital credential system for employer-based skills analysis
US10984496B1 (en) Threat assessment and response facilitation system and method
Phillips et al. Depth of discussion of multicultural identities in supervision and supervisory outcomes
US9703984B2 (en) One way and two way data flow systems and methods
Leonard et al. The development of the functional analytic psychotherapy intimacy scale
Tran et al. Influences of subjective norms on teachers’ intention to use social media in working
CN108701293A (en) Systems and methods for data-driven identification of talent
US20230187036A1 (en) Method for controlled and trust-aware contact tracing with active involvement of contact actors
US20150066554A1 (en) Optimizing organization and management of teams
US20250315821A1 (en) System & method to detect fraudulent or abusive behavior as part of medical record and medication management
McLaughlin et al. Evaluating medical devices remotely: Current methods and potential innovations
Bennett et al. Reaction-organizational learning, community, and virtual HRD: Advancing the discussion
US20250291948A1 (en) Method to provide on demand verifiability of a medical metric for a patient using a distributed ledger
Shirish et al. The impact of ICT characteristics on students’ learning outcomes during COVID-19 lockdown period: The crucial role of techno eustress perception
Dawson Clearing the clouds: Factors of technology adoption and their relationship to cloud computing adoption in United States higher education-An extended TAM study
Hah et al. Exploring care providers’ perceptions and current use of telehealth technology at work, in daily life, and in education: qualitative and quantitative study
Alsalamah et al. Virtual healthcare bot (VHC-Bot): a Person-centered AI chatbot for transforming patient care and healthcare workforce dynamics
Beachy et al. An examination of emerging bioethical issues in biomedical research: Proceedings of a workshop
Pittmann et al. The impact of a professional development workshop on healthcare professionals’ knowledge and readiness to use telehealth etiquette in virtual care
Prabhune et al. Do LLMs have a Gender (Entropy) Bias?
HK1242439B (en) One way and two way data flow systems and methods
Thoër et al. When medicine is becoming collaborative: Social networking among health-care professionals
Suleman Learning to trust: exploring the relationship between user engagement and perceptions of trustworthiness in self-sovereign blockchain systems
HK1242439A1 (en) One way and two way data flow systems and methods