This disclosure is directed toward an organization of a collaborative database to encourage collaboration while working with data in the database and in contacts to third party collaborators. The organization discussed addresses problems encountered in the disruption of database entries when there may be frequent user modifications and variations of database objects.
In the past fifty years oilfield data management has gone from being a paper-based data medium to today's “digital oilfield.” In response to the increasing data flow in a digital format, companies first went to data analysis at workstations, perhaps with centralized server databases. The control of the data in such a system suffered from a failure to adequately address the fundamental requirements: data must be accessible and cataloged; data is valuable and must be protected from intrusion and storage failure; data must be manipulated and improved; data must be shared both within a company but also securely shared with designated third parties.
The incorporation of relational database management systems has solved the access to cataloged issue, provided the schema contains the appropriate keys. Commercial databases can also be easily backed up and protected, satisfying protection from intrusion and failure. The operation on centrally-stored data by copies of local workstations or PCs raises the question of multiple backups (central and local) and the fragmentation of data entries complicates the accessing and cataloging of all copies of data.
In oil and gas exploration the information on wells is an example where data is often modified. It is typical that drilling logs are edited to match other logs and are used in calculations in an attempt to better understand the well environment. An additional complication is that specialists, such as petrophysicists and geologists, may have different interpretations and different models of a well. This may lead to multiple valid edits of the same well data. If these logs are accumulated in a flat file system, it becomes a very time-consuming and error-prone process to keep track of the file versions caused by these conflicting edits. In particular, edits may overwrite the original data entries which may have been previously used in calculations, thus making those calculations irreproducible. There is also a problem with distinguishing across data entry versions making it difficult to determine which entries represent the authoritative entries. It is difficult to track what changes were made to modified entries, and which versions were previously used. A major problem in versioning of this changing data, sometimes referred to as “transient” data is that different disciplines may be trading edited curves back and forth with each discipline making what is valid changes according to their discipline's interpretation of what the data represents.
One touted advantage of the “digital oilfield” was the ability to share data between players in the oilfield: drilling companies, service companies, oilfield financiers and owners of the oilfield. Each of these players may have a common interest in well information. In oilfield exploration databases the major key is usually a well or wellbore. Standardized formats for data sharing (DLIS, LAS, CSV, etc.) have been developed to facilitate data exchanges. However, these formats may produce very large files. Accordingly, the exchange of data with field units (likely suffering from a limited Ethernet bandwidth) has been inconvenient, in part because data files in standard formats may be many megabytes in size. This situation may be complicated when a view of the data is hidden within the exchanged data. The exchanged data often includes a well logging run including the outputs of many logging tools in which there may be no immediate interest.
To alleviate this organizational problem many systems (e.g., Geolog, Petrel Decision, Interactive Petrophysics) organize the well information into databases. Without additional organization, such databases still reference a confusing mixture of variations of the same log entries. Thus, even with a relational database, there is a time-consuming, error-prone search for authoritative entries and authoritative entries can be overwritten. Collaboration between users is inhibited when there is a fear that a user can modify and overwrite documents. Users who need to actively experiment with different interpretation models are inhibited by the fear that they might interfere with other users. Current systems which attempt to address some of these problems include version control systems such as GIT. A version control system is defined as “a system that records changes to a file or set of files over time so that you can recall specific versions later.” This is useful and advisable but does not eliminate the confusion as to which version is the accepted standard and which version is applicable to varying team groups. For example, different team groups can be investigating different zones within a well and can modify logs within those well zones without regard to the effect of shifting their zone of interest may have on well zones that other team groups are investigating. For each such group, the modification within their zone is a valid modification without regard to the fact that other well zones have been modified. Similarly, access control (as explained by U.S. Pat. No. 8,8875,224 B2 by Grosss et al.) is also useful and advisable but does not address the issue of where modified logs should be saved to preserve authoritative versions and avoid affecting the logs of other users, such as those working in different well zones. To solve these and other problems a collaborative database to promote data sharing, synchronization, and access control is disclosed.
For a detailed description of various examples, reference will now be made to the accompanying drawings that are briefly described here.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments disclosed herein. It will be apparent, however, to one skilled in the art that the disclosed embodiments may be practiced without these specific details. In other instances, structure and devices are shown in block diagram form to avoid obscuring the disclosed embodiments. Moreover, the language used in this disclosure has been principally selected for readability and instructional purposes, and may not have been selected to delineate or circumscribe the inventive subject matter, resorting to the claims being necessary to determine such inventive subject matter. Reference in the specification to “one embodiment” or to “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiments is included in at least one embodiment.
The term “computing system” is generally taken to refer to at least one electronic computing device that includes, but is not limited to, a single computer, virtual machine, virtual container, host, server, laptop, and/or mobile device or to a plurality of electronic computing devices working together to perform the function described as being performed on or by the computing system.
As used herein, the term “medium” refers to one or more non-transitory physical media that together store the contents described as being stored thereon. Embodiments may include non-volatile secondary storage, read-only memory (ROM), and/or random-access memory (RAM).
As used herein, the terms “application” and “function” refer to one or more computing modules, programs, processes, workloads, threads and/or a set of computing instructions executed by a computing system. Example embodiments of applications and functions include software modules, software objects, software instances and/or other types of executable code. Note, the use of the term “application instance” when used in the context of cloud computing refers to an instance within the cloud infrastructure for executing applications (e.g., for a customer in that customer's isolated instance).
While the examples listed in this disclosure are designed for well logs, it will be apparent to one skilled in the art having benefit of that disclosure that in the general case databases can include records of any type of data (e.g. PDF files, text files, photographs, etc.) and similar concerns to those addressed here exist whenever records are changeable by different interacting groups. Accordingly, it is envisioned that techniques described herein may be applicable to many kinds of data in addition to well logs.
In order to encourage collaboration within an upstream oil and gas company, it may be beneficial to provide a means to easily separate authoritative or reference database objects which should be protected against accidental manipulation by users. At the same time, it may be desirable for users who are actively modifying database objects to investigate possible entity interpretations be free to make changes while not affecting the core data entries or affecting other users actively modifying the same entity in other disciplines. In addition, securely communicating database objects with customers or principals in a form amenable to viewing prior to downloading may be advantageous. This may allow for a common view of the data by all interested parties and avoid downloading of large data objects which may ultimately turn out to be unusable.
According to one embodiment of the present disclosure, a collaborative database management system is provided that includes segmenting the database into at least three types of interrelated databases or database segments. A three-way segmentation embodiment may be used to cooperatively solve the problems of secure basic entries, manipulatable team user entries, and properly viewable customer entries. A typical relational database (or databases) has normal overall security features with usual abilities, such as setting entry user access levels to restrict any data object access to only those users with a sufficient authority clearance level and may be utilized as part of the overall solution in this example embodiment.
The first type of database referenced in this embodiment, referred to (for this example) as the “master” database, includes the entries essential to the enterprise (e.g., oilfield company) which should not be modified by users without review. This master database is typically under control of one or more administrators who have the exclusive ability to add entries to this database and delete entries from this database. All other authorized users have a read-only access to entries in the master database. This means that authorized users can access these basic, or “master”, entries in a read-only manner for use in calculations or displays but cannot save any of their modifications of these entries to the “master” database without permission (and possibly assistance) of the administrator. The database form of the master database as described throughout this disclosure may provide the restricted access means for avoiding unapproved corruption of master objects.
The second type of database referenced in this embodiment, is referred to (for this example) as the one or more “team” databases. Each of the team databases, in this example, includes a “team area” and “team entries”. Each team database has team users or members, who can be granted read, write, edit, insert or delete permissions. A person can be a team member in more than one team database. Data entries created by an authorized user by import, editing an existing data record or by means of calculation from existing data entries are by default placed into whatever “team area” or “team areas” that the user logged into at the start of the session. An authorized user can also import any additional data of any type he finds useful to his team into the team he logged into. Any team entries that should be shared with all other teams can be submitted to the “master” database administrator for inclusion into the master database. The database form of a team database as described throughout this disclosure may provide the authorized access means for allowing authorized access to team members, authorizing read-only access to any master database entries, and capturing of any new or changed database object created by team members.
The third type of database referenced in this embodiment, referred to (for this example) as the “customer database”, includes entries that are intended to be shared with third parties such as a client or principal. The use of the customer database (or customer database segment) is to isolate data as much as possible from other databases and database segments for overall security. In practice, the customer may be provided access to only the entries in this customer database. A preferred method for the customer to access this customer database may be via a secure viewer to the objects in the “customer” database” (e.g., a web browser with restricted access to the database and client JavaScript-type code and authorization). Visualization (e.g. colors, line type, log cross-plots, etc.) may be specified to the viewer utilized by the third party. This viewer could include a means to insert objects specified by the customer back into the customer database and thus provide two-way communication. The use of the assigned viewer may then allow confirmation and monitoring of any third party's access to objects in the customer database. Monitoring and reporting may initiate a customer follow-up if a communication from a customer regarding objects viewed is not timely retrieved. The database form of the customer database as described throughout this disclosure may provide the transferring of database objects means to move database objects from any authorized master or team database and a means for securing transfer of objects in a customer database to authorized third parties.
The organization of the system into three types of interacting databases may be accomplished by providing separate databases with a provision for exchanging objects between the separate databases (as in vertically partitioned databases). Alternatively, the three types of interactive databases may be configured as logical partitions within a single database such that the database types within the single database can be distinguished. In some embodiments, a combination of separate databases and logical partitions may be desirable. In any implementation, the type specification may be used to restrict access, monitor access, and to provide a method to define access controls. For simplicity, this discussion refers to each database type as a database regardless of the specific implementation (e.g., separate database or database logical partition). Whatever method of structure is used to distinguish these three types of database, each type includes the automatic assignment of access depending on the user's type. This may allow the automatic assignment of database permissions in a form easily understood by all interested parties and users.
As briefly mentioned above, the examples of this disclosure are directed to energy applications. However, it should be understood that the need for collaboration is a common objective where teams are interacting with data. Accordingly, the disclosed embodiments and the form of organization proposed may have applications in a wide range of industries for a wide range of data object types. The organization of data objects within a database as explained throughout this disclosure may also be considered as a database partition into specific knowledge nodes.
In short, the presently disclosed embodiments may allow for maintaining a body of database entries that are immune from corruption by casual users (the master database) while concurrently allowing a body of users (members of a team database) free access to modify database entries without concern that this would conflict with the “master” database or any other team. This organization and implementation may promote collaboration by freeing users from concerns of overlapping intracompany conflicts. The ability to share entries with third parties in a secure manner and with a defined view may further promote intercompany collaboration (e.g., across teams and with customers).
With reference to
Networked computing infrastructure 100 also includes cellular network 103 for use with mobile communication devices. Mobile cellular networks support mobile phones and many other types of mobile devices such as laptops etc. Mobile devices in networked computing infrastructure 100 are illustrated as mobile phone 104D, laptop 104E, and tablet 104C. A mobile device such as mobile phone 104D may interact with one or more mobile provider networks as the mobile device moves, typically interacting with a plurality of mobile network towers 120, 130, and 140 for connecting to the cellular network 103. Although referred to as a cellular network in
In
To utilize computing resources within backend cloud or server resources platform/network 110, network operators may choose to configure data centers 112 using a variety of computing infrastructures. In one embodiment, one or more of data centers 112 are configured using a multi-tenant cloud architecture such that a single server instance 114, which can also be referred to as an application instance, handles requests and serves more than one customer. In some cases, data centers with multi-tenant cloud architecture commingle and store data from multiple customers, where multiple customer instances are assigned to a single server instance 114. In a multi-tenant cloud architecture, the single server instance 114 distinguishes between and segregates data and other information of the various customers. For example, a multi-tenant cloud architecture could assign a particular identifier for each customer in order to identify and segregate the data from each customer. In a multitenancy environment, multiple customers share the same application, running on the same operating system, on the same hardware, with the same data-storage mechanism. The distinction between the customers is achieved during application design, thus customers do not share or see each other's data. This is different than virtualization where components are transformed, enabling each customer application to appear to run on a separate virtual machine. Generally, implementing a multi-tenant cloud architecture may have a production limitation, such as the failure of a single server instance 114 causing outages for all customers allocated to the single server instance 114.
In another embodiment, one or more of the data centers 112 are configured using a multi-instance cloud architecture to provide every customer its own unique customer instance. For example, a multi-instance cloud architecture could provide each customer instance with its own dedicated application server and dedicated database server. In other examples, the multi-instance cloud architecture could deploy a single server instance 114 and/or other combinations of server instances 114, such as one or more dedicated web server instances, one or more dedicated application server instances, and one or more database server instances, for each customer instance. In a multi-instance cloud architecture, multiple customer instances could be installed on a single physical hardware server where each customer instance is allocated certain portions of the physical server resources, such as computing memory, storage, and processing power. By doing so, each customer instance has its own unique software stack that provides the benefit of data isolation, relatively less downtime for customers to access backend cloud or server resources platform/network 110, and customer-driven upgrade schedules.
As illustrated in
Persons of ordinary skill in the art are aware that software programs may be developed, encoded, and compiled in a variety of computing languages for a variety of software platforms and/or operating systems and subsequently loaded and executed by processor 205. In one embodiment, the compiling process of the software program may transform program code written in a programming language to another computer language such that the processor 205 is able to execute the programming code. For example, the compiling process of the software program may generate an executable program that provides encoded instructions (e.g., machine code instructions) for processor 205 to accomplish specific, non-generic, particular computing functions.
After the compiling process, the encoded instructions may then be loaded as computer executable instructions or process steps to processor 205 from storage 220, from memory 210, and/or embedded within processor 205 (e.g., via a cache or on-board ROM). Processor 205 may be configured to execute the stored instructions or process steps in order to perform instructions or process steps to transform the computing device into a non-generic, particular, specially programmed machine or apparatus. Stored data, e.g., data stored by a storage device 220, may be accessed by processor 205 during the execution of computer executable instructions or process steps to instruct one or more components within the computing device 200.
A user interface (e.g., output devices 215 and input devices 230) can include a display, positional input device (such as a mouse, touchpad, touchscreen, or the like), keyboard, or other forms of user input and output devices. The user interface components may be communicatively coupled to processor 205. When the output device is or includes a display, the display can be implemented in various ways, including by a liquid crystal display (LCD) or a cathode-ray tube (CRT) or light emitting diode (LED) display, such as an OLED display. Persons of ordinary skill in the art are aware that the computing device 200 may comprise other components well known in the art, such as sensors, powers sources, and/or analog-to-digital converters, not explicitly shown in
Collaboration within a company team may be enhanced when members of a team are encouraged to experiment with data interpretation without a concern that their work will affect other teams or reference data. Collaboration between teams may also be enhanced when different teams have a means of exchanging results outside of their individual teams. Collaboration between companies may also be enhanced when there exists a secure means of exchanging data with tracking of the communication and a common visualization of the data seen by both parties. In the present disclosure, this freedom within a team to innovate is promoted by the creation of “team” databases or segments of the main database. Accordingly, authorized users may be free to create and delete records within their team area. In order to insure that this activity does not affect the source records that may be used by other teams, these source records may be stored in a protected “master” database. Data to be shared with third parties may be copied to a “customer” database accessible, in a protected manner, by one or more third parties. Databases can be capable of storing records of varying file formats, such as text, image, audio or abstract data, and this disclosure applies to all types of records.
Database segmentation (logical or physical) may be used to separate database objects in one implementation. In another implementation, separation may be accomplished by the “tagging” of the database entry as to type (e.g., a database entry can belong to the master database, or to one or more team databases, or to a particular customer database). In one example of another implementation, there can be a hybrid where the master and team databases can be a logical partition of a single database while the customer databases are separate databases communicating with the logically partitioned master and team databases. In a logically partitioned database, one purpose of typing any database object may be to restrict access to the database object to an appropriate party. For example, only team members or administrators may have access to an object typed to that particular team. There are a number of means of restricting access to a database object once it is identified as a member of a particular type (e.g. as a member of teams A and B). For example, using the database permissions or by creating a table of objects that can be accessed by team A and restricting user access to only registered members of team A. An individual can be a member of more than one team and can then have access to all database objects registered to each team of which they are a member. If a database object is a registered to more than one team it is assumed that it can be modified by authorized members of either team. It is presumed that other restrictions may be imposed on access to a team object. One possible restriction may be that a team object can be assigned a priority and only team members can access a team database object if their personally assigned priority is equal to the object priority or a higher priority. Another restriction that may be attached to team members includes the assignment of edit rights within the team. Following this practice, within the team the user can be assigned permissions allowing certain “rights” such as read, write, delete, perform calculations within the team, read the master database, and import objects. It is expected that some team members will be restricted to write-only access (e.g. a field data acquisition team) or read-only access (e.g. financial auditors verifying reports).
In this example embodiment, only one master database has been detailed. However, it is anticipated that in other implementations more than one master database could be provided. When there is more than one master database, controlled access to each of the additional master databases may be provided as required by particular teams. That is, some teams may need access to the additional master databased and other may be prevented from accessing them. Indeed, some teams may not even be aware of the existence of master databases for which they have no access rights.
Referring now to
If the company deals with third parties such as an involvement with a client or customer there may need to be a way to communicate selected data from the database to that third party. For example, if the gamma-ray log is to be communicated, the log can be converted to an industry standard form (e.g. DLIS or LAS) and the file sent to the third party. This transfer may be subject to security concerns. Further, the outside party may use a different viewer that may represent the data without the original view settings. The viewer difference may lead to some misrepresentation of the intended information. In other industries and file formats a similar may exist with the transmittal of other types of data (e.g. reports, photographs, figures, etc.). To address these and other issues, customer database 325 may be populated by the curves, records and views that the company wishes the third party to see. In some embodiments, a different customer database (represented by customer database N (330)) may be provided for each interested third party. A further discussion of interactions (including customer security 345) with customer database (e.g., customer database 1325) is provided below with reference to
Continuing with
Referring now to
An additional aspect of collaboration between companies, as disclosed herein, includes use of a controlled, secure avenue for communication between the parties.
The establishment of these types of database entries (master, team or customer) can be accomplished by the creation of communicating databases. One implementation includes the creation of a single database where the master and team databases coexist. The database can be designed to establish “roles” granting users privileges such as the ability read, modify or write database objects on a per-user basis. PostgreSQL GRANT commands are examples of such privilege grantings. In addition, objects can have row security policies that restrict, on a per-user basis, which rows can be returned by normal queries or inserted, updated, or deleted by data modification commands. PostgreSQL ALTER TABLE . . . ENABLE ROW LEVEL SECURITY is an example of object-centered permission granting. One embodiment of this disclosure may utilize a combination of user and database object permissions to achieve what appears to be a segmentation of a single database (e.g., company database) into master and team databases (see 305 and 315 from
Referring now to
In one embodiment, customer database 325 may be a separate database where SQL queries of database objects from the master or team databases can be copied to a customer database. This implementation may provide another security barrier protecting the master and team databases. Each customer database may have an independent connection to a web server with appropriate security. The web server can have JavaScript-type code for the display of data to customers, converting curves to plots and files to downloadable common formats such as PDF. Thus, allowing user viewing of content before downloading. Provision can also be made in the viewer code to allow uploading of third party code for two-way communication.
With the permissions illustrated in Table 600 it is assumed that each team is assigned one or more basins, fields, wells, boreholes or associated zones (team well group). Within this well group each team member can be limited to all designated wells or limited further to particular locations (column 605 in Table 6). Each user may be provided with a means of authentication with the system (e.g. password column 610 in Table 6) after which a particular team login may also be selected. This operation may only be facilitated if that user is an established member of that team as provided by a user's permissions such as is shown in Table 600. When a user is assigned to a team, the user can be assigned an access priority (column 615 of Table 6) so that team database objects within the team database can be further restricted to team members with sufficient access priority. This would be useful, for instance, where documents associated with a well have financial implications requiring restrictions to only management review. Within a team, each user can be assigned permissions such as shown in the permissions column 620 of Table 6. The satisfaction of the totality of such permissions results in a user being “authorized” in that role.
It should be evident that the team database or database segment is not for the purpose of restricting access to an element of the database for only security as in an access control system. Rather it is a method of organization of the database system in a manner to promote collaboration within and between companies. While some the access features of the master and team databases could be accomplished by the permission systems within a conventional database, the ancillary features of the customer database could not. In addition, the formation of the enumerated database types in this system (master, team and customer) provides a system that is easily understood and used, and simplifies the organization of permissions to essentially team membership and security level, as read/write/delete privileges can be tied to the security level.
Certain terms have been used throughout this description and claims to refer to particular system components. As one skilled in the art will appreciate, different parties may refer to a component by different names. This document does not intend to distinguish between components that differ in name but not function. In this disclosure and claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to . . . .” Also, the term “couple” or “couples” is intended to mean either an indirect or direct wired or wireless connection. Thus, if a first device couples to a second device, that connection may be through a direct connection or through an indirect connection via other devices and connections. The recitation “based on” is intended to mean “based at least in part on.” Therefore, if X is based on Y, X may be a function of Y and any number of other factors.
At least one embodiment is disclosed and variations, combinations, and/or modifications of the embodiment(s) and/or features of the embodiment(s) made by a person having ordinary skill in the art are within the scope of the disclosure. Alternative embodiments that result from combining, integrating, and/or omitting features of the embodiment(s) are also within the scope of the disclosure. The above discussion is meant to be illustrative of the principles and various embodiments of the present invention. Numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications.
The present application claims priority to U.S. Provisional Application No. 62/434,764, filed Dec. 15, 2016, entitled, “METHOD FOR DATABASE STRUCTURE TO PROMOTE INTRA-COMPANY AND INTER-COMPANY COLLABORATION,” by the same inventors, which is incorporated by reference herein, in its entirety.
Number | Date | Country | |
---|---|---|---|
62434764 | Dec 2016 | US |