Multi-faceted trust system

Information

  • Patent Grant
  • 11886397
  • Patent Number
    11,886,397
  • Date Filed
    Wednesday, February 19, 2020
    5 years ago
  • Date Issued
    Tuesday, January 30, 2024
    a year ago
  • CPC
    • G06F16/215
    • G06F16/24573
  • Field of Search
    • US
    • 707 692000
    • CPC
    • G06F16/24573
    • G06F16/215
    • G06F2221/033
    • G06F21/577
    • G06F21/6218
  • International Classifications
    • G06F16/215
    • G06F16/2457
    • Term Extension
      45
Abstract
Provided are methods and systems for determining multi-faceted trust scores for data. A method may commence with receiving data and determining a plurality of metadata items associated with the data. The method may continue with determining one or more facets associated with each of the plurality of metadata items. The method may further include determining a parameter and a weight associated with each of the one or more facets. Upon determining the parameter and the weight, a trust score associated with each of the plurality of metadata items may be calculated based on the parameter and the weight associated with each of the one or more facets. The method may further include calculating a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items.
Description
FIELD

This application relates generally to data processing and, more specifically, to systems and methods for determining multi-faceted trust scores for data.


BACKGROUND

Defensive data strategies, such as regulatory compliance, require a truth-based approach to understanding data that is both highly automated and accurate. Instituting the same approach for offensive data strategies, such as self-service data analytics, would be costly, time consuming, and even impossible in some situations (for example, when combining internal and external data).


SUMMARY

This summary is provided to introduce a selection of concepts in a simplified form that are further described in the Detailed Description below. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the scope of the claimed subject matter.


Provided are methods and systems for determining multi-faceted trust scores for data. In some embodiments, a method for determining multi-faceted trust scores for data may commence with receiving data and determining a plurality of metadata items associated with the data. The method may continue with determining one or more facets associated with each of the plurality of metadata items. The method may further include determining a parameter and a weight associated with each of the one or more facets. Upon determining the parameter and the weight, a trust score associated with each of the plurality of metadata items may be calculated based on the parameter and the weight associated with each of the one or more facets. The method may further include calculating a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items.


In some example embodiments, a system for determining multi-faceted trust scores for data may include a data collection unit, a data analyzing unit, and a score calculation unit. The data collection unit may be configured to receive data. The data analyzing unit may be configured to determine a plurality of metadata items associated with the data. The data analyzing unit may be further configured to determine one or more facets associated with each of the plurality of metadata items. The data analyzing unit may determine a parameter and a weight associated with each of the one or more facets. The score calculation unit may be configured to calculate a trust score associated with each of the plurality of metadata items based on the parameter and the weight associated with each of the one or more facets. The score calculation unit may be further configured to calculate a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items.


Additional objects, advantages, and novel features will be set forth in part in the detailed description section of this disclosure, which follows, and in part will become apparent to those skilled in the art upon examination of this specification and the accompanying drawings or may be learned by production or operation of the example embodiments. The objects and advantages of the concepts may be realized and attained by means of the methodologies, instrumentalities, and combinations particularly pointed out in the appended claims.





BRIEF DESCRIPTION OF THE DRAWINGS

Exemplary embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements.



FIG. 1 illustrates an environment within which methods and systems for determining multi-faceted trust scores for data can be implemented, according to an example embodiment.



FIG. 2 is a block diagram illustrating a system for determining multi-faceted trust scores for data, according to an example embodiment.



FIG. 3 is a flow diagram illustrating a method for determining multi-faceted trust scores for data, according to an example embodiment.



FIG. 4 is a schematic diagram showing a widget for calculating a trust score, according to an example embodiment.



FIG. 5 is a computing system that can be used to implement a method for determining multi-faceted trust scores for data, according to an example embodiment.





DETAILED DESCRIPTION

The following detailed description includes references to the accompanying drawings, which form a part of the detailed description. The drawings show illustrations in accordance with exemplary embodiments. These exemplary embodiments, which are also referred to herein as “examples,” are described in enough detail to enable those skilled in the art to practice the present subject matter. The embodiments can be combined, and other embodiments can be formed, by introducing structural and logical changes without departing from the scope of what is claimed. The following detailed description is, therefore, not to be taken in a limiting sense and the scope is defined by the appended claims and their equivalents.


In this document, the terms “a” or “an” are used, as is common in patent documents, to include one or more than one. In this document, the term “or” is used to refer to a nonexclusive “or,” such that “A or B” includes “A but not B,” “B but not A,” and “A and B,” unless otherwise indicated. Furthermore, all publications, patents, and patent documents referred to in this document are incorporated by reference herein in their entirety, as though individually incorporated by reference. In the event of inconsistent usages between this document and those documents so incorporated by reference, the usage in the incorporated reference(s) should be considered supplementary to that of this document; for irreconcilable inconsistencies, the usage in this document controls.


The present disclosure relates to systems and methods for determining multi-faceted trust scores for data. The system of the present disclosure provides an approach for understanding data in support of offensive data strategies that include augmenting truth (where available) with a dynamic trust model comprised of multiple facets. The system of the present disclosure can be used to analyze critical data components or other data items and determine a degree to which the data can be trusted by the users. The trust score can be calculated based on several factors, which are referred to herein as facets. More specifically, each of the facets includes a characteristic of a metadata item of data. The trust score is also referred to as a “score” herein.


The method for determining multi-faceted trust scores for data may commence with receiving data and determining a plurality of metadata items associated with the data. The method may continue with determining one or more facets associated with each of the plurality of metadata items. The method may further include determining a parameter and a weight associated with each of the one or more facets. In an example embodiment, the weight of a facet can be entered by an operator based on empirical observations or established using a predetermined technique based on historical trustworthiness associated of the facet. Upon determining facets and corresponding parameters and weights, a trust score for each of the plurality of metadata items can be calculated based on the parameter and the weight associated with each of the facets. The method can further include calculating a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items.


Thus, the trust score for a specific metadata item can be calculated based on different facets, which may include objective facets (metadata, data, business information), subjective facets (for example, based on ratings of a user), and synthetic facets (calculated from heuristics on lineage). All facets can be evaluated and scored. The facets contribute to the final score based on their relative weights.


A decision table may be used to determine which facets contribute to the trust score of a particular metadata item (i.e., to determine which facets to use and which weights to assign to each facet). The decision table can use an item type (for example, tables and columns are evaluated differently) and other criteria. The result of the decision is a list of selected facets with parameters and weights. The data intelligence (DI) repository may then calculate each facet based on the information the facet contains, using the parameters provided. For example, the DI repository may check if a business term was associated with the metadata item by determining whether the metadata item is tagged by the tag of type “Business Glossary.” Other types of tags may also be referenced in the trust facet configuration. All scores can be then aggregated, taking into account the weights of each facet (some facets may contribute more than others to the final trust score). The final score and each individual facet score can be stored alongside the metadata item.


The score may be expressed as a percentage; for example, 100% means “complete trust” while 0% means “no trust at all.” The user can visualize the score and how each facet contributed to the score in order to evaluate why the score is what it is and what caused the score to change over time. Thresholds can be associated with different levels of trust for more intuitive visualization; for example, a trust score of over 90% can be shown in green, under 50% can be shown in red, and so forth. Facet visualization may also be indicative of whether a facet is objective (such as a metadata field value), subjective (such as user ratings), or synthetic (for example, a facet calculated from heuristics on lineage).


The trust score calculation can be performed automatically when changes occur to the metadata item (for example, re-analysis of the metadata item, or manual tagging) or be triggered by the user. The DI repository may provide some trust configurations that can be readjusted based on specific needs. Other facets can be added to the facets provided by default.


Referring now to the drawings, FIG. 1 illustrates an environment 100 within which systems and methods for determining multi-faceted trust scores for data can be implemented. The environment 100 may include a data network 110 (e.g., an Internet or a computing cloud), end user(s) 105, client device(s) 120 associated with the end user 105, and a system 200 for determining multi-faceted trust scores for data. Client device(s) 120 may comprise a personal computer (PC), a desktop computer, a laptop, a smartphone, a tablet, or so forth.


The client device 120 may have a user interface 130. Furthermore, a web browser 140 may be running on the client device 120 and displayed using the user interface 130. The web browser 140 may communicate with the system 200 via the data network 110.


The data network 110 may include the Internet or any other network capable of communicating data between devices. Suitable networks may include or interface with any one or more of, for instance, a local intranet, a corporate data network, a data center network, a home data network, a Personal Area Network, a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network, a virtual private network, a storage area network, a frame relay connection, an Advanced Intelligent Network connection, a synchronous optical network connection, a digital T1, T3, E1 or E3 line, Digital Data Service connection, Digital Subscriber Line connection, an Ethernet connection, an Integrated Services Digital Network line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode connection, or a Fiber Distributed Data Interface or Copper Distributed Data Interface connection. Furthermore, communications may also include links to any of a variety of wireless networks, including Wireless Application Protocol, General Packet Radio Service, Global System for Mobile Communication, Code Division Multiple Access or Time Division Multiple Access, cellular phone networks, Global Positioning System, cellular digital packet data, Research in Motion, Limited duplex paging network, Bluetooth radio, or an IEEE 802.11-based radio frequency network. The data network can further include or interface with any one or more of a Recommended Standard 232 (RS-232) serial connection, an IEEE-1394 (FireWire) connection, a Fiber Channel connection, an IrDA (infrared) port, a Small Computer Systems Interface connection, a Universal Serial Bus (USB) connection or other wired or wireless, digital or analog interface or connection, mesh or Digi® networking.


The web browser 140 can render a web page associated with the system 200 which end user(s) 105 can use to calculate a trust score. The web browser 140 can establish a communication channel with the system 200 and generate and render virtual screens 150 based on data received from the system 200.


The end user 105 may send a request 160 to the system 200 using the client device 120. The request 160 may include data for which a trust score needs to be calculated. In response to the request 160, the system 200 may calculate the trust score and render the results by the web browser 140.



FIG. 2 is a block diagram illustrating a system 200 for determining multi-faceted trust scores for data, according to an example embodiment. The system 200 may include a data collection unit 210, a data analyzing unit 220, and a score calculation unit 230. In an example embodiment, the operations performed by each of the data collection unit 210, the data analyzing unit 220, and the score calculation unit 230 may be performed by a processor and a memory for storing instructions executable by the processor. Example one or more processors 510 are shown in FIG. 5.


The operations performed by each of the data collection unit 210, the data analyzing unit 220, and the score calculation unit 230 of the system 200 are described in detail below with reference to FIG. 3.



FIG. 3 shows a process flow diagram of a method 300 for determining multi-faceted trust scores for data, according to an example embodiment. In some embodiments, the operations may be combined, performed in parallel, or performed in a different order. The method 300 may also include additional or fewer operations than those illustrated. The method 300 may be performed by processing logic that may comprise hardware (e.g., decision making logic, dedicated logic, programmable logic, and microcode), software (such as software run on a general-purpose computer system or a dedicated machine), or a combination of both.


The method 300 may commence with the data collection unit receiving data at operation 310. The data may include any type of data that needs to be analyzed and for which a trust score is required to be determined. The data may be received from any source (for example, a database, a remote source, an online source, a cloud database, the system 200 itself, and so forth). At step 320, a plurality of metadata items associated with the data may be determined by the data analyzing unit. The metadata may include information associated with the data. The method 300 may further include determining, by the data analyzing unit, one or more facets associated with each of the plurality of metadata items at operation 330. In an example embodiment, each of the one or more facets includes a characteristic of a metadata item. The facets may include one of the following: data quality dimensions, criticality of an item of the data, governance of the item of the data (governed/not governed), a rating, a review, an issue, a proximity of the item of the data to a source (for example, how close the data item is to the source), an existence of a data lineage, a fact of scanning the item of the data from an active source or a spreadsheet, a tag associated with the data item, a frequency of update, a frequency of use, a null value, usefulness of the item of the data for an intended purpose, and so forth. The facets may include objective facets (metadata, data, business information), subjective facets (for example, based on ratings of a user), and synthetic facets (calculated from heuristics on lineage).


At operation 340, the data analyzing unit may determine a parameter and a weight associated with each of the one or more facets. The parameter may include, for example, a value of the facet, a ‘yes/no’ parameter, a percentage, a range, and so forth. The method 300 may continue at operation 350 with calculating, by the score calculation unit, a trust score for each of the plurality of metadata items based on the parameter and the weight associated with each of the one or more facets. In an example embodiment, the calculation may include summing all parameters of facets (related to the metadata item) multiplied by corresponding weights and dividing the summation by the number of facets related to the metadata item. The result can be a number between 0 and 1 or a percentage between 0% and 100%. Thereafter, at operation 360, the method 300 may proceed with calculating, by the score calculation unit, a multi-faceted trust score of the data based on the trust score of each of the plurality of metadata items. In an example embodiment, the calculation may include summing all trust scores of each of the plurality of metadata items and dividing the summation by the number of metadata items related to the data.


In an example embodiment, the method 300 may further include selecting, from the one or more facets, a plurality of facets that contribute to the trust score for each of the plurality of metadata items. In this embodiment, the calculation of the trust score for each of the plurality of metadata items may be based on the parameter and the weight associated with the selected plurality of facets.


Optionally, a trust score associated with each of the one or more facets may be calculated to obtain a plurality of trust scores for the one or more facets. The calculation may be based on the parameter and the weight associated with each of the one or more facets. In this embodiment, the trust score of each of the plurality of metadata items may be a sum of the plurality of trust scores of the one or more facets associated with each of the plurality of metadata items.


The method 300 may further include determining whether the multi-faceted trust score exceeds one or more predetermined thresholds. For example, the trust score that reached 100% threshold means “complete trust,” while the trust score that reached 0% means “no trust at all.” Thresholds can be associated with different levels of trust for more intuitive visualization; for example, a trust score that exceeded 90% threshold can be shown in green, a trust score that is under 50% threshold can be shown in red, and so forth.


Once the trust score is calculated, the trust score can be used as an input for a variety of use cases both inside a data intelligence product (e.g., a machine learning an artificial intelligence node) itself and also other products. The trust score can trigger predetermined actions when the trust score reaches specific thresholds for a metadata item and/or can be used in conjunction with other data intelligence information to provide additional information associated with the data. Trust scores can be also combined with (or constructed entirely from) sources outside of the data intelligence in order to drive additional information into data and decisions beyond the data intelligence.


In an example embodiment, the method 300 may further include determining that the data have been changed. The change may include at least one of the following: re-analysis of at least one item of the data, manual tagging of the data, a trigger initiated by a user, and so forth. Based on the determined change, the multi-faceted trust score may be recalculated for the data.


In an example embodiment, factors that contribute to the trust score can be defined in policies. Specifically, a policy type of “enrichment” can be defined and used for any data that can contribute additional data. The factors may include a type of the data item, a catalog in which the item is placed, and so forth. More factors can be added if additional fine-grained calculations are needed. The result of setting the policy is a list of “Trust Factors.” A factor can define what data item needs to be considered and the relative weight of the factor in the overall calculation. The calculation for the given item may be done on the DI side; the policy only sets how to calculate the trust score.


In an example embodiment, the setting of a policy may be performed as follows. For items of type ‘Table’, quality with a weight of 20%, the average rating with a weight of 30%, the number of ratings (if more than two ratings) with a weight of 20%, and the fact that the item is tagged with a Glossary tag (a tag called Glossary or any sub tag) may add 30% to the score. In this example, all weights sum up to 1, but this is not required. Once the policy is set, the policy can be uploaded to a policy service upon running a configuration step (e.g., ConfigureDev script in a development environment).


Upon setting the policies, the trust score can be calculated by a backend service that reacts to events. The trust score and an explanation as to what factors contributed to the trust score can be displayed.


The trust factors may include the following facets: quality, ratings average, ratings count, tags, linked items, and so forth. The weight of each trust factor may be determined or set to get a range between 0 and 1.


Quality. The quality percentage score as calculated by the quality process (this is driven by configuration) may be taken. In particular, the percent divided by 100 may be taken.


Ratings average. When ratings go between 1 and 5, 3 is average. Thus, a rating of 1 results in a score of 0, a rating of 5 results in a score of 1, and a rating of 3 results in a score of 0.5.


Ratings count. There is a minimum value for the count of ratings to count (2 in the above example). If there are more, the score weighted by the count for each rating is calculated. Since ratings with low counts are filtered out, this can give a different result than the average.


Tags. The tag can include determining whether the item is tagged by any tag in the hierarchy of the given tag name. For example, any tag created from a glossary term may increase the trust factor, meaning that if an item is linked to a glossary term, it has been analyzed somewhat and is trusted more.


Linked items. The linked items may be taken and the average of their trust score can be calculated. For example, a dataset trust score may include the trust score of the items referenced by the dataset, the score of a table may include the score of each column, and so forth. The filter value is the name of the link to follow. Several links can be specified, delimited by commas. By default, links can be followed in both directions, but the link name may be prefixed, or indicate in, out, or both directions.


Trust calculation. The trust score can be calculated based on data stored in the DI repository and by using an application programming interface (API), depending on a facet. The trust score can be calculated when a specific event, such as a TrustUpdateRequestEvent, is received. The event may carry explicit item identifiers (IDs) to calculate the trust score only on these items, explicit query to calculate the trust score only on the items returned by the query, or nothing to calculate the trust score on all items in the catalog that have trust score policies linked to them.


Other events can be added to recalculate the trust score automatically when an item is changed, rated, tagged, and so forth.


When the calculation is done, another event, such as a TrustUpdatedEvent, can be sent. The TrustUpdatedEvent is a subclass of ItemUpdatedEvent, but carries the old and new trust score, such that a user interface (UI) can properly indicate that the item has been updated if the item has been viewed.


Based on the calculation, the trust score and a JavaScript Object Notation (JSON) Array containing information on how much each factor contributed in the trust factors attribute can be stored in the trust score attribute.


Trust API. A trust factors service can be provided to allow triggering a calculation of the trust score by sending the proper event (so the calculation is asynchronous).



FIG. 4 is a schematic diagram showing a widget 400 for calculating a trust score 405, according to an example embodiment. The UI may be using a chart 410, such as an ngx-chart (Gauge), to show the trust score 405 graphically. Red/yellow/green colors 415 may be shown based on the trust score 405 (green if over 90%, yellow if over 60%, and red otherwise). The colors can be configurable. Upon hovering over the chart 410 by the user, corresponding explanations 420 can be shown to the user. In an example embodiment, a widget, such as the widget 400 showing a trust score associated with the quality, can be shown in search results and the like.



FIG. 5 illustrates an exemplary computing system 500 that may be used to implement embodiments described herein. The exemplary computing system 500 of FIG. 5 may include one or more processors 510 and memory 520. Memory 520 may store, in part, instructions and data for execution by the one or more processors 510. Memory 520 can store the executable code when the exemplary computing system 500 is in operation. The exemplary computing system 500 of FIG. 5 may further include a mass storage 530, portable storage 540, one or more output devices 550, one or more input devices 560, a network interface 570, and one or more peripheral devices 580.


The components shown in FIG. 5 are depicted as being connected via a single bus 590. The components may be connected through one or more data transport means. The one or more processors 510 and memory 520 may be connected via a local microprocessor bus, and the mass storage 530, one or more peripheral devices 580, portable storage 540, and network interface 570 may be connected via one or more input/output buses.


Mass storage 530, which may be implemented with a magnetic disk drive or an optical disk drive, is a non-volatile storage device for storing data and instructions for use by a magnetic disk or an optical disk drive, which in turn may be used by one or more processors 510. Mass storage 530 can store the system software for implementing embodiments described herein for purposes of loading that software into memory 520.


Portable storage 540 may operate in conjunction with a portable non-volatile storage medium, such as a compact disk (CD) or digital video disc (DVD), to input and output data and code to and from the computing system 500 of FIG. 5. The system software for implementing embodiments described herein may be stored on such a portable medium and input to the computing system 500 via the portable storage 540.


One or more input devices 560 provide a portion of a user interface. The one or more input devices 560 may include an alphanumeric keypad, such as a keyboard, for inputting alphanumeric and other information, or a pointing device, such as a mouse, a trackball, a stylus, or cursor direction keys. Additionally, the computing system 500 as shown in FIG. 5 includes one or more output devices 550. Suitable one or more output devices 550 include speakers, printers, network interfaces, and monitors.


Network interface 570 can be utilized to communicate with external devices, external computing devices, servers, and networked systems via one or more communications networks such as one or more wired, wireless, or optical networks including, for example, the Internet, an intranet, LAN, WAN, cellular phone networks (e.g., Global System for Mobile communications network, packet switching communications network, circuit switching communications network), Bluetooth radio, and an IEEE 802.11-based radio frequency network, among others. Network interface 570 may be a network interface card, such as an Ethernet card, optical transceiver, radio frequency transceiver, or any other type of device that can send and receive information. Other examples of such network interfaces may include Bluetooth®, 3G, 4G, and WiFi® radios in mobile computing devices as well as a USB.


One or more peripheral devices 580 may include any type of computer support device to add additional functionality to the computing system. The one or more peripheral devices 580 may include a modem or a router.


The components contained in the exemplary computing system 500 of FIG. 5 are those typically found in computing systems that may be suitable for use with embodiments described herein and are intended to represent a broad category of such computer components that are well known in the art. Thus, the exemplary computing system 500 of FIG. 5 can be a PC, handheld computing device, telephone, mobile computing device, workstation, server, minicomputer, mainframe computer, or any other computing device. The computer can also include different bus configurations, networked platforms, multi-processor platforms, and so forth. Various operating systems (OS) can be used including UNIX, Linux, Windows, Macintosh OS, Palm OS, and other suitable operating systems.


Some of the above-described functions may be composed of instructions that are stored on storage media (e.g., computer-readable medium). The instructions may be retrieved and executed by the processor. Some examples of storage media are memory devices, tapes, disks, and the like. The instructions are operational when executed by the processor to direct the processor to operate in accord with the example embodiments. Those skilled in the art are familiar with instructions, processor(s), and storage media.


It is noteworthy that any hardware platform suitable for performing the processing described herein is suitable for use with the example embodiments. The terms “computer-readable storage medium” and “computer-readable storage media” as used herein refer to any medium or media that participate in providing instructions to a central processing unit (CPU) for execution. Such media can take many forms, including, but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media include, for example, optical or magnetic disks, such as a fixed disk. Volatile media include dynamic memory, such as random access memory (RAM). Transmission media include coaxial cables, copper wire, and fiber optics, among others, including the wires that include one embodiment of a bus. Transmission media can also take the form of acoustic or light waves, such as those generated during radio frequency and infrared data communications. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, magnetic tape, any other magnetic medium, a CD-read-only memory (ROM) disk, DVD, any other optical medium, any other physical medium with patterns of marks or holes, a RAM, a PROM, an EPROM, an EEPROM, a FLASHEPROM, any other memory chip or cartridge, a carrier wave, or any other medium from which a computer can read.


Various forms of computer-readable media may be involved in carrying one or more sequences of one or more instructions to a CPU for execution. A bus carries the data to system RAM, from which a CPU retrieves and executes the instructions. The instructions received by system RAM can optionally be stored on a fixed disk either before or after execution by a CPU.


Thus, various embodiments of methods and systems for determining multi-faceted trust scores for data have been described. Although embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes can be made to these example embodiments without departing from the broader spirit and scope of the present application. Accordingly, the specification and drawings are to be regarded in an illustrative rather than a restrictive sense. There are many alternative ways of implementing the present technology. The disclosed examples are illustrative and not restrictive.

Claims
  • 1. A method for determining multi-faceted trust scores for computer network data, the method comprising: receiving computer network data;determining a plurality of metadata items associated with the computer network data;determining one or more facets associated with each of the plurality of metadata items;determining which facets from among the one or more facets associated with each of the plurality of metadata items are to be selected from a decision table, wherein at least one of the one or more facets to be selected from the decision table is a subjective facet and wherein the decision table has a parameter and a weight associated with each of the one or more facets, the weight associated with each of the one or more facets in the decision table being based on one of an empirical observation or historical trustworthiness;calculating a trust score associated with each of the plurality of metadata items based on the parameter and the weight associated with each of the facets selected to be used from the decision table;calculating a multi-faceted trust score of the computer network data based on a sum of the individual trust scores of each of the plurality of metadata items, the trust scores contributing to the multi-faceted trust score based on their relative weights; andproviding the multi-faceted trust score associated with the computer network data to a client device user display, the client device user display comprising:a chart, the chart being a gauge chart to show the multi-faceted trust score graphically and the chart including colors, the colors being based on the multi-faceted trust score and being green if the multi-faceted trust score is above ninety percent.
  • 2. The method of claim 1, wherein each of the one or more facets includes a characteristic of a metadata item of the plurality of metadata items.
  • 3. The method of claim 1, wherein the one or more facets includes one of the following: data quality dimensions, criticality of an item of the data, governance of the item of the data, a rating, a review, an issue, a proximity of the item of the data to a source, an existence of a data lineage, a fact of scanning the item of the data from an active source or a spreadsheet, a tag associated with item of the data, a frequency of update, a frequency of use, a null value, and usefulness of the item of the data for an intended purpose.
  • 4. The method of claim 1, wherein the one or more facets include objective facets, and synthetic facets.
  • 5. The method of claim 1, further comprising determining whether the multi-faceted trust score exceeds one or more predetermined thresholds.
  • 6. The method of claim 1, further comprising: determining that the computer network data have been changed; andbased on the determination, recalculating the multi-faceted trust score for the computer network data.
  • 7. The method of claim 6, wherein the change includes at least one of the following: re-analysis of at least one item of the data, manual tagging of the data, and a trigger initiated by a user.
  • 8. The method of claim 1, further comprising selecting, from the one or more facets, a plurality of facets that contribute to the trust score for each of the plurality of metadata items, wherein the calculating the trust score for each of the plurality of metadata items is based on the parameter and the weight associated with the selected plurality of facets.
  • 9. The method of claim 1, further comprising calculating a trust score associated with each of the one or more facets to obtain a plurality of trust scores for the one or more facets, the calculation being based on the parameter and the weight associated with each of the one or more facets.
  • 10. The method of claim 9, wherein the trust score of each of the plurality of metadata items is a sum of the plurality of trust scores of the one or more facets associated with each of the plurality of metadata items.
  • 11. The method of claim 1, wherein the ninety percent is a predetermined threshold, the predetermined threshold triggering at least one predetermined action.
  • 12. A system for determining multi-faceted trust scores for computer network data, the system comprising: at least one processor configured to:receive computer network data; determine a plurality of metadata items associated with the computer network data;determine one or more facets associated with each of the plurality of metadata items;determine which facets from among the one or more facets associated with each of the plurality of metadata items are to be selected from a decision table, wherein at least one of the one or more facets to be selected from the decision table is a subjective facet and wherein the decision table has a parameter and a weight associated with each of the one or more facets, and the weight associated with each of the one or more facets in the decision table being based on one of an empirical observation or historical trustworthiness;calculate a trust score associated with each of the plurality of metadata items based on the parameter and the weight associated with each of the facets selected to be used from the decision table;calculate a multi-faceted trust score of the computer network data based on a sum of a individual trust scores of each of the plurality of metadata items, the trust scores contributing to the multi-faceted trust score based on their relative weights; andprovide the multi-faceted trust score associated with the computer network data to a client device user display, the client device user display comprising:a chart, the chart being a gauge chart to show the multi-faceted trust score graphically and the chart including colors, the colors being based on the multi-faceted trust score and being green if the multi-faceted trust score is above ninety percent.
  • 13. The system of claim 12, wherein the one or more facets includes one of the following: a data quality dimension, a criticality of an item of the data, governance of the item of the data, a rating, a review, an issue, a proximity of the item of the data to a source, an existence of a data lineage, a fact of scanning the item of the data from an active source or a spreadsheet, a tag associated with the data item, a frequency of update, a frequency of use, a null value, and usefulness of the item of the data for an intended purpose.
  • 14. The system of claim 12, wherein the one or more facets include objective facets and synthetic facets.
  • 15. The system of claim 12, wherein the at least one processor is further configured to determine whether the multi-faceted trust score exceeds one or more predetermined thresholds.
  • 16. The system of claim 12, wherein the at least one processor is further configured to determine that the computer network data has been changed; and recalculate, based on the determination, the multi-faceted trust score for the computer network data.
  • 17. The system of claim 16, wherein the change includes at least one of the following: re-analysis of at least one item of the data, a manual tagging of the data, and a trigger initiated by a user.
  • 18. The system of claim 12, wherein the at least one processor is further configured to select, from the one or more facets, a plurality of facets that contribute to the trust score for each of the plurality of metadata items, wherein the calculating of the trust score for each of the plurality of metadata items is based on the parameter and the weight associated with the selected plurality of facets.
  • 19. The system of claim 12, wherein the at least one processor is further configured to calculate a trust score associated with each of the one or more facets to obtain a plurality of trust scores for the one or more facets, the calculation being based on the parameter and the weight associated with each of the one or more facets.
  • 20. The system of claim 19, wherein the trust score of each of the plurality of metadata items is a sum of the plurality of trust scores of the one or more facets associated with each of the plurality of metadata items.
  • 21. The system of claim 12, wherein the ninety percent is a predetermined threshold, the predetermined threshold triggering at least one predetermined action.
  • 22. A system for determining multi-faceted trust scores for computer network data, the system comprising: at least one processor configured to: receive computer network data; determine a plurality of metadata items associated with the computer network data;determine one or more facets associated with each of the plurality of metadata items;determine which facets from among the one or more facets associated with each of the plurality of metadata items are to be selected from a decision table, wherein at least one of the one or more facets to be selected from the decision table is a subjective facet and wherein the decision table has a parameter and a weight associated with each of the one or more facets, the weight associated with each of the one or more facets in the decision table being based on one of an empirical observation or historical trustworthiness;select, from the one or more facets, a plurality of facets that contribute to the trust score for each of the plurality of metadata items;calculate a trust score associated with each of the plurality of metadata items based on the parameter and the weight associated with each of the facets selected to be used, wherein the calculating of the trust score for each of the plurality of metadata items is based on the parameter and the weight associated with the selected plurality of metadata items;calculate a trust score associated with each of the facets to be used to obtain a plurality of trust scores of the facets to be used, the calculation being based on the parameter and the weight associated with each of the facets to be used;calculate a multi-faceted trust score of the computer network data based on the trust score of each of the plurality of metadata items, the trust scores contributing to the multi-faceted trust score based on their relative weights; andprovide the multi-faceted trust score with the computer network data to a client device user display, the client device user display comprising:a chart, the chart being a gauge chart to show the multi-faceted trust score graphically and the chart including colors, the colors being based on the multi-faceted trust score and being green if the multi-faceted trust score is above ninety percent.
  • 23. The system of claim 22, wherein the ninety percent is a predetermined threshold, the predetermined threshold triggering at least one predetermined action.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority of U.S. Provisional Patent Application No. 62/923,377 filed on Oct. 18, 2019, entitled “MULTI-FACETED TRUST SYSTEM,” which is incorporated herein by reference in its entirety.

US Referenced Citations (229)
Number Name Date Kind
5321610 Breslin Jun 1994 A
5528263 Platzker et al. Jun 1996 A
5742285 Ueda Apr 1998 A
6069957 Richards May 2000 A
6208345 Sheard et al. Mar 2001 B1
6331855 Schauser Dec 2001 B1
6574321 Cox et al. Jun 2003 B1
6597363 Duluk Jul 2003 B1
6950825 Chang et al. Sep 2005 B2
7073164 Knowles Jul 2006 B1
7185192 Kahn Feb 2007 B1
7359076 Uchino Apr 2008 B2
7937665 Vazquez et al. May 2011 B1
8078731 Bruder et al. Dec 2011 B1
8667456 Czymontek Mar 2014 B1
8745011 Kishi Jun 2014 B2
9032076 Buehler et al. May 2015 B2
9053295 Wick et al. Jun 2015 B1
9213707 Conner Dec 2015 B2
9232491 Mahaffey Jan 2016 B2
9483537 Peters et al. Nov 2016 B1
9621428 Lev Apr 2017 B1
9910655 Ranganathan et al. Mar 2018 B1
10162624 Moturu et al. Dec 2018 B1
10181059 Brewton et al. Jan 2019 B1
10355864 Konduru Feb 2019 B2
10318762 Buckingham et al. Jun 2019 B1
10348505 Crawforth Jul 2019 B1
10812611 Bennet et al. Oct 2020 B2
10877740 Bennet et al. Dec 2020 B2
11055067 Thangaraj et al. Jul 2021 B2
11057500 Aragón et al. Jul 2021 B2
11086751 Moresmau et al. Aug 2021 B2
11172042 Bennet et al. Nov 2021 B2
11269660 Yueh Mar 2022 B2
20020099952 Lambert et al. Jul 2002 A1
20020103731 Barnard et al. Aug 2002 A1
20020184610 Chong et al. Dec 2002 A1
20020196277 Bushey et al. Dec 2002 A1
20030046401 Abbott et al. Mar 2003 A1
20030079052 Kushnirskly Apr 2003 A1
20040003119 Munir et al. Jan 2004 A1
20040003371 Coulthard et al. Jan 2004 A1
20040078373 Ghoneimy et al. Apr 2004 A1
20040128001 Levin et al. Jul 2004 A1
20040153994 Bates et al. Aug 2004 A1
20040177323 Kaasila et al. Sep 2004 A1
20040267749 Bhat et al. Dec 2004 A1
20050038764 Minsky et al. Feb 2005 A1
20050065845 DeAngelis Mar 2005 A1
20050235258 Wason Oct 2005 A1
20050278695 Synovic Dec 2005 A1
20060026591 Backhouse Feb 2006 A1
20060031854 Godwin Feb 2006 A1
20060036448 Haynie et al. Feb 2006 A1
20060036941 Neil Feb 2006 A1
20060039466 Emerson et al. Feb 2006 A1
20060111888 Hiew et al. May 2006 A1
20060184925 Ficatier et al. Aug 2006 A1
20060251047 Shenfield et al. Nov 2006 A1
20060265719 Asti Nov 2006 A1
20060271528 Gorelik Nov 2006 A1
20060294151 Wong Dec 2006 A1
20070016624 Powers et al. Jan 2007 A1
20070028286 Greene et al. Feb 2007 A1
20070033637 Yami et al. Feb 2007 A1
20070073671 McVeigh et al. Mar 2007 A1
20070094594 Matichuk Apr 2007 A1
20070135936 Dumas Jun 2007 A1
20070156764 O'Connell et al. Jul 2007 A1
20070180367 Chiang Aug 2007 A1
20070180444 Hoover et al. Aug 2007 A1
20070198450 Khalsa Aug 2007 A1
20070208685 Blumenau Sep 2007 A1
20070266394 Odent et al. Nov 2007 A1
20070294406 Suer et al. Dec 2007 A1
20080109292 Moore May 2008 A1
20080126932 Elad et al. May 2008 A1
20080141141 Moore Jun 2008 A1
20080189617 Covell et al. Aug 2008 A1
20080209390 Dutta et al. Aug 2008 A1
20080229303 Carteri et al. Sep 2008 A1
20080281727 Moss Nov 2008 A1
20090024589 Sood Jan 2009 A1
20090024660 Borgsmidt et al. Jan 2009 A1
20090025063 Thomas Jan 2009 A1
20090083306 Sichi et al. Mar 2009 A1
20090094112 Cesarini et al. Apr 2009 A1
20090124387 Perlman et al. May 2009 A1
20090249290 Jenkins et al. Oct 2009 A1
20090249446 Jenkins et al. Oct 2009 A1
20100106560 Li Apr 2010 A1
20100114628 Adler et al. May 2010 A1
20100131857 Prigge May 2010 A1
20100153866 Sharoni Jun 2010 A1
20100169265 Ristock Jul 2010 A1
20100225658 Coleman Sep 2010 A1
20100226441 Tung et al. Sep 2010 A1
20100231599 Tung et al. Sep 2010 A1
20100245563 Golovchinsky et al. Sep 2010 A1
20100250497 Redlich et al. Sep 2010 A1
20100274815 Vanasco Oct 2010 A1
20110004564 Rolia et al. Jan 2011 A1
20110029947 Markovic Feb 2011 A1
20110078708 Dokovski et al. Mar 2011 A1
20110107298 Sebastian May 2011 A1
20110107309 Baron May 2011 A1
20110107313 Baron May 2011 A1
20110246904 Pinto et al. Oct 2011 A1
20110276636 Cheng et al. Nov 2011 A1
20120072509 Booth Mar 2012 A1
20120075333 Chen et al. Mar 2012 A1
20120130906 Klinker May 2012 A1
20120310381 Karaffa Dec 2012 A1
20120310875 Prahlad et al. Dec 2012 A1
20120324358 Jooste Dec 2012 A1
20120331527 Walters et al. Dec 2012 A1
20130031158 Salsburg Jan 2013 A1
20130117662 Shan et al. May 2013 A1
20130151557 Shanken et al. Jun 2013 A1
20130174028 Grossman Jul 2013 A1
20130177662 Msika Jul 2013 A1
20130275475 Ahlborn Oct 2013 A1
20130332423 Puri et al. Dec 2013 A1
20130339872 Shuster Dec 2013 A1
20140026113 Farooqi Jan 2014 A1
20140032875 Butler Jan 2014 A1
20140047011 Lahav et al. Feb 2014 A1
20140047413 Sheive Feb 2014 A1
20140075407 Donis et al. Mar 2014 A1
20140089388 Curry et al. Mar 2014 A1
20140114907 Kozina et al. Apr 2014 A1
20140114962 Rosenburg et al. Apr 2014 A1
20140207575 Freed-Finnegan et al. Jul 2014 A1
20140245199 Belotti et al. Aug 2014 A1
20140282453 O'Rourke et al. Sep 2014 A1
20140288923 Marian et al. Sep 2014 A1
20140288945 Boerner et al. Sep 2014 A1
20140380105 Michel et al. Dec 2014 A1
20150006543 Jin et al. Jan 2015 A1
20150012478 Mohammad et al. Jan 2015 A1
20150046930 Phadke Feb 2015 A1
20150088933 Schofield et al. Mar 2015 A1
20150127660 Zilberberg et al. May 2015 A1
20150128105 Sethi et al. May 2015 A1
20150248280 Pillay Sep 2015 A1
20150271206 Schultz et al. Sep 2015 A1
20150293764 Visvanathan Oct 2015 A1
20150379303 LaFever et al. Dec 2015 A1
20160026968 Fan et al. Jan 2016 A1
20160034260 Ristock et al. Feb 2016 A1
20160034571 Setayesh et al. Feb 2016 A1
20160044380 Barrett Feb 2016 A1
20160070541 Lee et al. Mar 2016 A1
20160117159 Balko Apr 2016 A1
20160140204 Brown et al. May 2016 A1
20160253340 Barth et al. Sep 2016 A1
20160267060 Skirpa et al. Sep 2016 A1
20160267082 Wong Sep 2016 A1
20160275439 Avats Sep 2016 A1
20160283200 Standley et al. Sep 2016 A1
20160299933 Fillipi et al. Oct 2016 A1
20160359711 Deen et al. Dec 2016 A1
20170034306 Thangeswaran Feb 2017 A1
20170039041 Bommireddi Feb 2017 A1
20170068395 Massoudi Mar 2017 A1
20170118284 Chen et al. Apr 2017 A1
20170123751 Sigurðsson et al. May 2017 A1
20170154026 Gong et al. Jun 2017 A1
20170180284 Smullen et al. Jun 2017 A1
20170199936 Steelberg Jul 2017 A1
20170228119 Hosbettu et al. Aug 2017 A1
20170269972 Hosabettu et al. Sep 2017 A1
20170270022 Moresmau Sep 2017 A1
20170339564 Momchilov et al. Nov 2017 A1
20170344227 Stoicov et al. Nov 2017 A1
20170357814 Mahaffey Dec 2017 A1
20170372442 Mejias Dec 2017 A1
20180060370 Eshwar et al. Mar 2018 A1
20180089005 Green Mar 2018 A1
20180121841 Harris May 2018 A1
20180129497 Biddle et al. May 2018 A1
20180167426 Sigurdsson et al. Jun 2018 A1
20180174104 Schikora Jun 2018 A1
20180191761 Lee et al. Jul 2018 A1
20180197123 Parimelazhagan Jul 2018 A1
20180322396 Ahuja-Cogny et al. Nov 2018 A1
20180367506 Ford et al. Dec 2018 A1
20190081935 Broussard et al. Mar 2019 A1
20190129734 Yang et al. May 2019 A1
20190158630 Aragón May 2019 A1
20190196793 Jaiprakash Jun 2019 A1
20190205111 Bennet Jul 2019 A1
20190208031 Bennet Jul 2019 A1
20190238467 Guan et al. Aug 2019 A1
20190238688 Bermundo et al. Aug 2019 A1
20190243742 Natari Aug 2019 A1
20190332357 Reddy Oct 2019 A1
20190342404 Kundu et al. Nov 2019 A1
20190369969 Donohoe et al. Dec 2019 A1
20200026735 Przada Jan 2020 A1
20200042648 Rao Feb 2020 A1
20200050983 Balasubramanian et al. Feb 2020 A1
20200133982 Thangeswaran et al. Apr 2020 A1
20200348964 Anand et al. Nov 2020 A1
20200356365 Pezaris Nov 2020 A1
20200409665 Swaminathan Dec 2020 A1
20210004711 Gupta et al. Jan 2021 A1
20210019574 Voicu Jan 2021 A1
20210037110 Bennet et al. Feb 2021 A1
20210092154 Kumar Mar 2021 A1
20210107164 Singh et al. Apr 2021 A1
20210109503 Singh et al. Apr 2021 A1
20210109742 Bennet et al. Apr 2021 A1
20210110345 Iyer et al. Apr 2021 A1
20210117162 Thangaraj et al. Apr 2021 A1
20210117210 Yueh Apr 2021 A1
20210117302 Kadakia et al. Apr 2021 A1
20210117517 Bregman et al. Apr 2021 A1
20210117562 Balan et al. Apr 2021 A1
20210117563 Moresmau et al. Apr 2021 A1
20210117895 Tondevold et al. Apr 2021 A1
20210120044 Balan et al. Apr 2021 A1
20210194994 Aragón et al. Jun 2021 A1
20210286597 Thangaraj et al. Sep 2021 A1
20210357503 Moresmau et al. Nov 2021 A1
20220060558 Bennet et al. Feb 2022 A1
20220114267 Schwartz et al. Apr 2022 A1
20220116787 Balan et al. Apr 2022 A1
Foreign Referenced Citations (21)
Number Date Country
3430529 Jan 2019 EP
3714604 Sep 2020 EP
3732566 Nov 2020 EP
3732582 Nov 2020 EP
WO2008003593 Jan 2008 WO
WO2015139119 Sep 2015 WO
WO2015154133 Oct 2015 WO
WO2017147694 Sep 2017 WO
WO2017160831 Sep 2017 WO
WO2019099140 May 2019 WO
WO2019133208 Jul 2019 WO
WO2019133209 Jul 2019 WO
WO2020263573 Dec 2020 WO
WO2021076310 Apr 2021 WO
WO2021076311 Apr 2021 WO
WO2021076312 Apr 2021 WO
WO2021076324 Apr 2021 WO
WO2021076520 Apr 2021 WO
WO2021076521 Apr 2021 WO
WO2021076791 Apr 2021 WO
WO2021076921 Apr 2021 WO
Non-Patent Literature Citations (22)
Entry
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2017/022295, dated Jun. 1, 2017, 9 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/056196, dated Dec. 26, 2018, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/064127, dated Feb. 11, 2019, 6 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2018/064122, dated Mar. 18, 2019, 8 pages.
“Extended European Search Report” and “Written Opinion”, European Application No. 17767331.6, dated Nov. 14, 2019, 6 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/037028, dated Aug. 28, 2020, 13 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053141, dated Jan. 12, 2021, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053419, dated Jan. 14, 2021, 14 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053138, dated Jan. 12, 2021, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/053139, dated Jan. 11, 2021, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/056026, dated Jan. 19, 2021, 16 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055829, dated Jan. 19, 2021, 18 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055418, dated Jan. 28, 2021, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2020/055420, dated Feb. 1, 2021, 8 pages.
Bourgouin et al., “Towards a Process Analysis Approach to Adopt Robotic Process Automation”, IEEE, 2018, 8 pages.
“Extended European Search Report” and “Written Opinion”, European Application No. 18879227.9, dated Mar. 15, 2021, 9 pages.
“Extended European Search Report” and “Written Opinion”, European Application No. 18895108.1, dated Aug. 19, 2021, 8 pages.
“Extended European Search Report” and “Written Opinion”, European Application No. 18895245.1, dated Aug. 25, 2021, 8 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2021/054415, dated Jan. 19, 2022, 8 pages.
Kuligowski, Kiely; “What Is a Document Repository?” business.com. [Retrieved on Dec. 12, 2021]; <URL: https://www.business.com/articles/what-is-document-repository/> , Jun. 25, 2020, 10 pages.
“International Search Report” and “Written Opinion of the International Searching Authority,” Patent Cooperation Treaty Application No. PCT/US2021/054416, dated Jan. 19, 2022, 9 pages.
Choudhri et al., “PatientService: Electronic Patient Record Redaction and Delivery in Pervasive Environments.” Proceedings 5th International Workshop on Enterprise Networking and Computing in Healthcare Industry (HealthCom), IEEE, Jul. 2003, 7 pages.
Related Publications (1)
Number Date Country
20210117394 A1 Apr 2021 US
Provisional Applications (1)
Number Date Country
62923377 Oct 2019 US