Patent classifications
G06F16/2365
Method and system for automatically detecting errors in at least one data entry using image maps
A method for automatically detecting errors in at least one data entry in a database, the at least one data entry including an input string of characters that do not match at least one predefined string of characters. The method includes generating a first image map; generating at least one classification parameter by comparing the first image map to a second image map, the second image map based at least partially on the predefined string of characters; determining that the input string of characters correlates to the predefined string of characters; and modifying the at least one data entry to match the predefined string of characters in response to determining that the input string of characters correlates to the predefined string of characters. Various other methods and systems for automatically detecting errors in at least one data entry in a database are also disclosed.
System for uploading information into a metadata repository
A back-end application computer server may access a potential metadata entries data store containing a set of potential metadata entries, each entry including at least a data element name and a data element definition. A metadata collection system may be executed to automatically populate a metadata template based on the set of potential metadata entries. The system may update entries in the metadata template using a translation tool and validate the updated entries in the metadata template to ensure that required data elements are present. The system may also certify the validated entries load the set of certified metadata entries, including the certified data element names and certified data element definitions, into an enterprise metadata repository data store. Electronic messages may be exchanged to support at least one interactive user interface display associated with certification of the metadata template.
Real-time anomaly determination using integrated probabilistic system
An audio stream is detected during a communication session with a user. Natural language processing on the audio stream is performed to update a set of attributes by supplementing the set of attributes based on attributes derived from the audio stream. A set of filter values is updated based on the updated set of attributes. The updated set of filter values is used to query a set of databases to obtain datasets. A probabilistic program is executed during the communication session by determining a set of probability parameters characterizing a probability of an anomaly occurring based on the datasets and the set of attributes. A determination is made if whether the probability satisfies a threshold. In response to a determination that the probability satisfies the threshold, a record is updated to identify the communication session to indicate that the threshold is satisfied.
Asynchronous database session update
Systems and methods for handling database transactions within a database session. A first client request to update a first data piece of a database session is received. A first response to the first client request indicates an update of the first data piece in accordance with the first request and publishes the update to enable further processing of the updated first data piece. An indication indicates that the updated first data piece is to be further updated and/or a second data piece of the database session is to be updated. A second client request is received to update a third data piece of the database session and a second response to the second client request indicates an update of the third data piece in accordance with the second request and an update of the updated first data piece in accordance with the indication.
Community data aggregation with automated followup
A system and method are disclosed for the collection and aggregation of data from contributing members of a community, such as health-related, personal, genomic, medical, and other data of interest for individuals and populations. Contributors become members of a community upon creation of an account and providing of data or files. The data is received and processed, such as to analyze, structure, perform quality control, and curate the data. Value or shares in one or more community databases are computed and attributed to each contributing member. The data is controlled to avoid identification or personalization. Steps are taken to determine incompleteness and incorrectness of the data, and the data may be improved or completed automatically, based upon interaction with members, additional contributions of data, and so forth.
Computing networks and systems for updating data
Systems and methods are provided for updating data in a computer network. An exemplary method includes: receiving a first data from one or more data servers; determining a second data for which a first update information is used to update at least one element of the second data; generating a second update information associated with the second data; generating a third update information by executing an operation that compares the first update information and the second update information; generating a third data by applying the third update information to the second data; allowing a user to select via a display device which of the different update elements to update the second data; generating a fourth update information by determining the selected different update elements to update the second data; and updating the second data using the fourth update information.
Systems and methods of providing immutable records
Systems and methods of providing immutable records, and immutable ordering of records, in a computing system are disclosed. The computing system can be a member of a blockchain network of a plurality of blockchains. Each block can include a cryptographic digest (or hash) conforming to a minimum degree of difficulty, a nonce by which the cryptographic digest was generated in conformation with the degree of difficulty, and a list of cryptographic digests of most recent blocks of participating neighbor blockchains. Blocks may be passed between blockchains of the plurality of blockchains, which enables each member of the blockchain network to verify an immutable record of data transactions free of the mutual trust requirement of a typical blockchain environment. In conjunction with the generation of each block, an event record may be entered into an event log of the computing system wherein the block was generated. The event record, which may contain actionable instructions, requests, etc., may be transmitted to computing systems of participating neighbor blockchains, where actionable items may be acted upon. Further, the event logs of each computing system may be exchanged, compared, and adjusted to reflect the earliest appearance of each block of each participating neighbor blockchain.
Data subscription management system
A method includes a digital subscription management system (DSMS) receiving from a source system a request to perform an edit of at least one data object, the DSMS sending a request for response (RFR) to subscribing systems having a copy of the at least one data object, the DSMS receiving a response from the subscribing systems, and the DSMS performing the edit.
Laboratory system for analyzing biological samples
A laboratory system for analyzing biological samples is presented. The laboratory system comprises a plurality of laboratory instruments configured to receive and identify biological samples and to query a laboratory control unit for a processing order indicative of processing steps to be carried out on the biological sample. The laboratory control unit is configured to validate sequence of queries from the plurality of laboratory instruments against a valid query sequence pattern.
Method of ensuring confidentiality and integrity of stored data and metadata in an untrusted environment
A system and method for storing and recovering a computer file. The method includes calculating fingerprint data of the file, separating the file into a plurality of data sub-files each having the same size and a single data sub-file having a smaller size than the other data sub-files, and attaching file metadata to the single data sub-file or as a metadata sub-file. The method also includes padding the single data sub-file including the metadata so that it is the same size as the plurality of data sub-files or the metadata sub-file so that it is the same size as the plurality of data sub-files, adding a header to each data sub-file that includes information about the sub-file, assigning a unique filename to each data sub-file, encrypting each data sub-file, and storing each data sub-file as separate files under their unique filename.